Upload
truongnhan
View
236
Download
2
Embed Size (px)
Citation preview
Information Hiding in Image and Audio Files 2007-2010
255
References
[1] M. Kharrazi, H. Sencar and N. Menon, “Image
Steganography: Concepts and Practice”, Lecture Notes
Series, Institute for Mathematical Sciences, National
University of Singapore, 2004.
[2] Ing. Giacomo Cancelli, “New techniques or steganography
and steganalysis in the pixel domain” Ph. D. Thesis, Ciclo
XXI – May 13th, 2009, Available online
at:http://www.arehna.di.uoa.gr/thesis/uploaded_data/New_
Techniques_for_Steganography_and_Steganalysis_in_the_Pi
xel_Domain_2009_thesis_1245340893.pdf
[3] D. Stinson, “Cryptography: Theory and Practice”, 2nd
Edition, Chapman and Hall/ CRC, February 2002
[4] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G.
Kuhn “Information Hiding A Survey”, Proc, special issue on
protection of multimedia content, vol. 87, no.7, pp.1062-
1078, July 1999.
[5] Johnson, Neil F., “Steganography”, [Online]. Available at:
http://www.jjtc.com/ stegdoc / index2 .html, Technical
Report, November 1995. [Accessed: June 12, 2008].
[6] Bret Dunbar, “A detailed look at Steganographic Techniques
and their use in an Open-Systems Environment”, SANS
Institute InfoSec Reading Room,
Available:at:http://www.sans.org/reading_room/whitepaper
s/covert/a_detailed_look_at_steganographic_techniques_an
Information Hiding in Image and Audio Files 2007-2010
256
d_their_use_in_an_opensystems_environment_677.
[Accessed: June 12, 2008]
[7] Hamid Izadinia, Fereshteh and Mohammad Rahmati, “A New
Steganography Method Using Quantization Index
Modulation,” Proceedings of the 2009 International
Conference on Computer and Automation Engineering, pp.
181-185
[8] A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, "Digital
Image Steganography: Survey and Analyses of Current
Methods". Signal Processing, Volume 90, Issue 3, March
2010, Pages 727-752.
[9] Joshua Silman, “Steganography and Steganalysis: An
Overview”, SANS Institute InfoSec Reading Room, [Online].
Available
at:http://www.sans.org/reading_room/whitepapers/stengan
ography/steganography-steganalysis-overview_553
[Accessed: Oct 15, 2010].
[10] T Morkel, JHP. Eloff , MS Olivier, “An Overview of Image
Steganography,” in Proceedings of the Fifth Annual
Information Security South Africa Conference (ISSA 2005),
Sandron, South Africa, June/July 2005(Published
Electronically)
[11] G. Simmons, “The Prisoners' Problem and the Subliminal
Channel,” CRYPTO83 -Advances in Cryptology, August 22-
24. 1984. pp. 51–67.
Information Hiding in Image and Audio Files 2007-2010
257
[12] D. Kundur, D. Hatzinakos, “Digital Watermarking using
Multi-resolution Wavelet Decomposition,” In IEEE
ICASSP'98, volume 5, pages 2659– 2662, Seattle, May
1998.
[13] H. Qi, W. Snyder and W. Sander, “Blind Consistency Based
Steganography For Information Hiding In Digital Media,”
IEEE International Conference on Multimedia and Expo,
2002. ICME'02. Proceedings 2002, Volume: 1 , pp: 585 –
588, August. 2002.
[14] T. Sharp, “An Implementation of Key-Based Digital Signal
Steganography,” Information Hiding, LNCS 2137/2001, pp.
13-26
[15] V. Licks and R. Hordan, “On digital image watermarking
robust to geometric transformations,” International
Conference on Image Processing, Volume: 3 , pp.690–693,
September, 2000
[16] H. Liu, J. Liu, J. Huang, D. Huang and Y. Shi, “A robust
DWT-based blind data hiding algorithm,” IEEE International
Symposium on Circuits and Systems, ISCAS 2002, Volume:
2 , pp. II-672 -II-675, May 2002
[17] G. Elmasry and Y. Shi, “2-D Interleaving for Enhancing the
Robustness of Watermark Signals Embedded in Still
Images,” IEEE International Conference on Multimedia and
Expo (II) pp. 731–734, 2000
[18] M. Marvel, C. Retter and C. Boncelet, “A methodology for
data hiding using images,” IEEE Proceedings on Military
Information Hiding in Image and Audio Files 2007-2010
258
Communications Conference, MILCOM 98, Volume: 3, pp.
1044–1047, October 1998.
[19] G. Pan, Z. Wu, Y. Pan, “A data hiding method for few-color
images,” Proceedings IEEE International Conference on
Acoustics, Speech, and Signal Processing, (ICASSP '02),
Volume: 4, pp. 3469–3472, May 2002
[20] Y. Tseng, Y. Chen and H. Pan, “A secure data hiding scheme
for binary images,” IEEE Transactions on Communications,
Volume: 50 Issue: 8, pp. 1227 -1231, Aug. 2002.
[21] http://spectrum.ieee.org/telecom/internet/vice-over-ip-the-
voip-steganography-threat
[22] Neil F. Johnson ,”Steganography”, Technical Report.
November 1995 [online] Available online at:
http://www.jjtc.com/stegdoc/sec202.html
[23] David Khan, “ The History of Steganography,” Lecture Notes
In Computer Science; Vol. 1174, Proceedings of the First
International Workshop on Information Hiding, Springer-
Verlag London, UK 1996 pp. 1 – 5.
