[1]
|
C.-S. Shieh, H.-C. Huang, F.-H. Wang and J.-S. Pan, “Genetic Watermarking Based on Transform-Domain Techniques,” Pattern Recognition, Vol. 37, No. 3, 2004, pp. 555-565. doi:10.1016/j.patcog.2003.07.003
|
[2]
|
P. Wayner, “Disappearing Cryptography: Information Hiding: Steganography and Watermarking,” 2nd Edition, Morgan Kaufmann Publishers Inc., San Francisco, 2002.
|
[3]
|
M. Y. Wu and J. H. Lee, “A Novel Data Embedding Method for Two-Color Facsimile Images,” Proceeding of International Symposium on Multimedia Information Processing (ICASSP), Vol. 2, 1998, pp. 1161-1164.
|
[4]
|
Y. C. Tseng, Y. Y. Chen and H.-K. Pan, “A Secure Data Hidding Scheme for Binary Images,” IEEE Transaction on Communications, Vol. 50, No. 8, 2002, pp. 1227-1231.
doi:10.1109/TCOMM.2002.801488
|
[5]
|
T. Mitsa and K. Parker, “Digital Halftoning Using a Blue Noise Mask,” Journal of Optical Society of America A, Vol. 9, No. 11, 1992, pp. 1920-1929.
doi:10.1364/JOSAA.9.001920
|
[6]
|
M. Wu, E. Tang and B. Liu, “Data Hiding in Digital Binary Image,” Proceeding of IEEE International Conference on Multimedia & Expo, New York, 2000, pp. 393-396.
|
[7]
|
R. W. Floyd and L. Steinberg, “Adaptive Algorithm for Spatial Grayscale,” Proceedings of SID, Vol. 17, No. 2, 1976, pp. 75-77.
|
[8]
|
T. N. Pappas, J. P. Allebach and D. L. Neuhoff, “Modelbased Digital Halftoning,” IEEE Signal Processing Magazine, Vol. 20, No. 4, 2003, pp. 14-27.
doi:10.1109/MSP.2003.1215228
|
[9]
|
E. Kawaguchi and R. O. Eason, “Principle and Applications of BPCS Steganography,” Proceedings of SPIE’s International Symposium on Voice, Video, and Data Communications, 1998, pp. 464-473.
|
[10]
|
M. S. Fu and O. C. Au, “Data Hiding Watermarking for Halftone Images,” IEEE Transactions on Image Processing, Vol. 11, No. 4, 2008, pp. 477-484.
|
[11]
|
M. Jiang, E. K. Wong, N. Memon and X. Wu, “Steganalysis of Halftone Images,” Proceedings of ICASSP, Vol. 2, 2009, pp. ii/793-ii/796.
|
[12]
|
S. H. Kim and J. P. Allebach, “Impact of Human Visual System Models on Model Based Halftoning,” IEEE Transaction on Image Processing, Vol. 11, 2004, pp. 258-269.
|
[13]
|
H. K. Verma and A. N. Singh, “Robustness of the Digital Image Watermarking Techniques against Brightness and Rotation Attack,” International Journal of Computer Science and Information Security, Vol. 5, No. 1, 2010.
|