Table of Contents
Table of Contents
Preface
Chapter 1. Data Hiding for Binary Images
(Cheonshik Kim, Department of Computer Science, Sejong University, Republic of Korea)
Chapter 2. Reversible Data Hiding Scheme for Halftone Images
(Pei-Feng Shiu, Jinn-Ke Jan and Chia-Chen Lin, Department of Computer Science and Engineering, National Chung Hsing University, Taichung, Taiwan, and others)
Chapter 3. Reversible Data Hiding Schemes for JPEG Images
(Yongdong Wu, Cryptography and Security Department, Institute for Infocomm Research, Singapore)
Chapter 4. Lossless Data Hiding Based on VQ
(Xing-Tian Wang, Zhi-Hui Wang, Chin-Chen Chang and Ming-Chu Li, School of Software, Dalian University of Technology, Dalian, Liaoning, China, and others)
Chapter 5. A High Quality Steganographic Scheme with Pixel-Value Differencing
(Ching-Nung Yang, Wen-Chung Kuo and Shih-Han Chang, Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan, and others)
Chapter 6. Reversible Data Hiding Based on Histogram Technique
(Dao-Shun Wang, Yi Liu, Song Liu, Xing-Fu Xu and Shun-Dong Li, Department of Computer Science and Technology, Tsinghua University, Beijing, China, and others)
Chapter 7. Steganography in Script Files
(Chuan Qin, Chin-Chen Chang and Ting-Yu Lin, School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China, and others)
Chapter 8. The State-of-the-Art Steganography for 3D Meshes
(Wen-Kai Tai, Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan)
Chapter 9. Steganalysis Algorithm for Detecting the Hidden Information in Images
(Jing-Ming Guo and Thanh-Nam Le, Department of Electrical Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan)
Chapter 10. SVD-based Digital Image Watermarking
(Cheng Yang and Tong-tong Liu, Information Engineering School, Communication, University of China, Chaoyang, Beijing, China, and others)
Chapter 11. Robust SVD-DCT Domain Image Watermarking
(Yu-Xin Su and Zhe-Ming Lu, School of Aeronautics and Astronautics,
Zhejiang University, Hangzhou, Zhejiang, China)
Chapter 12. Fragile Watermarking for Content Authentication with Tamper Localization
(Jing-Ming Guo, Tsair Kao, Chih-Hsien Hsia and Yun-Fu Liu, Department of Electrical Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan and others)
Chapter 13. Multiple Watermarking Using Discrete Wavelet Transform
(Jiafa Mao and Yixian Yang, School of Computer Science and Technology,
ZheJiang University of Technology, China, and others)
Chapter 14. Semi-Fragile Watermarking Schemes for H.264 Video
(Jiafa Mao and Yixian Yang, School of Computer Science and Technology,
University of Technology, China, and others)
Chapter 15. Image Watermarking using Visual Cryptography
(Stelvio Cimato, Dipartimento di Informatica, Universita degli Studi di Milano, Italy)
Index