[24] K. K. Ravi Ayappa, “Steganography - Information Hiding for
secure communication” Technical Report [online] Available
at :
http://www.amrita.edu/cyberworkshop/proceedings/icscf09_
submission_97.pdf
Information Hiding in Image and Audio Files 2007-2010
259
[25] Gregori Kipper, Investigator‟s guide to steganography, 2nd
ed. CRC Perss, 2004 [E-book] pp 39-40.Available: http://
www.Amazon.com
[26] Wu, H.-C., Wu, N.-I., Tsai, C.-S, Hwang, M.-S ,”Image
steganographic scheme based on pixel-value differencing
and LSB replacement methods,” Vision, Image and Signal
Processing, IEE Proceedings - Volume 152, Issue 5, 7 Oct.
2005.
[27] C.K Chan and L.M Cheng,” Hiding data in images by simple
LSB substitution,” Pattern Recognition, Vol. 37, No. 3.
(March 2004), pp. 469-474.
[28] Neil F. Johnson and Sushil Jajodia, “Steganalysis: The
Investigation of Hidden Information”, Information
Technology Conference, IEEE. Pp 113-116. September 1998.
[29] C. C. Chang, J. Y. Hsiao, and C. S. Chan, “Finding optimal
LSB substitution in image hiding by dynamic programming
strategy,” Pattern Recognition., vol. 36, no. 7, pp. 1583-
1595, 2003.
[30] Z. M. Lu, J. S. Pan, and S. H. Sun, “VQ-based digital image
watermarking method,” Electron. Lett., Vol. 36, no. 14, pp.
1201–1202, 2000
[31] Nedeljko Cvejic , “Algorithms for audio watermarking and
steganography” ,
http://herkules.oulu.fi/isbn9514273842/isbn9514273842.pd
f, 2004
Information Hiding in Image and Audio Files 2007-2010
260
[32] C.C. Chang, T.C. Lu, “A difference expansion oriented data
hiding scheme for restoring the original host images”, J.
Syst. Softw. 79 (12) (2006) 1754–1766
[33] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar ,
“Increased Capacity of Information Hiding in LSB‟s method
for text and Image” , International Journal of Electrical,
Computer and Systems Engineering , volume 2, No. 4
http://www.waset.org/ijecse/v2/ v2-4-34.pdf (Europe)
[34] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar ,
“Polynomial Transformation to improve Capacity of Cover
Image for Information Hiding in Multiple LSB‟s”,
International Journal of Engineering Research and Industrial
Applications (IJERIA),Ascent Publications, Volume II, March
2009.Pune (India)
[35] H. B. Kekre, Archana Athawale and Pallavi N.Halarnkar,
“Performance Evaluation Of Pixel Value Differencing And
Kekre‟s Modified Algorithm For Information Hiding In
Images”, ACM International Conference on Advances in
Computing, Communication and Control (ICAC3).2009
(Uploaded on ACM Portal:
http://portal.acm.org/citation.cfm?id=1523103.1523172).
[36] D. C. Wu and W. H. Tsai, “A steganographic method for
images by pixel-value differencing,” Pattern Recognition
Letters, vol. 24, no. 9-10, pp. 1613-1626, June 2003
[37] Hong-juan zhang, hong-jun tang , “A Novel Image
Steganography Algorithm against Statistical Analysis”, Proc.
Information Hiding in Image and Audio Files 2007-2010
261
sixth Int. Conf on machine learning and cybernetics, ,vol. 7.,
pp. 3884-3888, Hong Kong , 19-22 august 2007
[38] A. Ker, “Steganalysis of LSB Matching in Grayscale Images.”
IEEE Signal Processing Letters, vol. 12, no.6, pp. 441–444,
2005
[39] J. Mielikainen, “LSB Matching Revisited,” IEEE Signal
Processing Letters, vol. 13, no.5, May 2006.
[40] Smo-huliiv ,T un-hang Chen, hong-xun yao, Wen gao, “A
Variable Depth LSB Data Hiding Technique in Images” Proc
,Third Int. Conf. on machine learing and cybernetics,
shanghai, 26-29 August 2004,
[41] Rehab H. Alwan, Fadhil J. Kadhim, and Ahmad T. Al-Taani,
“Data Embedding Based on Better Use of Bits in Image
Pixels”, International Journal of Signal Processing 2006.,
Available: http://www.waset.org/journals/ijsp/v2/v2-2-
15.pdf
[42] Sandipan Dey, Ajith Abraham, Sugata Sanyal , “An LSB Data
Hiding Technique Using Prime Numbers”, third International
Symposium on Information Assurance and Security, pp.
101-108., 29-31st August, 2007
[43] Daniela Stanescu, Mircea Stratulat, Voicu Groza, Joana
Ghergulescu, Daniel Borca, “Steganography in YUV color
space” IEEE International Workshop on Robotic and Sensors
Environments Ottawa - Canada, pp. 1-4., 12-13 October
2007
Information Hiding in Image and Audio Files 2007-2010
262
[44] Ching-Yu Yang, “Based upon RBTC and LSB Substitution to
Hide Data”, Proc. First Int. Conf. Innovative Computing,
Information and Control (ICICIC'06), vol. 1, pp.476-479,
30th Aug- 1st Sept 2006.
[45] Ching-Yu Yang, “Color Image Steganography based on
Module Substitutions”, Proc. Third Int Conf. Intelligent
Information Hiding and multimedia Signal Processing., vol.
2, pp.118-121, 26th -28th Nov 2007
[46] Jing-Ming Guo, “Complementary Steganography in Error-
Diffused Block Truncation Coding Images”, Proc. Third Int.
