1 |
H. C. Huang, C. M. Chu, and J. S. Pan, "The optimized copyright protection system with genetic watermarking," Soft Computing, Vol. 13, No. 4, pp. 333-343, Feb. 2009.
DOI
|
2 |
Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp. 354-362, March 2006.
DOI
|
3 |
Y. C. Li, C. M. Yeh, and C. C. Chang, "Data hiding based on the similarity between neighboring pixels with reversibility," Digital Signal Processing, Vol. 20, No. 4, pp. 1116-1128, July 2010.
DOI
|
4 |
C. L. Tsai, K. C. Fan, C. D. Chung, and T. C. Chuang, "Reversible and lossless data hiding with application in digital library," Proc. 38th Annual 2004 Int. Canahan Conf. on Security Technology, pp. 226-232, Albuquerque, New Mexico, USA, Oct. 2004.
|
5 |
M. U. Celik, G. Sharma, A. M. Tekalp, E Saber, "Reversible data hiding," Proc. 2002 Intl. Conf. on Image Processing, Vol 3, pp. 157-160, Rochester, New York, USA, Sep. 2002.
|
6 |
C. C. Chang, Y. P. Hsieh, and C. Y. Lin, "Lossless data embedding with high embedding capacity based on declustering for VQ-compressed images," IEEE Trans. on Information Forensics and Security, Vol. 12, No. 3, pp. 341-349, Oct. 2007.
|
7 |
C. C. Chang, C. C. Lin, and Y. S. Hu, "An SVD oriented watermark embedding scheme with high qualities for the restored images," International Journal of Innovative Computing Information and Control, Vol. 3, No. 3, pp. 609-620, June 2007.
|
8 |
C. C. Chang, W. L. Tai, and C. C. Lin, "A reversible data hiding scheme based on side match vector quantization," IEEE Trans. on Circuits and Systems for Video Technology, Vol. 16, No. 10, pp. 1301-1308, Oct. 2006.
DOI
|
9 |
M. Fallahpour and M.H. Sedaaghi, "High capacity lossless data hiding based on histogram modification," IEICE Electronics Express, Vo. 4, No. 7, pp. 205-210, April 2007.
DOI
|
10 |
L. Kamstra, H.J.A.M. Heijmans, "Reversible data embedding into images using wavelet techniques and sorting," IEEE Trans. on Image Process, Vol. 14, No. 12, pp. 2082-2090, Dec. 2005.
DOI
|
11 |
K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, "Robust image-adaptive data hiding using erasure and error correction," IEEE Trans. on Image Processing, Vol. 13, No. 12, pp. 1627-1639, Dec. 2004.
DOI
|
12 |
H. W. Tseng and C. P. Hsieh, "Reversible data hiding based on image histogram modification," Imaging Science Journal, Vol. 56, No. 5, pp. 271-278, Oct. 2008.
DOI
|
13 |
X. Li, B. Li, B. Yang, and T. Zeng, "General Framework to Histogram shifting based Reversible Data Hiding," IEEE Trans. on Image Processing, Vol. 22, No. 6, pp. 2181-2191, Feb. 2013.
DOI
|
14 |
C. C. Lo, Y. C. Hu, W. L. Chen, and C. M. Wu, "Reversible Data Hiding Scheme for BTC-compressed Images based on Histogram Shifting," International Journal of Security and Its Applications, Vol. 8, No. 2, pp. 301-314, March 2014.References
DOI
|
15 |
E. Smirni, and G. Ciardo, "Workload-Aware Load pp. 219-232, March 2005.
|
16 |
kdhong, "An Efficient Dynamic Workload Balancing Strategy," Journal of The Korea Society of Computer and Information, Vol. 15, No. 1, pp. 1-10, Nov. 2010.
DOI
|
17 |
kdhong,, "C Programming Language" Korea-Press, pp.100-120, 1991.
|
18 |
Q. Deng, Y. Luo, and J. Ge, "Dual threshold based unsupervised face image clustering," Proceedings of the 2nd International Conference on Industrial Mechatronics and Automation, pp. 436-439, 2010.
|
19 |
SIMGRID Project, http://simgrid.gforge.inria.fr
|