1 |
Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Yeh, and Yung-Kuan Chan, "A high payload frequency-based reversible image hiding method," Information Sciences, vol. 180, pp. 2286-2298, 2010.
DOI
ScienceOn
|
2 |
Chin-Chen Chang, Chih-Yang Lin, and Yi-Pei Hsieh, "Data hiding for vector quantizatin images using mixed-based notation and dissimilar patterns without loss of fidelity," Information Sciences, vol. 201, pp. 70-79, 2012.
DOI
ScienceOn
|
3 |
Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng, Wei-Liang Tai, "Reversible hiding in DCT-based compressed images," Information Sciences, vol. 177, no. 13, pp. 2768-2786, 2007.
DOI
ScienceOn
|
4 |
Chin-Chen Chang, Chih-Yang Lin, Yi-Hsuan Fan, "Lossless data hiding for color images based on block truncation coding," Pattern Recognition, vol. 41, pp.2347-2357, 2008.
DOI
ScienceOn
|
5 |
Chia-Chun Wu, Shang-Juh Kao, and Min-Shiang Hwang, "A high quality image sharing with steganography and adaptive authentication scheme," The Journal of Systems and Software, vol. 84, pp. 2196-2207, 2011.
DOI
ScienceOn
|
6 |
Chia-Chun Wu, Min-Shiang Hwang, and Shang-Juh Kao, "A new approach to the secret image sharing with steganography and authentication," The Imaging Science Journal, vol. 57, no. 3, pp. 140-151, 2009.
DOI
ScienceOn
|
7 |
S-F Chiou, I-En Liao, and Min-Shiang Hwang, "A capacity-enhanced reversible data hiding scheme based SMVQ," The Imaging Science Journal, vol. 59, pp. 17-24, 2011.
DOI
ScienceOn
|
8 |
Zhiguo Chang and Jian Xu, "Reversible run length data embedding for medical images," Communication Software and Networks (ICCSN), in Proc. of 2011 IEEE 3rd International Conference, pp. 260-263, 2011.
|
9 |
M. Fallahpour, D. Megias, and M. Ghanbari, "Reversible and high-capacity data hiding in medical images," IET Image Processing, vol.5, Iss. 2, pp. 190-197, 2011.
DOI
ScienceOn
|
10 |
Min-Shiang Hwang, K. F. Hwang, and Chin-Chen Chang, "A timestamping protocol for digital watermarking," Applied Mathematics and Computation, vol. 169, pp. 1276-1284, 2005.
DOI
ScienceOn
|
11 |
Li-Chin Huang, Lin-Yu Tseng, and Min-Shiang Hwang, "The study of data hiding in medical image," International Journal of Network Secuity, vol. 14, no. 5, pp. 243-251, 2012.
|
12 |
Li-Chin Huang, Lin-Yu Tseng, and Min-Shiang Hwang, "A reversible data hiding method by histogram shifting in high quality medical images," Journal of Systems and Software, Available online 3 December, 2012.
|
13 |
H. -J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, and H. -G. Choo, "A novel difference expansion transform for reversible data embedding," IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 456-465, Sep. 2008.
DOI
ScienceOn
|
14 |
B. Karthikeyan, S. Ramakrishnan, V. Vaithiyanathan, S. Sruti, and M. Gomathymeenakshi, "An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image," International Journal of Network Security, vol.15, no.1, pp.314-318, 2013.
|
15 |
Der-Chyuan Lou, Ming-Chiang Hu, and Jiang-Lung Liu, "Multiple layer data hding scheme for medical images," Computer Standards and Interfaces, vol. 31, pp.329-335, 2009.
DOI
ScienceOn
|
16 |
Hao Luo, Fa-Xin Yu, Hua Chen, Zheng-Liang Huang, Hui Li, and Ping-Hui Wang, "Reversible data hiding based on block median preservation," Information Sciences, vol. 181, pp.308-328, 2011.
DOI
ScienceOn
|
17 |
Zhichen Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qibin Sun and Xiao Lin, "Robust lossless image data hiding designed for seim-fragile image authentication," IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, pp.497-509, 2008.
