Crandall's problem, unpublished, available from http, 1998. ,
A High Payload Steganographic Scheme based on (7,4) Hamming Code for Digital Images, Electronic Commerce and Security 2008 Symposium, pp.16-21, 2008. ,
DOI : 10.1109/isecs.2008.222
A secure of data hiding scheme for two-color images, IEEE symposium on computers and communications, 2000. ,
Data Hiding in a Halftone Image Using Hamming Code (15, 11), ACIIDS 2011, LNAI 6592, pp.372-381, 2011. ,
DOI : 10.1109/LCOMM.2007.070438
Some notes on steganography. Posted on steganography mailing list http, 1998. ,
Information hiding by coverings, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674), pp.151-154, 2004. ,
DOI : 10.1109/ITW.2003.1216717
Constructing good covering codes for applications in Steganography, Transactions on Data Hiding and Multimedia Security III, Lecture Notes in Computer Science, vol.4920, pp.1-22, 2008. ,
A novel data hiding scheme based on modulus function, Journal of Systems and Software, vol.83, issue.5, pp.832-843, 2010. ,
DOI : 10.1016/j.jss.2009.12.018
El Mamoun SOUIDI, A Novel Steganographic Protocol from Errorcorrecting Codes, Journal of Information Hiding and Multimedia Signal Processing 2010 ISSN 2073-4212. Ubiquitous International, 2010. ,
An optimum nonlinear code, Information and Control, vol.11, issue.5-6, pp.613-616, 1967. ,
DOI : 10.1016/S0019-9958(67)90835-2
URL : http://doi.org/10.1016/s0019-9958(67)90835-2
On the Maximality of Secret Data Ratio in CPTE Schemes ACIIDS (1) 2011, LNCS/LNAI series 2011, pp.88-99 ,
Covering Codes, 1994. ,
Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes, IH 2008, pp.60-71, 2008. ,
DOI : 10.1109/TIT.2003.810639
Information Hiding, 4th InternationalWorkshop, pp.289-302, 2001. ,
Anovel data embedding method for two-color fascimile images, Proceedings of international symposium on multimedia information processing. Chung-Li, 1998. ,
Analysis of Parity Assignment Steganography in Palette Images, KES 2005, LNAI 3683, pp.1025-1031, 2005. ,
DOI : 10.1007/11553939_144
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security, Pattern Recognition Letters, vol.25, issue.3, pp.331-339, 2004. ,
DOI : 10.1016/j.patrec.2003.10.014