1 |
C. C. Chang, W. C. Wu, and Y. C. Hu, "Lossless recovery of a VQ index table with embedded secret data," Journal of Visual Communication and Image Representation, vol. 18, no. 3, pp. 207-216, June 2007.
DOI
ScienceOn
|
2 |
C. H. Yang and Y. C. Lin, "Reversible data hiding of a VQ index table based on referred counts," Journal of Visual Communication and Image Representation, vol. 20, no. 6, pp. 399-407, August 2009.
DOI
ScienceOn
|
3 |
W. J. Chen, and W. T. Huang, "VQ indices compression and information hiding using hybrid lossless index coding," Digital Signal Processing, vol. 19, no. 3, pp. 433-443, May 2009.
DOI
ScienceOn
|
4 |
C. C. Chang, W. L. Tai, C. C. Lin, " A reversible data hiding scheme based on side match vector quantization," IEEE Trans. on Circuits and Systems for Video Technology, vol. 16, no. 10, pp. 1301-1308, 2006.
DOI
ScienceOn
|
5 |
C. C. Chang, T. D. Kieu, and Y. C. Chou, "Reversible information hiding for VQ indices based on locally adaptive coding," Journal of Visual Communication and Image Representation, vol. 20, no. 1, pp. 57-64, Jan. 2009.
DOI
ScienceOn
|
6 |
C. Y. Lin, C. C. Chang, "Hiding data in VQ-compressed images using dissimilar pairs," J. Comput., vol. 17, no. 2, pp. 3-10, 2006.
|
7 |
C. C. Chang, C. Y. Lin, Y. H. Fan, "Lossless data hiding for color images based on block truncation coding," Pattern Recognition, vol. 41, no. 7, pp. 2347-2357, July 2008.
DOI
ScienceOn
|
8 |
C. C. Lin, P. F. Shiu, "DCT-based reversible data hiding scheme," Journal of Software, vol. 5, no. 2, pp. 214-224, 2010.
|
9 |
S. F. Chiou, Y. C. Lu, I. E. Liao, M. S. Hwang, "An efficient reversible data hiding scheme based on SMVQ," The Imaging Science Journal, Vol. 61, No. 6, pp. 467-474, July 2013.
DOI
ScienceOn
|
10 |
R. M. Davis, "The data encryption standard in perspective," IEEE Commun. Mag., vol. 16, no. 6, pp. 5-9, 1978.
|
11 |
R. Rivest, A. Shamir, L. Adleman, "A method for obtaining digital signature and public key cryptosystems," Commun. ACM, vol. 21, no. 2, pp 120-126, 1978.
DOI
ScienceOn
|
12 |
C. K. Chan, L. M. Cheng, "Improved hiding data in images by optimal moderately significant-bit replacement," IEEE Electronic Letters, vol. 37, pp. 1017-1018, 2001.
DOI
ScienceOn
|
13 |
R. M. Gray, "Vector quantization," IEEE ASSP Mag., vol. 1, no. 2, pp. 4-29, 1984.
DOI
ScienceOn
|
14 |
W. Bender, N. Morimoto, A. Lu, "Technique for data hiding," IBM Systems Journal, vol. 35, pp. 313-336, 1996.
DOI
ScienceOn
|
15 |
C. K. Chan, L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, Vol. 37, pp. 469-474, 2004.
DOI
ScienceOn
|
16 |
C. C. Thien, J. C. Lin, "A simple and high hiding capacity method for hiding digit-by-digit data in images based on modulus function," Pattern Recognition, vol. 36, pp. 2875-2881, 2003.
DOI
ScienceOn
|
17 |
K. L. Chung, C. H. Shen, L. C. Chang, "A novel SVD and VQ-based image hiding scheme," Pattern Recognition, vol. 2, pp. 1051-1058, 2001.
|
18 |
L. M. Marvel, C. G. Boncelet, C. T. Retter, "Spread spectrum image steganography," IEEE Transactions on Image Processing, vol. 8, pp. 1075-1083, 1999.
DOI
ScienceOn
|
19 |
[9] J. Mielikanen, "LSB matching revisited," IEEE Signal Processing Letter, vol. 13, pp. 285-297, 2006.
DOI
ScienceOn
|
20 |
R. Z. Wang, C.F. Lin, J. C. Lin, "Hiding data in images by optimal moderately significant-bit replacement," IEEE Electronic Letters, vol. 36, pp. 2069-2070, 2000.
DOI
ScienceOn
|
21 |
R. Z. Wang, C.F. Lin, J. C. Lin, "Image hiding by optimal LSB substitution and generic algorithm," Pattern Recognition, vol. 34, pp. 671-683, 2001.
DOI
ScienceOn
|
22 |
X. Zhang, S. Wang, "Steganography using multiple-base notational system and human vision sensitivity," IEEE Signal Processing Letters, vol. 12, pp. 67-70, 2005.
DOI
ScienceOn
|
23 |
J. Fridich, M. Goljian, R. Du, "Invertible authentication," in Proc. of SPIE Photonics West, Security and Watermarking of Multimedia Contents III, San Jose, CA, pp. 197-208, 2001.
|
24 |
A. M. Alattar, "Reversible watermarking using the difference expansion of a generalized integer transform," IEEE Transactions on Image Processing, vol. 13, pp. 1147-1156, 2004.
DOI
ScienceOn
|
25 |
M. U. Celik, G. Sharma, A.M. Tekalp, E. Saber, "Reversible data hiding," in Proc. of IEEE Int. Conf. on Image Processing, pp. 157-160, 2002.
|
26 |
J. Fridich, M. Goljian, R. Du, "Lossless data embedding - new paradigm in digital watermarking," EURASIP Journal on Applied Signal Processing, pp. 185-196, 2002.
|
27 |
M. Goljan, J. Fridrich, R. Du, "Distortion-free data embedding," in Proc. of 4th Information Hiding Workshop, Pittsburgh, PA, pp. 27-41, April 2001.
|
28 |
C. W. Honsinger, P. Jones, M. Rabbani, J. C. Stoffel, "Lossless recovery of an original image containing embedded data," US Patent 6278791 B1, August 21, 2001.
|
29 |
Z. Ni, Y. Q. Shi, N. Ansari, W. Su, "Reversible data hiding," IEEE Trans. on Circuits and Systems for Video Technology, vol. 16, pp. 354-362, 2006.
DOI
ScienceOn
|
30 |
H. C. Huang, F. H. Wang, J. S. Pan, "A VQ-based robust multi-watermarking algorithm," IEICE Trans. Fundam., vol. E-85A, no. 7, pp.1719-1726, 2002.
|
31 |
J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, pp. 890-896, 2003.
DOI
ScienceOn
|
32 |
C. D. Vleeschouwer, J. F. Delaigle, B. Macq, "Circular interpretation of histograms for reversible watermarking," in Proc. of IEEE International Multimedia Signal Processing Workshop France, pp. 345-350, October 2001.
|
33 |
H. C. Huang, F. H. Wang, J. S. Pang, "Efficient and robust watermarking algorithm with vector quantization," Electron. Lett., vol. 37, no. 13, pp.826-828, 2001.
DOI
ScienceOn
|
34 |
C. Y. Lin, C. C. Chang, "Hiding data in VQ-compressed images using dissimilar pairs," J. Comput., vol. 17, no. 2, pp. 3-10, 2006.
|
35 |
C. C. Chang, T. S. Nguyen, and C. C. Lin, "A reversible data hiding scheme for VQ indices using locally adaptive coding," The Journal of Systems and Software, Vol. 86, pp. 389-402, 2013.
DOI
ScienceOn
|