Conf. Intelligent Information Hiding and Multimedia Signal
Processing, vol. 2, pp. 134-140, 26-28 Nov 2007
[47] Chun-Hsiang Huang, Shang-Chih Chuang, and Ja-Ling Wu,
“Digital-Invisible-Ink Data Hiding Based on Spread-
Spectrum and Quantization Techniques”, IEEE Trans.
Multimedia, vol. 10, no. 4,pp.557-569, June 2008.
[48] H. B. Kekre, Archana A. Athawale, “Information Hiding using
LSB technique with increased capacity”, International
Journal of Cryptography and Security, Volume 1. No. 2, Oct
2008.
[49] S.S. Agaian, D. Akopian, O. Caglayan, S. A. D‟Souza,
“Lossless Adaptive Digital Audio Steganography,” In Proc.
IEEE Int. Conf. Signals, Systems and Computers, pp. 903-
906, November 2005.
[50] Chung-Ming Wang , Nan-I Wu, Chwei-Shyong Tsai, Min-
Shiang Hwang, “A high quality steganographic method with
pixel-value differencing and modulus function” , ACM Journal
Information Hiding in Image and Audio Files 2007-2010
263
of Systems and Software, vol.81, no.1, pp. 150–158,
January 2008.
[51] Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, and
Hung-Min Sun, “Adaptive Data Hiding in Edge Areas of
Images With Spatial LSB Domain Systems”, IEEE Trans.
Information Forensics and Security, vol. 3, no. 3, pp. 488-
497, September 2008.
[52] Santosh Arjun, Atul Negi, Chaithanya Kranthi, Divya Keerthi,
“An Approach to Adaptive Steganography Based on Matrix
Embedding”, Proc TENCON 2007, pp. 1-4., Oct. 30-Nov. 2,
2007.
[53] Kaliappan Gopalan, “An Image Steganography
Implementation for JPEG-Compressed Images”,
International Symposium on Communications and
Information Technologies, 2007, ISCIT '07, pp. 739-744.,
17-19th Oct.2007.
[54] S.D. Lin and C.F. Chen, A Robust DCT-based Watermarking
for Copyright Protection, IEEE Transactions on Consumer
Electron, vol. 46, no. 3, pp. 415-421, 2000
[55] Y.T. Wu and F.Y. Shih, Genetic algorithm based methodology
for breaking the steganalytic systems, IEEE Transactions on
Systems, Man and Cybernetics. Part B, vol. 36, no. 1, pp.
24-31, 2006
[56] Adel Almohammad, Robert M. Hierons and Gheorghita
Ghinea, “ High Capacity Steganographic Method Based Upon
JPEG ,” ARES, pp.544-549, 2008 Third International
Information Hiding in Image and Audio Files 2007-2010
264
Conference on Availability, Reliability and Security, 2008,
Mar-04-08 to Mar-07-08
[57] R.O.EI Safy, H.H. Zayed and A. EI Dessouki, “An Adaptive
Steganographic Technique Based on Integer Wavelet
Transform,” International Conference on Networking and
Media Convergence, 2009 (ICNM) 2009 on 24-25 March,
Cairo
[58] P. Chen and H. Lin, “A DWT Approach for Image
Steganography”, International Journal of Applied Science
and Engineering 2006. 4,3 : 275-290.
[59] C. C. Chang, and C. Y. Lin,” Reversible Steganography for
VQ-compressed Images Using Side Matching and
Relocation”, IEEE Transactions on Information Forensics and
Security, vol. 1, no. 4, pp. 493-501, 2006
[60] A. Gersho and R. M. Gray, Vector Quantization and Signal
Compression. Norwell, MA: Kluwer, 1992.
[61] Z. N. Li and M. S. Drew, Fundamentals of Multimedia.
Englewood Cliffs, NJ: Prentice-Hall, Oct. 2003
[62] C. H. LEE, L. H. CHEN, “Fast Codeword Search Algorithm for
Vector Quantization”, IEE Proceedings Image Signal
Processing Vol 141, No. 3 June 1994
[63] N. M. Nasrabadi and R. King, “Image coding using vector
quantization: A review,” IEEE Transactions on.
Communication., vol. 36, no. 8, pp. 957–971, Aug. 1988
Information Hiding in Image and Audio Files 2007-2010
265
[64] Y. Linde, A. Buzo, and R. M. Gray, “An algorithm for Vector
Quantizer Design,” IEEE Transactions on Communications.,
vol. COM- 28, no. 1, pp. 84-95, 1980
[65] T. Kim, “Side Match and Overlap Match Vector Quantizers for
Images,” IEEE Transactions on Image Processing, Vol. 1,
April 1992, pp. 170-185
[66] C. C. Chang, G. M. Chen and M. H. Lin, “Information Hiding
Based on Search-Order Coding for VQ Indices,” Pattern
Recognition Letters, Vol. 25, 2004, pp. 1253-1261
[67] Lin, Y.C., and Wang C.C.: „Digital images watermarking by
vector quantization‟. Proc. 9th National Computer
Symposium, Taichung, Taiwan, 1999, pp. 76–87
[68] Lu, Z.M., and Sun, S.H.: „Digital image watermarking
technique based on vector quantization‟, Electronic. Letters.,
2000, 36, (4), pp. 303–305
[69] H. B. Kekre, Archana A. Athawale, Tanuja K. Sarode ,
Kalpana R. Sagvekar, “High Payload using mixed codebooks
of Vector Quantization", International Journal on Computer
Science and Engineering (IJCSE), Vol. 02, No. 02, 2010,
352-356 Available at
http://www.enggjournals.com/ijcse/doc/IJCSE10-02-02-
43.pdf Chennai (India)
[70] H. B. Kekre, Archana A. Athawale, Dipali Sadavarti, “
Algorithm to Generate Kekre‟s Wavelet Transform from
Kekre‟s Transform”, International Journal of Engineering,
Science and Technology, (IJEST) ISSN:0975-5462, Vol.
