1 |
C. C. Lin, W. L. Tai and C. C. Chang, "Multilevel reversible data hiding based on histogram modification of difference images," Pattern Recognition, vol.41, no.12, pp.3582-3591, 2008.
DOI
ScienceOn
|
2 |
D. C. Lou, M. C. Hu and C. L. Liu, "Multiple-layer data hiding scheme for medical image," Computer Standards and Interfaces, vol.31, no.2, pp.329-335, 2009.
DOI
ScienceOn
|
3 |
H.W. Tseng and C.P. Hsieh, ''Prediction-based reversible data hiding,"Information Sciences, vol.179, no.14, pp.2460-2469, 2009.
DOI
ScienceOn
|
4 |
C. Honsinger, P. Jone, M. Rabbani and J. Stoffel, "Lossless recovery of an original image containing embedded data," United States Patent #6278791, 2001.
|
5 |
C. C. Chang, C. C. Lin, C. S. Tseng and W. L. Tai, "Reversible hiding in DCT-based compressed images," Information Sciences, vol.177, no.13, pp.2768-2786, 2007.
DOI
ScienceOn
|
6 |
S. Lee, C. D. Yoo and T. Kalker, "Reversible image watermarking based on integerto-integer wavelet transform," IEEE Trans. on Information Forensics and Security, vol.2, no.3, pp.321-330, 2007.
DOI
|
7 |
C. C. Chang, W. L. Tai and C. C. Lin, "A reversible data hiding scheme based on side match vector quantization," IEEE Trans. on Circuits and Systems for Video Technology, vol.16, no.10, pp.1301-1308, 2006.
DOI
|
8 |
C. H. Yang and Y. C. Lin, "Reversible data hiding of a VQ index table based on referred counts," Journal of Visual Communication and Image Representation, vol.20, no.6, pp.399-407, 2009.
DOI
ScienceOn
|
9 |
N. Dai, G. Feng and Q. Zeng, "Reversible watermarking using adaptive edge-guided interpolation,"KSII Trans. on Internet and Information Systems, vol.4, no.4, pp.856-873, 2011.
|
10 |
H.J. Hwang, H.J. Kim, V. Sachnev, and S.H. Joo, "Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting," KSII Trans. on Internet and Information Systems, vol. 4, no. 4, pp. 655-670, 2010.
|
11 |
C.H. Yang and M.H. Tsai, "Improving histogram-based reversible data hiding by interleaving predictions," IET Image Processing, vol.4, no.4, pp.223-234, 2010.
DOI
ScienceOn
|
12 |
W. Bender, D. Gruhl, N. Morioto and A. Lu, "Techniques for data hiding," International Business Machines Corporation System Journal, vol.35, pp. 13-336, 1996.
|
13 |
D. Artz, "Digital steganographic: hiding data within data," IEEE International computing, vol.5, no.3, pp.75-80, 2001.
DOI
ScienceOn
|
14 |
W. J. Chen, C. C. Chang and T. H. N. Le, "High payload steganography mechanism using hybrid edge detector," Expert Systems with Applications, vol.37, no.4, pp.3292-3301, 2010.
DOI
ScienceOn
|
15 |
C. K. Chan and L. M. Chen, "Hiding data in images by simple LSB substitution," Pattern Recognition, vol.37, no.3, pp.469-474, 2004.
DOI
ScienceOn
|
16 |
R. Z. Wang, C. F. Lin and J. C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, vol.34, no.3, pp.671-683, 2001.
DOI
ScienceOn
|
17 |
J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. on Circuits Systems for Video Technology, vol.13, no.8, pp.890-896, 2003.
DOI
ScienceOn
|
18 |
C. H. Yang and S. J. Wang, "Weighted bipartite graph for location optimal LSB substitution for secret embedding," Journal of Discrete Mathematical Sciences and Cryptography, vol.9, no.1, pp.153-164, 2006.
DOI
|
19 |
C. H. Yang, "Inverted pattern approach to improve image quality of information hiding by LSB substitution," Pattern Recognition, vol.3, no.3, pp.488-497, 2008.
|
20 |
Z. Ni, Y. Q. Shi, N. Ansari and W. Su, "Reversible data hiding," IEEE Trans. on Circuits and Systems for Video Technology, vol.16, no.3, pp.354-362, 2006.
|
21 |
L. Kamstra and H. J. A .M. Heijmans, "Reversible data embedding into images using wavelet techniques and sorting," IEEE Trans. on Image Processing, vol.14, no.12, pp.2082-2090, 2005.
DOI
|
22 |
A. M. Alattar, "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Trans. on Image Processing, vol.13, no.8, pp.1147-1156, 2004.
DOI
ScienceOn
|
23 |
C. D. Vleeschouwer, J.F. Delaigle and B. Macq, "Circular interpretation of bijective transformations in lossless watermarking for media asset management," IEEE Trans. on Multimedia, vol.5, no.1, pp.97-105, 2003.
DOI
ScienceOn
|
24 |
C. C. Lee, H. C. Wu, C. S. Tsai and Y. P. Chu, "Adaptive lossless steganographic scheme with centralized difference expansion," Pattern Recognition, vol.41, no.6, pp.2097-2106, 2008.
DOI
ScienceOn
|
25 |
P. Y. Tsai, Y. C. Hu and H. L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Processing, vol.83, no.6, pp.1129-1143, 2009.
|