References
- J.M. Guo, "Watermarking in dithered halftone images with embeddable cells selection and inverse halftoning," Signal Processing, vol.88, pp.1496-1510, 2008. https://doi.org/10.1016/j.sigpro.2007.12.015
- J.S. Pan, H. Luo, & Z.H. Lu, "Look-up Table Based Reversible Data Hiding for Error Diffused Halftone Images," INFORMATICA, vol.18, pp.615-628, 2007. http://130.203.133.150/viewdoc/summary?doi=10.1.1.137.9784
- H.W. Tseng & C.C. Chang, "Hiding data in halftone images," INFORMATICA, vol.16, pp.419-430. 2005. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.9075
- R.W. Floyd & L. Steinberg, "An adaptive algorithm for spatial grey scale," Proceedings of the Society of Information Display, vol.17, pp.75-77, 1976. http://en.wikipedia.org/wiki/Floyd%E2%80%93Steinberg_dithering
- R. Ulichney, "A Review of Halftoning Techniques," in Proc. of SPIE - The International Society for Optical Engineering, vol.3963, 2000. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.41.6726
- R.M. Chao, Y.A. Ho, & Y.P. Chu, "Data Hiding Scheme Using Covering Codes in Halftone Images Based on Error Diffusion," in Proc. of Asia-Pacific Services Computing Conference, APSCC, vol.1, pp. 1483-1488, 2008.
- M.S. Fu & O.C. Au, "Data Hiding Watermarking for Halftone Images," IEEE Transaction on Image Processing, vol.11, pp.477-484, 2002. https://doi.org/10.1109/TIP.2002.999680
- Y.-C. Tseng & H.-K. Pan, "Secure and Invisible Data Hiding in 2-Color Images," in Proc. of Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies INFOCOM 2001., vol.3, pp. 887-896, 2001.
- Y. Chen, H. Pan, & Y. Tseng, "A secure data hiding scheme for two-color images," in Proc. of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), vol. 1, pp. 750-755, 2000.
- R.Y.M. Li, O.C. Au, C.K.M. Yuk, S.K. Yip, & S.Y. Lam, "Halftone Image Data Hiding with Block-Overlapping Parity Check," Acoustics, Speech and Signal Processing, 2007. ICASSP 2007, vol.2, pp.193-196, 2007.
- S.K. Yip, O.O. Au, C.W. Ho, & H.M. Wong, "PI-preserve data hiding for halftone image," Intelligent Signal Processing and Communication Systems, 2005. ISPACS 2005., vol.1 pp.125-128, 2005.
- C. Kim, D.K. Shin, & D.I. Shin, "Data Hiding in a Halftone Image Using Hamming Code (15, 11)," Lecture Notes in Computer Science, vol.6592, pp.372-381, 2011.
- R. C. Gonzalez & R E. Woods, "Digital Image Processing, 2nd Edition," Prentice-Hall, Inc. 2002. http://www.amazon.com/Digital-Image-Processing-2nd-Edition/dp/0201180758
- C. Qin, C. C. Chang & P. L. Tsou, "Perceptual Image Hashing Based on the Error Diffusion Halftone Mechanism," International Journal of Innovative Computing, Information and Control, vol.8, no. 9, pp. 6161-6172, 2012. http://www.ijicic.org/ijicic-11-05009.pdf
- C. Qin, Z. H. Wang, C. C. Chang, & K. N. Chen, "Reversible Data Hiding Scheme Based on Image Inpainting," Fundamenta Informaticae, vol.120, no. 1, pp. 59-70, 2012.
- Z. Zhao, H. Luo, Z.M. Lu, & J.S. Pan, "Reversible Data Hiding Based on Multilevel Histogram Modification and Sequential Recovery," International Journal of Electronics and Communications, vol.65, no. 10, pp. 814-826, 2011. https://doi.org/10.1016/j.aeue.2011.01.014
- C.Y. Yang, C.H. Lin, & W.C. Hu, "Reversible Data Hiding by Adaptive IWT-coefficient Adjustment," Journal of Information Hiding and Multimedia Signal Processing, vol.2, no. 1, pp. 24-32, 2011. http://bit.kuas.edu.tw/-jihmsp/2011/vol2/JIH-MSP-2011-02-002.pdf
- P. Tsai, Y. C. Hu, & H.L. Yeh, "Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting," Signal Processing, vol.89, no. 6, pp.1129-1143, 2009. https://doi.org/10.1016/j.sigpro.2008.12.017
- M.S. Fu & O.C. Au, "Hiding data in halftone image using modified data hiding error diffusion," in Proc. SPIE Visual Communications and Image Processing, vol.4067, pp.1671-1680, 2000.
- C.W. Wu, "Multimedia data hiding and authentication via halftoning and coordinate projection," EURASIP Journal on Advances in Signal Processing, vol.2, pp. 143-151, 2002.
- H.Y. Kim & A. Afif, "A secure authentication watermarking for halftone and binary images," International Journal of Imaging Systems and Technology, vol.14, pp. 147-152, 2004. https://doi.org/10.1002/ima.20018
- S.C. Pei, J.M. Guo, & H. Lee, "Novel robust watermarking techniques in dithering halftone images," IEEE Signal Processing Letters, vol.12, no.4, pp. 333-336, 2005. https://doi.org/10.1109/LSP.2004.842295
- S.C. Pei & J.M. Guo, "Data hiding in halftone images with noise-balanced error diffusion," IEEE Signal Processing Letters, vol.10, no.2, pp. 349-351, 2003. https://doi.org/10.1109/LSP.2003.817856
Cited by
- Data Hiding Based on BTC using EMD vol.14, pp.2, 2013, https://doi.org/10.7236/jiibc.2014.14.2.11
- Lossless data hiding for absolute moment block truncation coding using histogram modification vol.14, pp.1, 2013, https://doi.org/10.1007/s11554-016-0641-8
- Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP vol.14, pp.1, 2013, https://doi.org/10.1007/s11554-017-0674-7