1 |
T.D. Kieu and S. Ramroach, “A reversible steganographic scheme for VQ indices based on joint neighboring coding,” Expert Systems with Applications, vol. 42, no. 2, pp. 713-722, 2015. Article (CrossRef Link)
DOI
|
2 |
Y. Linde, A. Buzo, and R.M. Gray, “An algorithm for vector quantizer design,” IEEE Transactions on Communications, vol. 28, no. 1, pp. 84-95, 1980. Article (CrossRef Link)
DOI
|
3 |
C.C Chang, T.D. Kieu, and Y.C Chou, Reversible information hiding for VQ indices based on locally adaptive coding,” Journal of Visual Communication and Image Representation, vol. 20, no. 1, pp. 57-64, 2009. Article (CrossRef Link)
DOI
|
4 |
C.H. Yang and Y.C. Lin, “Fractal curves to improve the reversible data embedding for VQ-indexes based on locally adaptive coding,” Journal of Visual Communication and Image Representation, vol. 21, no. 4, pp. 334-342, 2010. Article (CrossRef Link)
DOI
|
5 |
C.C. Chang, T.S. Nguyen, and C.C Lin, “A reversible data hiding for VQ indices using locally adaptive coding,” Journal of Visual Communication and Image Representation, vol. 22, no. 7, pp. 664-672, 2011. Article (CrossRef Link)
DOI
|
6 |
T.D. Kieu, A. Rudder, and W. Goodridge, “A reversible steganographic scheme for VQ indices based on locally adaptive coding,” Journal of Visual Communication and Image Representation, vol. 25, no. 6, pp. 1378-1386, 2014. Article (CrossRef Link)
DOI
|
7 |
R.M. Gray, “Vector quantization,” IEEE ASSP Magazine, vol. 1, no. 2, pp. 4-29, 1984. Article (CrossRef Link)
DOI
|
8 |
C.C. Chang, T.D. Kieu, and W.C. Wu, “A lossless data embedding technique by joint neighboring coding,” Pattern Recognition, vol. 42, no. 7, pp. 1597-1603, 2009. Article (CrossRef Link)
DOI
|
9 |
J.X. Wang and Z.M. Lu, “A path optional lossless data hiding scheme based on VQ joint neighboring coding,” Information Sciences, vol. 179, no. 19, pp. 3332-3348, 2009. Article (CrossRef Link)
DOI
|
10 |
D.M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, vol. 16, no. 3, pp. 721-730, 2007. Article (CrossRef Link)
DOI
|
11 |
J.D. Lee, Y.H. Chiou, and J.M. Guo, “Lossless data hiding for VQ indices based on neighboring correlation,” Information Sciences, vol. 221, pp. 419-438, 2013. Article (CrossRef Link)
DOI
|
12 |
W. Hong and T.S. Chen, “A novel data embedding method using adaptive pixel pair matching,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 1, pp. 176-184, 2012. Article (CrossRef Link)
DOI
|
13 |
C.C. Chang, P.Y. Pai, C.M. Yeh, and Y.K Chan, “A high payload frequency-based reversible image hiding method,” Information Sciences, vol. 180, no. 11, pp. 2286-2298, 2010. Article (CrossRef Link)
DOI
|
14 |
J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 831-841, 2003. Article (CrossRef Link)
DOI
|
15 |
A.M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, vol. 13, no. 8, pp. 1147-1156, 2004. Article (CrossRef Link)
DOI
|
16 |
X. Zhang, S. Wang, Z. Qian, and G. Feng, “Reversible fragile watermarking for locating tampered blocks in JPEG images,” Signal Processing, vol. 90, no. 12, pp. 3026-3036, 2010. Article (CrossRef Link)
DOI
|
17 |
J.S. Pan, M.T. Sung, H.C. Huang, and B.Y. Liao, “Robust VQ-based digital watermarking for the memoryless binary symmetric channel,” IEICE Transactions on Fundamentals, vol. E-87A, no. 7, pp. 1839-1841, 2004. Article (CrossRef Link)
|
18 |
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital watermarking and steganography, 2nd Edition, Morgan Kauffman, 2007. Article (CrossRef Link)
|
19 |
C.H. Yang and Y.C. Lin, “Reversible data hiding of a VQ index table based on referred counts,” Journal of Visual Communication and Image Representation, vol. 20, no. 6, pp. 399-407, 2009. Article (CrossRef Link)
DOI
|
20 |
M.A. Wright, “The advanced encryption standard,” Network Security 2001, vol. 10, pp. 11-13, 2001. Article (CrossRef Link)
DOI
|
21 |
R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978. Article (CrossRef Link)
DOI
|
22 |
F. Peng, X. Li, and B. Yang, “Improved PVO-based reversible data hiding,” Digital Signal Processing, vol. 25, pp. 255-265, 2014. Article (CrossRef Link)
DOI
|
23 |
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3-4, pp. 313-336, 1996. Article (CrossRef Link)
DOI
|
24 |
F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Information hiding - a survey," in Proc. of IEEE Special Issue on Protection of Multimedia Content, vol. 87, no. 7, pp. 1062-1078, 1999. Article (CrossRef Link)
|
25 |
Y. Hu, H. Lee, and J. Li, “DE-based reversible data hiding with improved overflow location map,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 2, pp. 250-260, 2009. Article (CrossRef Link)
DOI
|
26 |
D. Coltuc, “Low distortion transform for reversible watermarking,” IEEE Transactions on Image Processing, vol. 21, no. 1, pp. 412-417, 2012. Article (CrossRef Link)
DOI
|
27 |
C.H. Yang, C.Y. Weng, S.J. Wang, and H.M. Sun, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 488-497, 2008. Article (CrossRef Link)
DOI
|
28 |
R.M. Davis, “The data encryption standard in perspective,” IEEE Communications Magazine, vol. 16, no. 6, pp. 5-9, 1978. Article (CrossRef Link)
DOI
|