Information Hiding in Image and Audio Files 2007-2010
266
2(5), 2010, 756-767 website-
http://www.ijest.info/docs/IJEST10-02-05-22.pdf (India)
[71] H. B. Kekre, Archana A. Athawale, Tanuja K. Sarode ,
Kalpana R. Sagvekar, “Comparative Performance of
Information Hiding in Vector Quantized Codebooks using
LBG, KPE, KMCG and KFCG “International Journal of
Computer Science and Information Security, IJCSIS,
Website - http://sites.google.com/site/ijcsis/vol-8-no-2-
may-2010
[72] H. B. Kekre, Archana A. Athawale, Tanuja K. Sarode ,
Kalpana R. Sagvekar, “Increased Capacity of Information
Hiding using mixed codebooks of Vector Quantization
Algorithms: LBG, KPE and KMCG ", Advances in
Computational Sciences and Technology, (ACST).
ISSN0974-4738
[73] H. B. Kekre, Archana A. Athawale, Uttara A. Athawale,
“Increased Capacity for Information Hiding using Walsh
Transform“,ICWET-10 International Conference and
Workshop on Emerging Trends in Technology (ICWET 2010),
26-27 Feb 2010, Available on ACM Portal at
http://portal.acm.org/citation.cfm?id=1741906.1741923
[74] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar,
“Performance Comparison of DCT and Walsh Transform for
Steganography”, International Conference and Workshop on
Emerging Trends in Technology (ICWET 2010), 26-27
Feb2010. Site:
http://portal.acm.org/citation.cfm?id=1741906.1741921&col
l=GUIDE&dl=GUIDE&CFID=91821685&CFTOKEN=15950099
Information Hiding in Image and Audio Files 2007-2010
267
[75] H. B. Kekre, Archana A. Athawale, Dipali Sadavarti , “A
Novel Steganographic Scheme using Discrete Sine
Transform based on Energy Distribution” Springer-
International Conference on Contours of Computing
Technology (Thinkquest-2010), 13-14th Mar 2010 (to be
uploaded on Online Springer Link )
[76] H. B. Kekre, Archana A. Athawale, Tanuja K. Sarode ,
Kalpana R. Sagvekar, “ Information Hiding in Vector
Quantized Codebook” Springer-International Conference on
Contours of Computing Technology (Thinkquest-2010), 13-
14th Mar 2010 (to be uploaded on Online Springer Link )
[77] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar,
“Comparative Study of Different Color Spaces for
Information Hiding using Multiple LSB‟s in Different
Components”, IEEE International Advance Computing
Conference IACC'09, held on 6th – 7th March 09, Patiala
Punjab.
[78] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar,
“High Payload using High Boost Filtering in Kekre‟s Multiple
LSB‟s Algorithm”, 2nd International Conference on Advances
in Computer Vision and Information Technology ACVIT 2009,
16th -19th December 2009, Aurangabad.
[79] H. B. Kekre, Archana A. Athawale, Sudeep D. Thepade,
“Clandestine Data Entrenching and Salvaging “ National
Conference on Information and Communication Technology
29th Feb and 1st Mar, NCICT-08.
Information Hiding in Image and Audio Files 2007-2010
268
[80] H. B. Kekre, Archana A. Athawale, “Personal Data Ingrain
and Regain”, NCA, FCRCE, Bandra(W), Mumbai, 16th -17th
May 2008.
[81] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar,
“Robust and Secure Informatiion Hiding using Polynomial
Transformation in Kekre‟s LUV Color space and Multiple
LSB‟s”, National Conference on Information and
Communication Technology NCICT-09, 6-7 March 2009.
[82] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar,
“Increased Capacity of Least Significant Bits Embedding For
Information Hiding”,TechnoPath Technical Magazine, NMIMS
University.Volume 1 No 1
[83] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar,
”High Payload using High Boost Filtering in Kekre‟s Multiple
LSB‟s Algorithm for Information Hiding”, Technopath
Technical Magazine May 2009, Volume 1 No2
[84] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar,
“Increased Capacity and High Security for Embedding Secret
Message in Transform Domain using Discrete Cosine
Transform”.
[85] H. B. Kekre, Archana A. Athawale, Tanuja K. Sarode,
Kalpana R. Sagvekar, “Mixing Codebooks of LBG, KPE and
KFCG Algorithms to Increase Capacity of Information
Hiding”, International Journal of Computer Science and
Security (IJCSS)(Malaysia)
Information Hiding in Image and Audio Files 2007-2010
269
[86] B. Newman, Secrets of German Espionage. London: Robert
Hale Ltd, 1940
[87] J. E. Hoover, “The enemy‟s masterpiece of espionage.” The
Reader‟s Digest , vol. 48, pp. 49–53, May 1946, London
edition.
[88] C. I. Podilchuk and W. Zeng, “Digital image watermarking
using visual models.” In Rogowitz and Pappas [142], pp.
100– 111, ISBN 0-8194-2427-7.
[89] M. D. Swanson, B. Zu, and A. H. Tewfik, “Robust data hiding
for images.” In 7th Digital Signal Processing Workshop (DSP
96), pp. 37–40, IEEE, Loen, Norway, Sep. 1996.