DOI
ScienceOn
|
18 |
Z.M. Lu., J.X. Wang, B.B. Liu, "An improved lossless data hiding scheme based on image VQ-index residual value coding," The Journal of Systems and Software, vol. 82, no. 6, pp.1016-1024, 2009.
DOI
ScienceOn
|
19 |
Zhensong Liao, Yan Huang, and Chisong Li, "Research on Data Hiding Capacity," International Journal of Network Security, vol.5, no.2, pp.140-144, 2007.
|
20 |
Z. Ni, Y, -Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, pp. 354-362, 2006.
DOI
ScienceOn
|
21 |
Zhichen Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qibin Sun and Xiao Lin, "Robust lossless image data hiding designed for seim-fragile image authentication," IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, pp.497-509, 2008.
DOI
ScienceOn
|
22 |
National Cancer Imaging Archive. Available at https://imaging.nci.nih.gov/.
|
23 |
Yun Q. Shi, Zhicheng Ni, Dekun Zou, Changuin Liang and Guourong Xuan, "Data hiding fundamentals, algorithms and applications," Circuits and Systems, 2004 IEEE International Symposium, pp. 33-36, 2004.
|
24 |
Palak K. Amin, Ning Liu, and K. P. Subbalakshmi, "Statistical Attack Resilient Data Hiding," International Journal of Network Security, vol.5, no.1, pp.112-120, 2007.
|
25 |
Mrigank Rochan, Santosh Hariharan, and Kumar Rajamani, "Data hiding scheme for medical images using lossless code for mobile HIMS," in Proc. of Third International Conference on Communication Systems and Networks, pp. 1-4, 2011.
|
26 |
S. S. Sujatha and M. Mohamed Sathik, "A novel DWT based blind watermarking for image authentication," International Journal of Network Security, vol. 14, no. 4, pp. 223-228, 2012.
|
27 |
D. B. Satre and R. V. Pawar, "Preserve robustness for image data hiding," in Proc. of Second International Conference on Computer Research and Development, pp. 707-711, 2010.
|
28 |
J. Tian, "Reversible data embedding using a difference expansion," IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no 8, pp. 890-896, Aug. 2003.
DOI
ScienceOn
|
29 |
S. Maria Celestin Vigila and K. Muneeswaran, "Nonce based elliptic curve cryptosystem for text and image applications," International Journal of Network Security, vol. 14, no. 4, pp. 236-242, 2012.
|
30 |
Christophe De Vleeschouwer, Jean-Francois Deloaigle, and Benoit Macq, "Circular interpretation of bijective transformation in lossless watermarking for media asset management," IEEE Transactions on Multimedia, vol. 5, pp. 97-104, 2003.
DOI
ScienceOn
|
31 |
Nan-I Wu and Min-Shiang Hwang, "Data hiding: Current status and key issues" International Journal of Network Security, vol. 4, no. 1, pp. 1-9, Jan. 2007.
|
32 |
Nan-I Wu, Chung-Ming Wang, Chwei-Shyong Tsai, and Min-Shiang Hwang, "A certificate-based watermaking scheme for coloured images," The Images Science Journal, vol. 56, pp. 326-332, 2008.
DOI
ScienceOn
|
33 |
Wei-Jen Wang, Cheng-Ta Huang, and Shiuh-Jeng Wang, "VQ applications in steganorgraphic data hiding upon multimedia images," IEEE Systems Journal, vol. 5, no. 4, pp. 528-537, 2011.
DOI
ScienceOn
|
34 |
Shangping Zhong, Xueqi Cheng, and Tierui Chen, "Data Hiding in a Kind of PDF Texts for Secret Communication," International Journal of Network Security, vol.4, no.1, pp.17-26, 2007.
|
35 |
Chi-Yao Weng, Shiuh-Jeng Wang, Jonathan Liu, and Dushyant Goyal, "Prediciton-based reversible data hiding using empirical histograms in images," Transactions on Internet and Information Systems, vol. 6, no. 4, pp. 1248-1266, 2012.
|
36 |
Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai and Min-Shiang Hwang, "A high quality steganographic method with pixel-value differencing and modulus function", The Journal of Systems and Software, vol. 81, Iss. 1, pp. 150-158, 2008.
DOI
ScienceOn
|