References
- J. Tian, "Reversible Data Embedding Using a Difference Expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, Aug. 2003, pp. 890-896. https://doi.org/10.1109/TCSVT.2003.815962
- Z. Ni et al., "Reversible Data Hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, Mar. 2006, pp. 354-362. https://doi.org/10.1109/TCSVT.2006.869964
- H.J. Kim et al., "A Novel Difference Expansion Transform for Reversible Data Embedding," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, 2008, pp. 456-465. https://doi.org/10.1109/TIFS.2008.924600
- V. Sachnev et al., "Reversible Watermark Algorithm Using Sorting and Prediction," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, July 2009, pp. 989-999. https://doi.org/10.1109/TCSVT.2009.2020257
- C.-Y. Yang and W.-C. Hu, "High-Performance Reversible Data Hiding with Overflow/Underflow Avoidance," ETRI J., vol. 33, no. 4, Aug. 2011, pp. 580-588. https://doi.org/10.4218/etrij.11.0110.0534
- S. Kang, H.J. Hwang, and H.J. Kim, "Reversible Watermark Using an Accurate Predictor and Sorter Based on Payload Balancing," ETRI J., vol. 34, no. 3, June 2012, pp. 410-420. https://doi.org/10.4218/etrij.12.0111.0075
- H.-K. Pan, Y.-Y. Chen, and Y.-C. Tseng, "A Secure Data Hiding Scheme for Two-Color Images," IEEE Symp. Comput. Commun., Antibes, France, July 4-6, 2000, pp. 750-755.
- Y.-C. Tseng and H.-K. Pan, "Data Hiding in 2-Color Images," IEEE Trans. Comput., vol. 51, no. 7, July 2002, pp. 873-878. https://doi.org/10.1109/TC.2002.1017706
- M. Wu, E. Tang, and B. Lin, "Data Hiding in Digital Binary Image," IEEE Int. Conf. Multimedia Expo, New York, USA, Aug. 1-3, 2000, pp. 393-396.
- M. Wu, "Multimedia Data Hiding," Ph.D. dissertation, Dept. Electr. Eng., Princeton Univ., Princeton, NJ, USA, Apr. 2001.
- M. Wu and B. Liu, "Data Hiding in Binary Images for Authentication and Annotation," IEEE Trans. Multimedia, vol. 6, no. 4, Aug. 2004, pp. 528-538. https://doi.org/10.1109/TMM.2004.830814
- H. Yang and A.C. Kot, "Data Hiding for Text Document Image Authentication by Connectivity-Preserving," IEEE Int. Conf. Acoust., Speech, Signal Process., Philadelphia, PA, USA, vol. 2, Mar. 18-23, 2005, pp. 505-508.
- H. Yang and A.C. Kot, "Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving," IEEE Trans. Multimedia, vol. 9, no. 3, Apr. 2007, pp. 475-486. https://doi.org/10.1109/TMM.2006.887990
- H. Yang and A.C. Kot, "Binary Image Authentication with Tampering Localization by Embedding Cryptographic Signature and Block Identifier," IEEE Signal Process. Lett., vol. 13, no. 12, Dec. 2006, pp. 741-744. https://doi.org/10.1109/LSP.2006.879829
- Y. Lee, H. Kim, and Y. Park, "A New Data Hiding Scheme for Binary Image Authentication with Small Image Distortion," Inf. Sci., vol. 179, no. 22, Nov. 2009, pp. 3866-3884. https://doi.org/10.1016/j.ins.2009.07.014
- J. Cheng and A.C. Kot, "Objective Distortion Measure for Binary Text Image Based on Edge Line Segment Similarity," IEEE Trans. Image Process., vol. 16, no. 6, June 2007, pp. 1691-1695. https://doi.org/10.1109/TIP.2007.896619
- C.-H. Tzeng and W.-H. Tsai, "A New Approach to Authentication of Binary Images for Multimedia Communication with Distortion Reduction and Security Enhancement," IEEE Commun. Lett., vol. 7, no. 9, Sept. 2003, pp. 443-445. https://doi.org/10.1109/LCOMM.2003.815656
- H. Yang, A.C. Kot, and S. Rahardja, "Orthogonal Data Embedding for Binary Images in Morphological Transform Domain: A High-Capacity Approach," IEEE Trans. Multimedia, vol. 10, no. 3, Apr. 2008, pp. 339-351. https://doi.org/10.1109/TMM.2008.917404
- C.-L. Tsai et al., "Reversible Data Hiding and Lossless Reconstruction of Binary Images Using Pair-Wise Logical Computation Mechanism," Pattern Recogn., vol. 38, no. 11, Nov. 2005, pp. 1993-2006. https://doi.org/10.1016/j.patcog.2005.03.001
- Y.-A. Ho et al., "High-Capacity Reversible Data Hiding in Binary Images Using Pattern Substitution," Comput. Standards Interfaces, vol. 31, no. 4, June 2009, pp. 787-794. https://doi.org/10.1016/j.csi.2008.09.014
- G.R. Robertson, M.F. Aburdene, and R.J. Kozick, "Differential Block Coding of Bilevel Images," IEEE Trans. Image Process., vol. 5, no. 9, Sept. 1996, pp. 1368-1370. https://doi.org/10.1109/83.535849
- K. Dong and H.-J. Kim, "An Efficient Pattern Substitution Watermarking Method for Binary Images," Int. Workshop Digital Watermarking, Seoul, Rep. of Korea, vol. 6526, Oct. 1-3, 2010, pp. 181-188.
- G. Xuan et al., "Reversible Binary Image Data Hiding by Run-Length Histogram Modification," Int. Conf. Pattern Recogn., Tampa, FL, USA, Dec. 8-11, 2008, pp. 1-4.
- W.M. Zhang, B. Chen, and N.H. Yu, "Improving Various Reversible Data Hiding Schemes via Optimal Codes for Binary Covers," IEEE Trans. Image Process., vol. 21, no. 6, 2012, pp. 2991-3003. https://doi.org/10.1109/TIP.2012.2187667
- W.M. Zhang, B. Chen, and N.H. Yu, "Capacity-Approaching Codes for Reversible Watermarking," Int. Conf. Inf. Hiding, Prague, Czech Republic, May 18-20, 2011, pp. 255-269.
Cited by
- Data Hiding in Binary Image with High Payload vol.43, pp.12, 2015, https://doi.org/10.1007/s13369-018-3130-5