[90] J. F. Delaigle, C. De Vleeschouwer, and B. Macq,
“Watermarking algorithm based on a human visual model.”
Signal Processing, vol. 66, no. 3, pp. 319–335, May 1998,
ISSN 0165-1684, European Association for Signal Processing
(EURASIP)
[91] L. Boney, A. H. Tewfik, and K. N. Hamdy, “Digital
watermarks for audio signals.” In International Conference
on Multimedia Computing and Systems, pp. 473–480, IEEE,
Hiroshima, Japan, 17–23 Jun. 1996.
[92] F. Gon, J.-F. Delaigle, C. D. Vleeschouwer, B. Macq, and J.-J.
Quisquater, “A low cost perceptive digital picture water-
marking method.” In Sethin and Jain [149], pp. 264–277,
ISBN 0-8194-2433-1.
Information Hiding in Image and Audio Files 2007-2010
270
[93] R. J. Anderson, ed., Information hiding: First international
workshop, vol. 1174 of Lecture Notes in Computer Science,
Isaac Newton Institute, Cambridge, England, May 1996,
Springer-Verlag, Berlin, Germany, ISBN 3-540-61996-8.
[94] W. Sweldens, “The Scheme. A construction of
second generation Wavelets”, SAIM J. Math. Anal. 29:511-
546, 1997
[95] Jr. L. M. Marvel, C. G. Boncelet and C. T. Retter. “Spread
spectrum image steganography‟”. IEEE Transactions on
Image Processing, 8:1075–1083,1999.
[96] Nasir Memon R. Chandramouli, “Analysis of lsb based image
steganography techniques” In Proceedings of IEEE ICIP,
2001.
[97] Kran Bailey Kevin Curran. “An evaluation of image based
steganography methods”. International Journal of Digital
Evidence, Fall 2003, 2003.
[98] S. Katzenbeisser and F. A. P. Petitcolas. Information Hiding
Techniques for Steganography and Digital Watermarking.
Artech House, London, 2000.
[99] Z. Duric N. F. Johnson and S. Jajodia. Information Hiding :
Steganography and Digital Watermarking-Attacks and
Counter measures. Kluwer Academic, 2001.
[100] I. J. Cox, Ton Kalker, Georg Pakura and Machia Scheel,
“Information transmission and steganography, ” Lecture
Notes in Computer Science, vol. 3710, pp.15-29, 2005
Information Hiding in Image and Audio Files 2007-2010
271
[101] Shahreza S.S., Shalmani, “Adaptive wavelet domain audio
steganography with high capacity and low error rate”, IEEE
International Conference on Acoustics, Speech and Signal
Processing, 2008 pp: 1729 – 1732, 2008.
[102] “audio steg : overview”, Internet publication on
www.snotmonkey.com.http://www.snotmonkey.com/work/s
chool/405/overview.html.
[103] Zamani M., Ahmad R.B., Manaf A.B.A., Zeki A.M., “An
Approach to Improve the Robustness of Substitution
Techniques of Audio Steganography”, in Proc. IEEE
International Conference on Computer Science and
Information Technology, ICCSIT pp: 5-9, 2009.
[104] Rade Petrovic, Joseph M. Winograd, Kanaan Jemili and Eric
Metois, “Data Hiding within Audio
signals”,http://factaee.elfak.ni.ac.rs/facta9902/ilja6.pdf.
[105] Swanson, M.D.; Bin Zhu; Tewfik, A.H., “Current state of the
art,challenges and future directions for audio watermarking”,
IEEE International Conference on Multimedia Computing and
Systems, vol.1, pp: 19 – 24, 7-11 June 1999.
[106] N. Cvejic and T. Seppanen, "Channel capacity of high bit
rate audio data hiding algorithms in diverse transform
domains," Proceeding of 2004 IEEE International
Symposium on Communications and Information
Technology, Vol.1, pp. 84- 88, October 2004.
[107] Nicola Cocchiaro, http://stegui.sourceforge.net/intro.html.
Information Hiding in Image and Audio Files 2007-2010
272
[108] W. Bender, D. Gruhl, N.Morimoto, A. lu, “Techniques for
data hiding”, IBM Systems Journal, Vol. 35, Issue 3-4, pp.
313 – 336, 1996.
[109] Agaian, S.S., Akopian D., Caglayan O., D'Souza S.A.,
“Lossless Adaptive Digital Audio Steganography”,
Conference Record of the Thirty-Ninth Asilomar Conference
on Signals, Systems and Computers, pp. 903- 906, October
28 - November 1, 2005.
[110] http://www.wisegeek.com/what-is-a-wav-file.htm.
Last modified: 14 September 2009].
[111] Soumyendu Das, Subhendu Das, Bijoy Bandyopadhyay and
Sugata Sanyal, “Steganography and Steganalysis: different
approaches”, available at
http://www.tifr.res.in/~sanyal/papers/Soumyendu_Stegano
graphy_Steganalysis_different_approaches.pdf.
[112] Jonathan Watkins “ Steganography-Message hidden in
bits“at http://mms.ecs.soton.ac.uk.mms2002/papers/6.pdf
[113] N. Cvejic, T. Seppanen, "Increasing Robustness of LSB Audio
Steganography using a novel embedding method”, Proc.
IEEE Int. Conf Info. tech.: Coding and Computing, Vol. 2,
pp.533-537, April 2004.
