1 W. C. Kuo., "The high embedding steganographic method based on general multi-EMD" 286-289, 2012
2 J. Mie i ainen., "LSB matching revisited" 13 (13): 285-287, 2006
3 F. A. P. Petitcolas., "In ormation hiding-a surve" 87 (87): 1062-1078, 1999
4 C. S. Kim., "Im roved steganographic embedding exploiting modification direction in multimedia communications" Springer 130-138, 2011
5 X. Zhang., "E icient steganogrra hic embedding b ex oiting modi i-cation" 10 (10): 781-783, 2006
6 L. F. Turner., "Digita data securit s stem"
7 J. Fridrich., "Detecting steganogra h in co or and gra sca e images" 8 (8): 22-28, 2001
8 W. C. Kuo., "Data hiding based on generalized exploiting modification direction method" 2012
9 K. Y. Lin., "Data hiding b exploiting modification direction technique using o tima ixe grou ing" 3 : 121-123, 2010
10 D. Stinson, "Cryptography: Theory and Practice" CRC Press 1995
1 W. C. Kuo., "The high embedding steganographic method based on general multi-EMD" 286-289, 2012
2 J. Mie i ainen., "LSB matching revisited" 13 (13): 285-287, 2006
3 F. A. P. Petitcolas., "In ormation hiding-a surve" 87 (87): 1062-1078, 1999
4 C. S. Kim., "Im roved steganographic embedding exploiting modification direction in multimedia communications" Springer 130-138, 2011
5 X. Zhang., "E icient steganogrra hic embedding b ex oiting modi i-cation" 10 (10): 781-783, 2006
6 L. F. Turner., "Digita data securit s stem"
7 J. Fridrich., "Detecting steganogra h in co or and gra sca e images" 8 (8): 22-28, 2001
8 W. C. Kuo., "Data hiding based on generalized exploiting modification direction method" 2012
9 K. Y. Lin., "Data hiding b exploiting modification direction technique using o tima ixe grou ing" 3 : 121-123, 2010
10 D. Stinson, "Cryptography: Theory and Practice" CRC Press 1995
11 F. M. J. Willems., "Capacity and codes for embedding information in gray-scale signals" 51 (51): 1209-1214, 2005
12 C. F. Lee., "An improvement of EMD embedding method for large payloads by pixel segmentation strateg" 26 (26): 1670-1676, 2008
13 T. Shar., "An im ementation o e -based digita signa steganogra h" Springer 13-26, 2001
14 Chi-Shiang Chan, "An Image Hiding Scheme by Linking Pixels in the Circular Way" 한국인터넷정보학회 6 (6): 1718-1734, 2012
15 C. F. Lee., "A steganographic method with high embedding capacity by improving exploiting modification direction" 1 : 497-500, 2007
16 X. Liao., "A steganogra hic method or digita images with four-ixe di erencing and modi ied LSB substitution" 22 (22): 1-8, 2011
17 X. T. Wang., "A nove mu ti-group exploiting modi ication direction method based on switch ma" 92 (92): 1525-1535, 2012
18 R. L. Rivest., "A method or obtaining digita signatures and public-e cr tos stems" 21 (21): 120-126, 1978
19 W. C. Kuo., "A data hiding scheme with high embedding capacity based on general improving exploiting modification direction method" 69-73, 2009