References
- F.Y. Shih, Digital Watermarking and Steganography: Fundamentals and Techniques, FL, USA: CRC Press, 2008.
- I.J. Cox et al., Digital Watermarking and Steganography, 2nd ed., MA, USA: Morgan Kaufmann, 2008.
- W.J. Chen, C.C. Chang, and T.H.N. Le, "High Payload Steganography Mechanism Using Hybrid Edge Detector," Expert Syst. Appl., vol. 37, no. 4, Apr. 2010, pp. 3292-3301. https://doi.org/10.1016/j.eswa.2009.09.050
- Z.G. Qu et al., "Novel Quantum Steganography with Large Payload," Optics Commun., vol. 283, no. 23, 2010, pp. 4782-4786. https://doi.org/10.1016/j.optcom.2010.06.083
- Y.T. Pai and S.J. Ruan, "A High Quality Robust Digital Qatermarking by Smart Distribution Technique and Effective Embedded Scheme," IEICE Trans. Fundamentals, vol. E90-A, no. 3, 2007, pp. 597-605. https://doi.org/10.1093/ietfec/e90-a.3.597
- C.Y. Yang et al., "A Simple Digital Watermarking by the Adaptive Bit-Labeling Scheme," Int. J. Innovative Computing, Inf. Control, vol. 6, no. 3, 2010, pp. 1401-1410.
- J. Tian, "Reversible Data Embedding Using a Difference Expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, 2003, pp. 890-896. https://doi.org/10.1109/TCSVT.2003.815962
- A.M. Alattar, "Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform," IEEE Trans. Image Process., vol. 13, no. 8, 2004, pp. 1147-1156. https://doi.org/10.1109/TIP.2004.828418
- S. Weng et al., "Reversible Watermarking Based on Invariability and Adjustment on Pixels Pairs," IEEE Signal Process. Lett., vol. 15, 2008, pp. 721-724. https://doi.org/10.1109/LSP.2008.2001984
- Y. Hu, H.K. Lee, and J. Li, "DE-Based Reversible Data Hiding with Improved Overflow Location Map," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 2, 2009, pp. 250-260. https://doi.org/10.1109/TCSVT.2008.2009252
- Z. Ni et al., "Reversible Data Hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, 2006, pp. 354-362. https://doi.org/10.1109/TCSVT.2006.869964
- C.C. Lin, W.L. Tai, and C.C. Chang, "Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images," Pattern Recognition, vol. 41, no. 12, 2008, pp. 3582-3591. https://doi.org/10.1016/j.patcog.2008.05.015
- W.L. Tai, C.M. Yeh, and C.C. Chang, "Reversible Data Hiding Based on Histogram Modification of Pixel Differences," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, 2009, pp. 906- 910. https://doi.org/10.1109/TCSVT.2009.2017409
- K.S. Kim et al., "Reversible Data Hiding Exploiting Spatial Correlation between Sub-Sampled Images," Pattern Recognition, vol. 42, no. 11, 2009, pp. 3083-3096. https://doi.org/10.1016/j.patcog.2009.04.004
- H.W. Yang, K.F. Hwang, and S.S. Chou, "Interleaving Max-Min Difference Histogram Shifting Data Hiding Method," J. Software, vol. 5, no. 6, 2010, pp. 615-621.
- D.M. Thodi and J. Rodriguez, "Expansion Embedding Techniques for Reversible Watermarking," IEEE Trans. Image Process., vol. 16, no. 3, 2007, pp. 721-730. https://doi.org/10.1109/TIP.2006.891046
- P. Tsai, Y.C. Hu, and H.L. Yeh, "Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting," Signal Process., vol. 89, no. 6, 2009, pp. 1129-1143. https://doi.org/10.1016/j.sigpro.2008.12.017
- C.H. Yang and M.H. Tsai, "Improving Histogram-Based Reversible Data Hiding by Interleaving Predictors," IET Image Process., vol. 4, no. 4, 2010, pp. 223-234. https://doi.org/10.1049/iet-ipr.2009.0316
- C.F. Lee, H.L. Chen, and H.K. Tso, "Embedding Capacity Raising in Reversible Data Hiding Based on Prediction of Different Expansion," J. Syst. Software, vol. 83, no. 10, 2010, pp. 1864-1872. https://doi.org/10.1016/j.jss.2010.05.078
- Z. Ni et al., "Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication," IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 4, 2008, pp. 497-509. https://doi.org/10.1109/TCSVT.2008.918761
- X.T. Zeng, L.D. Ping, and X.Z. Pan, "A Lossless Data Hiding Scheme," Pattern Recognition, vol. 43, no. 4, 2010, pp. 1656- 1667. https://doi.org/10.1016/j.patcog.2009.09.016
- M. Awrangjeb and M.S. Kankanhalli, "Lossless Watermarking Considering the Human Visual System," Lecture Notes Comput. Sci., vol. 2939, 2004, pp. 329-336.
- M. Awrangjeb and M.S. Kankanhalli, "Reversible Watermarking Using a Perceptual Model," J. Electron. Imaging, vol. 14, no. 1, 2005, pp. 013014-1-8. https://doi.org/10.1117/1.1877523
- P.G. Howard et al., "The Emerging JBIG2 Standard," IEEE Trans. Circuits Syst. Video Technol., vol. 8, no. 7, 1998, pp. 838-848. https://doi.org/10.1109/76.735380
Cited by
- High-Quality and Robust Reversible Data Hiding by Coefficient Shifting Algorithm vol.34, pp.3, 2011, https://doi.org/10.4218/etrij.12.0111.0312
- Reversible Data Hiding Using Two Marked Images Based on Adaptive Coefficient-Shifting Algorithm vol.2012, pp.None, 2011, https://doi.org/10.1155/2012/473896
- Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion vol.66, pp.2, 2011, https://doi.org/10.1007/s11227-013-0896-9
- High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting vol.72, pp.1, 2011, https://doi.org/10.1007/s11042-013-1369-0
- 히스토그램 이동과 차분을 이용한 가역 비밀 이미지 공유 기법 vol.17, pp.7, 2014, https://doi.org/10.9717/kmms.2014.17.7.849
- Reversible Binary Image Watermarking Method Using Overlapping Pattern Substitution vol.37, pp.5, 2011, https://doi.org/10.4218/etrij.15.0114.1058