[114] Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis
Ganguly, Swarnendu Mukherjee and Poulami Das, “A
Tutorial Review on Steganography”,IEEE IC3 Conference,
Noida India August 7-9, 2008
Information Hiding in Image and Audio Files 2007-2010
273
[115] H. B. Kekre, Archana Athawale, Tanuja Sarode, Sudeep
Thepade and Kalpana Sagvekar, “Steganography using
Dictionary Sort on Vector Quantized Codebook”,
International Journal of Computer Science and Security
(IJCSS), Volume 4, Issue No 4, 2010,392-402
[116] Black, Paul E. (2005-12-19). "Fisher–Yates shuffle".
Dictionary of Algorithms and Data Structures. National
Institute of Standards and Technology.
http://www.nist.gov/dads/HTML/fisherYatesShuffle.html.
Retrieved 2007-08-09
[117] R. M. Gray, “Vector quantization”, IEEE ASSP Mag., pp.: 4-
29, Apr. 1984.
[118] Enhancement of LSB based Steganography for. Hiding
Image in Audio. Available on line at
http://www.enggjournals.com/ijcse/doc/IJCSE10-02-05-
73.pdf 05, 2010, pp: 1652-1658.
[119] Tanuja K. Sarode “Vector Quantization and its Applications”,
Ph.D. Thesis, MPSTME, NMIMS University, Mumbai, India,
July 2010.
[120] H.B.Kekre, Tanuja K. Sarode, “Vector Quantized Codebook
Optimization using Modified Genetic Algorithm” IETE Journal
of Research, vol. 56, No. 5, 257-264, Sept-Oct 2010.
[121] H. B. Kekre, Tanuja K. Sarode, “New Fast Improved
Codebook Generation Algorithm for Color Images using
Vector Quantization,” International Journal of Engineering
and Technology, vol.1, No.1, pp.: 67-77, September 2008.
Information Hiding in Image and Audio Files 2007-2010
274
[122] H. B. Kekre, Tanuja K. Sarode, “Fast Codebook Generation
Algorithm for Color Images using Vector Quantization,”
International Journal of Computer Science and Information
Technology, Vol. 1, No. 1, pp.: 7-12, Jan 2009.
[123] H. B. Kekre, Tanuja K. Sarode, “An Efficient Fast Algorithm
to Generate Codebook for Vector Quantization,” First
International Conference on Emerging Trends in Engineering
and Technology, ICETET-2008, held at Raisoni College of
Engineering, Nagpur, India, pp.: 62- 67, 16-18 July 2008.
Avaliable at IEEE Xplore.
[124] H. B. Kekre, Tanuja K. Sarode “New Clustering Algorithm
for Vector Quantization using Rotation of Error Vector”,
International Journal of Computer Science and Information
Security, Vol. 7, No. 03, 2010, USA.
[125] H. B. Kekre, Tanuja K. Sarode, “Fast Codebook Generation
Algorithm for Color Images using Vector Quantization,”
International Journal of Computer Science and Information
Technology, Vol. 1, No. 1, pp.: 7-12, Jan 2009.
[126] H. B. Kekre, Tanuja K. Sarode, “Fast Codevector Search
Algorithm for 3-D Vector Quantized Codebook”, WASET
International Journal of cal Computer Information Science
and Engineering (IJCISE), Volume 2, No. 4, pp.: 235-239,
Fall 2008. Available: http://www.waset.org/ijcise.
[127] H. B. Kekre, Tanuja K. Sarode, “Fast Codebook Search
Algorithm for Vector Quantization using Sorting Technique”,
ACM International Conference on Advances in Computing,
Communication and Control (ICAC3-2009), pp: 317-325,
Information Hiding in Image and Audio Files 2007-2010
275
23-24 Jan 2009, Fr. Conceicao Rodrigous College of Engg.,
Mumbai. Available on ACM portal.
[128] H. B. Kekre, Tanuja K. Sarode, “Vector Quantized Codebook
Optimization using K-Means”, International Journal on
Computer Science and Engineering (IJCSE) Vol.1, No. 3,
pp.: 283-290, 2009, Available online
at:http://journals.indexcopernicus.com/abstracted.php?level
=4&id_issue=839392.
[129] H. B. Kekre, Tanuja K. Sarode , “2-level Vector Quantization
Method for Codebook Design using Kekre‟s Median Codebook
Generation Algorithm”, Advances in Computational Sciences
and Technology (ACST), ISSN 0973-6107, vol. 2, no. 2,
pp.:167–178, 2009. Available online at.
http://www.ripublication.com/Volume/acstv2n2.htm.
[130] H. B. Kekre, Tanuja K. Sarode, “Multilevel Vector
Quantization Method for Codebook Generation”,
International Journal of Engineering Research and Industrial
Applications (IJERIA), vol. 2, no. V, pp.: 217-231, 2009.
Available online at. http://www.ascent-
journals.com/ijeria_contents_Vol2No5.htm.
[131] H. B. Kekre, Tanuja K. Sarode, “Bi-level Vector Quantization
Method for Codebook Generation”, Second International
Conference on Emerging Trends in Engineering and
Technlogy, at G. H. Raisoni College of Engineering, Nagpur
on 16-18 December 2009, this paper will be uploaded online
at IEEE Xplore.
[132] H. B. Kekre, Tanuja K. Sarode, “Speech Data Compression
using Vector Quantization”, WASET International Journal of
Information Hiding in Image and Audio Files 2007-2010
276
Computer and Information Science and Engineering
(IJCISE), vol. 2, No. 4, pp.: 251-254, Fall 2008. available:
http://www.waset.org/ijcise.
