References
- I. Cox, M. Miller, J. Bloom, J. Fridrich and T. Kalker, "Digital Watermarking and Steganography," Morgan Kaufmann Publishers Inc., San Francisco, CA, 2007.
- H.-Y. Lee, H. Kim, and H.-K. Lee, "Robust image watermarking using local invariant features," Optical Engineering, Vol.45. No.3, 2006.
- S.Y. Choi, H.-Y. Lee, I. K. Kang, and H.-K. Lee, "Video Fingerprinting System through Zero-based Code Modulation Technique," 한국정보처리학회 논문지, Vol.12-B(4), pp.443-450, 2005. https://doi.org/10.3745/KIPSTB.2005.12B.4.443
- K.-S. Kim, M.-J. Lee, H.-Y. Lee and H.-K. Lee, "Reversible data hiding exploiting spatial correlation between subsampled images," Pattern Recognition, Vol.42, No.11, pp.3083-3096, 2009. https://doi.org/10.1016/j.patcog.2009.04.004
- C.D. Vleeschouwer, J.-F. Delaigle, and B. Macq, "Circular interpretation of Bijective transformations in lossless watermarking for media asset management," IEEE Trans. on Multimedia, Vol.5, No.1, pp. 97-105, 2003. https://doi.org/10.1109/TMM.2003.809729
- J. Fridrich, J. Goljan and R. Du, "Invertible authentication," Proc. of the SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, Vol.4314, pp.197-208, 2001.
- M.U. Celik, G. Sharma, A.M. Tekalp and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. on Image Processing, Vol.14, No.2, pp.253-266, 2005. https://doi.org/10.1109/TIP.2004.840686
- J.Y. Kim, H.-Y. Lee, D.-H. Im, S.-J. Ryu, J.-H. Choi, and H.-K. Lee, "Print-Scan Resilient Curve Watermarking using B-Spline Curve Model and Its 2D Mesh Spectral Transform," 한국정보처리학회 논문지, Vol.15-B(4), pp.307-314, 2008. https://doi.org/10.3745/KIPSTB.2008.15-B.4.307
- B. Yang, M. Schmucker, C.B.W. Funk and S. Sun, "Integer DCT-based reversible watermarking for images using compounding technique," Proc. of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, Vol.5306, pp.405-415, 2004.
- G. Xuan, Q. Yao, C. Yang, J. Gao, P. Chai, Y.Q. Shi and Z. Ni, "Lossless data hiding using histogram shifting method based on integer wavelets," International Workshop on Digital Watermarking, Lecture Notes in Computer Science, Vol.4283, pp.323-332, 2006.
- S. Lee, C.D. Yoo and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Trans. on Information Forensics and Security, Vol.2, No.3, pp.321-330, 2007. https://doi.org/10.1109/TIFS.2007.905146
- J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. on Circuits and Systems for Video Technology, Vol.13, No.8, pp.890-896, Aug. 2003. https://doi.org/10.1109/TCSVT.2003.815962
- A.M. Alattar, "Reversible watermark using difference expansion of triplets," Proc. of the IEEE International Conference on Image Processing, Vol.1, pp.501-504, 2003.
- A.M. Alattar, "Reversible watermark using difference expansion of quads," Proc. of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol.3, pp.377-380, 2004.
- A.M. Alattar, "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Trans. on Image Processing, Vol.13, No.8, pp.1147-1156, 2004. https://doi.org/10.1109/TIP.2004.828418
- L. Kamstra and H.J.A.M. Heijmans, "Reversible data embedding into images using wavelet techniques and sorting," IEEE Trans. on Image Processing, Vol.14, No.12, pp.2082-2090, 2005. https://doi.org/10.1109/TIP.2005.859373
- D.M. Thodi and J.J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. on Image Processing, Vol.16, No.3, pp.721-730, 2007. https://doi.org/10.1109/TIP.2006.891046
- Z. Ni, Y.-Q. Shi, N. Ansari and W. Su, "Reversible data hiding," IEEE Trans. on Circuits and Systems for Video Technology, Vol.16, No.3, pp.354-362, 2006. https://doi.org/10.1109/TCSVT.2006.869964
- J.H. Hwang, J.W. Kim and J.U. Choi, "A reversible watermarking based on histogram shifting," International Workshop on Digital Watermarking, Lecture Notes in Computer Science, Vol.4283, pp.348-361, 2006.
- W.-C. Kuo, D.-J. Jiang and Y.-C. Huang, "Reversible data hiding based on histogram," International Conference on Intelligent Computing, Lecture Notes in Artificial Intelligence, Vol.4682, pp.1152-1161, 2007.
- S.-K. Lee, Y.-H. Suh and Y.-S. Ho, "Lossless data hiding based on histogram modification of difference images," Pacific Rim Conference on Multimedia, Lecture Notes in Computer Science, Vol.3333, pp.340-347, 2005.
- C.-C. Lin, W.-L. Tai and C.-C. Chang, "Multilevel reversible data hiding based on histogram modification of difference images," Pattern Recognition, Vol.41, No.12, pp.3582-3591, 2008. https://doi.org/10.1016/j.patcog.2008.05.015
- P. Tsai, Y.-C. Hu and H.-L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Processing, Vol.89, No.6, pp.1129-1143, 2009. https://doi.org/10.1016/j.sigpro.2008.12.017
- C.W. Honsinger, P. Jones, M. Rabbani and J.C. Stoffel, "Lossless recovery of an original image containing embedded data," US Patent application, Docket No: 77102/E-D, 1999.
- "JBIG-KIT lossless image compression library," (online), Available: {http://www.cl.cam.ac.uk/~mgk25/jbigkit/}.
- "USC-SIPI Image Database - Miscellaneous," Available: {http://sipi.usc.edu/database/database.cgi?volume=misc}.