References
- D. Artz, "Digital Steganography: Hiding Data Within Data," IEEE Internet Computing, Vol. 5, No.3, pp. 75-80, 2001. https://doi.org/10.1109/4236.935180
- R.Z.Wang, C.F. Lin, and J.C. Lin, "Image Hiding by Optimal LSB Substitution and Genetic Algorithm," Pattern Recognition, Vol.34, No.3, pp. 671-683, 2001. https://doi.org/10.1016/S0031-3203(00)00015-7
- C.C. Chang, Y.H. Yu, and Y.C. Hu, "Hiding Secret Data in Images Via Predictive Coding," Pattern Recognition, Vol.38, No.5, pp. 691-705, 2005. https://doi.org/10.1016/j.patcog.2004.11.006
- Y.C. Hu, "High Capacity Image Hiding Scheme Based on Vector Quantization," Pattern Recognition, Vol.39, No.9, pp. 1715-1724, 2006. https://doi.org/10.1016/j.patcog.2006.02.005
- C.L Liu and S.R Liao, "High-Performance JPEG Steganography using Complementary Embedding Strategy," Pattern Recognition, Vol. 41, No.9, pp. 2945-2966, 2008. https://doi.org/10.1016/j.patcog.2008.03.005
- M.U. Celik, G. Sharma, A.M. Tekalp., and E. Saber, "Reversible Data Hiding," Proc. of International Conference on Image Processing, Rochester, NY, USA, Vol.2, pp. 157-160, September 24, 2002.
- J. Tian, "Wavelet-based Reversible Watermarking for Authentication," Proc. Security and Watermarking of Multimedia Contents IV, Electronic Imaging 2002, Vol.4675, pp. 679-690, 2002.
- J. Tian, "Reversible Watermarking by Difference Expansion," Proc. of Workshop on Multimedia and Security, pp. 19-22, 2002.
- H.C. Wu, C.C. Lee, C.S. Tsai, Y.P. Chu, and H.R. Chen, "A High Capacity Reversible Data Hiding Scheme with Edge Prediction and Difference Expansion," The Journal of Systems and Software, Vol.82, No.12, pp. 1966-1973, 2009. https://doi.org/10.1016/j.jss.2009.06.056
- H.C. Wu, H.C. Wang, C.S. Tsai, and C.M. Wang, "Reversible Image Steganographic Scheme Via Predictive Coding," Displays, Vol.31, No.1, pp. 35-43, 2010. https://doi.org/10.1016/j.displa.2009.10.002
- Y.C. Li, C.M. Yeh, and C.C. Chang, "Data Hiding Based on the Similarity Between Neighboring Pixels with Reversibility," Digital Signal Processing, Vol.20, Issue4, pp. 1116-1128, 2010. https://doi.org/10.1016/j.dsp.2009.10.025
- Z. Ni, Y.U. N.Q. Shi, N. Ansari, and W.E.I. Su, "Reversible Data Hiding," IEEE Transactions on Circuits and Systems for Video Technology, Vol.16, No.3, pp. 354-362, 2006. https://doi.org/10.1109/TCSVT.2006.869964
- P. Tsai, Y.C. Hu, and H.L. Yeh, "Reversible Image Hiding Scheme using Predictive Coding and Histogram Shifting," Signal Processing, Vol.89, No.6, pp. 1129-1143, 2009. https://doi.org/10.1016/j.sigpro.2008.12.017
- D.S. Kim, G.J. Lee, and K.Y. Yoo, "A Reversible Image Scheme Using Novel Linear Prediction Coding and Histogram Shifting," The 2011 International Conference on Security & Management, pp. 282-287, 2011.
- I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Vol.1. Morgan Kaufmann, 2 edition, 2008.
- S.H, Bae, "A High Capacity Reversible Watermarking Using Histogram Shifting", Journal of Korea Multimedia Society, Vol. 13, No. 1, pp. 76-82, 2010.
Cited by
- Data Hiding Using Pixel-Value Modular Operation vol.18, pp.4, 2015, https://doi.org/10.9717/kmms.2015.18.4.483
- A Data Hiding Scheme for Grayscale Images Using a Square Function vol.17, pp.4, 2014, https://doi.org/10.9717/kmms.2014.17.4.466
- Study of Information Hiding Methods for SONAR Images in the Naval Combat System vol.18, pp.6, 2015, https://doi.org/10.9766/KIMST.2015.18.6.779
- A Key Exchange Protocol based on the Steganography with the QR code vol.50, pp.6, 2013, https://doi.org/10.5573/ieek.2013.50.6.173
- 함정 전투체계 군사영상 특성에 기반한 하이브리드 정보은닉 기법 vol.19, pp.9, 2012, https://doi.org/10.9717/kmms.2016.19.9.1669