[133] H. Y. M. Liao, D. Y. Chen, C. W. Su, and H. R. Tyan, “Real-
time event detection and its applications to surveillance
systems,” in Proc. IEEE Int. Symp. Circuits and Systems,
Kos, Greece, pp.: 509–512, May 2006.
[134] H.B.Kekre, Tanuja K. Sarode, Bhakti Raul, “Color Image
Segmentation Using Kekre‟s Algorithm for Vector
Quantization”, WASET International Journal of Computer
Science (IJCS), vol. 3, no. 4, pp.: 287-292, Fall 2008.
http://www.waset.org/ijcs.
[135] H.B.Kekre, Tanuja K. Sarode, Bhakti Raul, “Color Image
Segmentation using Vector Quantization Techniques Based
on Energy Ordering Concept”, International Journal of
Computing Science and Communication Technologies
(IJCSCT), vol. 1, no. 2, pp.: 164-171, January 2009.
[136] H.B.Kekre, Tanuja K. Sarode, Bhakti Raul, “Color Image
Segmentation Using Vector Quantization Techniques”,
Advances in Engineering Science Sect. C (3), pp.: 35-42,
July-September 2008.
[137] H.B.Kekre, Tanuja K. Sarode, Bhakti Raul, “Color Image
Segmentation Using Kekre‟s Fast Codebook Generation
Algorithm Based on Energy Ordering Concept”, Proceedings
of International Conference on Advances in Computing,
Communication and Control (ICAC3), pp.:357-362, Jan
2009, Available on ACM Portal.
Information Hiding in Image and Audio Files 2007-2010
277
[138] H.B.Kekre, Tanuja K. Sarode, Bhakti Raul, “Color Image
Segmentation using Vector Quantization Techniques Based
on Energy Ordering Concept”, International Conference on
Advanced Computing & Communication Technology
(ICACCT-2008) Asia Pacific Institute of Information
Technology, Panipat India, 8-9 Nov 2008.
[139] H. B. Kekre, Tanuja K. Sarode, Saylee Gharge “Detection of
Cancer Using Vector Quantization for Segmentation”,
International Journal of Computer Applications (IJCA) (0975
– 8887), Volume 4, No.9, August 2010, pp.:14-19.
[140] H. B. Kekre, Tanuja K. Sarode, Saylee Gharge “SAR Image
Segmentation using Vector Quantization Technique on
Entropy Images”, International Journal of Computer Science
and Information Security, Vol. 7, No. 03, 2010, USA.
[141] H. B. Kekre, Tanuja K. Sarode, Saylee Gharge, “Tumor
Detection in Mammography Images using Vector
Quantization Technique” International Joint Journal
Conference on Computer and Communication Technology
(IJJCCT 2009), china.
[142] H. B. Kekre, Tanuja K. Sarode, Saylee Gharge, “Detection
and Demarcation of Tumor using Vector Quantization in MRI
images”, International Journal of Engineering Science and
Technology, Vol.1, Number (2), 2009, pp.: 59-66.
[143] H. B. Kekre, Tanuja K. Sarode, Saylee Gharge, “Tumor
Demarcation in Mammography Images using LBG on
Probability Image” Journal of Computer Applications (IJCA),
Vol. 2, June 2010, Germany.
Information Hiding in Image and Audio Files 2007-2010
278
[144] H. B. Kekre, Tanuja K. Sarode, Saylee Gharge, Kavita Raut,
“Detection of Cancer Using Vector Quantization for
Segmentation”, International Journal of Computer
Applications (IJCA) (0975 – 8887), Volume 4 No.9, August
2010. USA. Available online at
http://www.ijcaonline.org/archives/volume4/number9/856-
1199.
[145] H. B. Kekre, Tanuja K. Sarode, Saylee Gharge, Kavita Raut,
““Detection Of Tumor In MRI Using Vector Quantization
Segmentation”, International Journal of Engineering Science
and Technology, Vol. 2(8), 2010, pp.: 3753-3757.
[146] H. B. Kekre, Kamal Shah, Tanuja K. Sarode, Sudeep D.
Thepade “Performance Comparison of Vector Quantization
Technique –KFCG with LBG, Existing Transforms and PCA for
Face Recognition”, International Journal of Information
Retrieval (IJIR), Vol. 02, Issue 1, 2009, pp.: 64-71.
[147] H.B.Kekre, T.K.Sarode, V.A.Bharadi, Tejas Bajaj, Somesh
Chatterjee, Mithilesh Bhat,Kunal Bihani “A Comparative
Study of DCT and Kekre‟s Median Code Book Generation
Algorithm for Face Recognition”, International Conference
and Workshop on Emerging Trends in Technology (ICWET
2010), at Thakur College of Engineering and Technology
(TCET), 26 & 27th February 2010, the paper is available on
ACM portal.
[148] H.B.Kekre, Kamal Shah, Tanuja K.Sarode “Application of
Kekre‟s Fast Code Book Generation Algorithm for Face
Recognition” International Conference and Workshop on
Emerging Trends in Technology (ICWET 2010), at Thakur
Information Hiding in Image and Audio Files 2007-2010
279
College of Engineering and Technology (TCET), 26 & 27th
February 2010, the paper is uploaded on ACM portal.
[149] H.B.Kekre, T.K.Sarode, V.A.Bharadi, A A Agrawal, R J Arora
, M C Nair, “Iris Recognition Using Vector Quantization”,
International Conference on Signal Acquisition and
Processing (ICSAP 2010), Organized by International
Association of Computer Science & Information Technology
(IACSIT) Singapore, held at Banglore, 9-10th February
2010. Available online on IEEEXplorer.
[150] H.B.Kekre, T.K.Sarode, V.A.Bharadi, A A Agrawal, R J Arora
, M C Nair “Iris Recognition Using Discrete Cosine Transform
and Kekre‟s Fast Codebook Generation Algorithm”,
International Conference and Workshop on Emerging Trends
in Technology (ICWET 2010). To be held at Thakur College
of Engineering and Technology (TCET), 26 & 27th February
2010, Available online on IEEEXplorer ACM portal.
[151] H.B.Kekre, T.K.Sarode, V.A.Bharadi, A A Agrawal, R J Arora
, M C Nair, “Performance Comparison of DCT and VQ Based
Techniques for Iris Recognition” Journal of Electronic Science
and Technology, (JEST), Vol. 8, No. 3, pp.223 -229,
September, 2010.
[152] H.B.Kekre, Tanuja K. Sarode, Sudeep D. Thepade, Vaishali
Suryavanshi,“Improved Texture Feature Based Image
Retrieval using Kekre‟s Fast Codebook Generation
Algorithm”, Springer-International Conference on Contours
of Computing Technology (Thinkquest-2010), Babasaheb
Gawde Institute of Technology, Mumbai, 13-14 March 2010,
The paper will be uploaded on online Springerlink.
Information Hiding in Image and Audio Files 2007-2010
280
[153] H.B.Kekre, Tanuja K. Sarode, Sudeep D. Thepade, “Image
Retrieval by Kekre‟s Transform Applied on Each Row of
Walsh Transformed VQ Codebook”, (Invited), ACM-
International Conference and Workshop on Emerging Trends
in Technology (ICWET 2010),Thakur College of Engg. And
Tech., Mumbai, 26-27 Feb 2010, The paper is invited at
ICWET 2010. Also will be uploaded on online ACM Portal.
[154] H. B. Kekre, Ms. Tanuja K. Sarode, Sudeep D. Thepade,
“Image Retrieval using Color-Texture Features from DCT on
VQ Codevectors obtained by Kekre‟s Fast Codebook
Generation”, ICGST-International Journal on Graphics,
Vision and Image Processing (GVIP), Volume 9, Issue 5, pp.:
1-8, September 2009. Available online at
http://www.icgst.com/gvip/Volume9/Issue5/P1150921752.h
tml
[155] H. B. Kekre, Tanuja K. Sarode, Sudeep D. Thepade, “Color-
Texture Based Feature Based Image Retrieval using DCT
applied on Kekre‟s Median Codebook “, International Journal
of Imaging (IJI), Volume 2, No. A09, Autumn 2009, ISSN
0974-0627. Available online at.
http://www.ceser.res.in/ceserp/index.php/iji/issue/view/72.
[156] H. B. Kekre, Tanuja K. Sarode, Sudeep D. Thepade , Pallavi
H. “Kekre‟s Fast Codebook Generation in VQ with Various
Color Spaces for Colorization of grayscale Images”
International Conference on Recent Trends in Business
Administration and Information Processing (BAIP 2010), the
paper will be available in Springer Digital Library.
[157] H. B. Kekre, Tanuja K. Sarode, Dhirendra Mishra “Coloring
Gray Scale Digital Images using Kekre‟s Fast Code Book
Information Hiding in Image and Audio Files 2007-2010
281
Generation Algorithm”, International Conference and
Workshop on Emerging Trends in Technology (ICWET 2010).
To be held at Thakur College of Engineering and Technology
(TCET), 26 & 27th February 2010, Available online on
IEEEXplorer ACM portal.
[158] Chi-Nan Lin, Chin-Chen Chang, “A Best-pair-first capacity
distortion control for data hiding on VQ compression
domain”
[159] M. Jo and H. D. Kim, “A Digital Image Watermarking
Scheme Based on Vector Quantisation,” IEICE Trans. Inf. &
Syst., vol. E85-D, no. 6, June 2002, pp. 1054-1056
[160] Chin-Chen Chang, Tung-shou Chen, Hsien-Chu Hsia, “ An
Effective Image Steganographic Scheme based on Wavelet
Transformation and Pattern-Based Modification,” iccnmc, pp.
450,2003, International Conference on ComputerNetworks
and Mobile Computing (ICCNMC‟ 03), 2003.
[161] M. F. Tolba, M.A. –S. Ghonemy, I.A. –H. Taha, ”High
Capacity Image Steganography using Wavelet-based
Fusion,”iscc, vol. 1, pp. 430-435, the ninth IEEE symposium
on Computers and Communications 2004 volume 1 (ISCC‟
04).
[162] Digital Image Processing , Image Transforms - Dr. Tania
STATHAKI,website : http://www.commsp.ee.ic.ac.uk/~tania/
[163] Dr. H.B.Kekre , Archana Athawale, Swarnalata Rao and
Uttara Athawale , “Information Hiding in Audio Signals”,
International Journal of Computer Applications (IJCA), Vol. 7
No. 9, 14-19 October 2010
Information Hiding in Image and Audio Files 2007-2010
282
[164] Dr. H.B.Kekre , Archana Athawale, Swarnalata Rao and
Uttara Athawale , “Increasing the Capacity of the Cover
Audio Signal by Using Multiple LSB‟s for Information Hiding”,
presented at the 3rd IEEE International Conference on
Emerging Trends in Engineering and Technology (ICETET),
19-21 Nov 2010.
[165] Khalid Sayood , “Introduction to Data Compression”, 2nd
edition 2005, Published by Harcourt India Private Limited