Reversible Data Hiding in Block Truncation Coding Compressed Images Using Quantization Level Swapping and Shifting |
Hong, Wien
(School of Computer and Software Nanjing University of Information Science and Technology)
Zheng, Shuozhen (Department of Electronic Communication and Software Engineering Nanfang College of Sun Yat-Sen University) Chen, Tung-Shou (National Taichung University of Science and Technology Department of Computer Science and Information Engineering) Huang, Chien-Che (National Taichung University of Science and Technology Department of Computer Science and Information Engineering) |
1 | Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving Efficient Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing,” IEICE Transactions on Communications, vol. E98-B, no. 1, pp.190-200, 2015. Article (CrossRef Link) DOI |
2 | Z. Xia, X. Wang, X. Sun, and Q. Wang, “A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340-352, 2016. Article (CrossRef Link) DOI |
3 | Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual Verifiable Provable Data Auditing in Public Cloud Storage,” Journal of Internet Technology, vol. 16, no. 2, pp. 317-323, 2015. Article (CrossRef Link) DOI |
4 | P. Guo, J. Wang, B. Li, and S. Lee, “A Variable Threshold-value Authentication Architecture for Wireless Mesh Networks,” Journal of Internet Technology, vol. 15, no. 6, pp. 929-936, 2014. Article (CrossRef Link) |
5 | J. Li, X. Li, B. Yang and X. Sun, “Segmentation-based Image Copy-move Forgery Detection Scheme,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 507-518, 2015. Article (CrossRef Link) DOI |
6 | B. Chen, H. Shu, G. Coatrieux, G. Chen, X. Sun, and J.L. Coatrieux, “Color Image Analysis by Quaternion-Type Moments,” Journal of Mathematical Imaging and Vision, vol. 51, no. 1, pp. 124-144, 2015. Article (CrossRef Link) DOI |
7 | Z. Xia, X. Wang, X. Sun, Q. Liu, and N. Xiong, “Steganalysis of LSB Matching Using Differences Between Nonadjacent Pixels,” Multimedia Tools and Applications, vol. 75, no. 4, pp. 1947-1962, 2016. Article (CrossRef Link) DOI |
8 | Z. Xia, X. Wang, X. Sun, and B. Wang, “Steganalysis of Least Significant Bit Matching Using Multi-Order Differences,” Security and Communication Networks, vol. 7, no. 8, pp. 1283-1291, 2014. Article (CrossRef Link) DOI |
9 | B.Gu, V.S. Sheng, K.Y. Tay, W. Romano, and S. Li, “Incremental Support Vector Learning for Ordinal Regression,” IEEE Transactions on Neural Networks and Learning Systems, vol. 26, no. 7, pp. 1403-1416, 2015. Article (CrossRef Link) DOI |
10 | B. Gu, V. S. Sheng, Z. Wang, D. Ho, S. Osman, and S. Li, "Incremental Learning for ν-Support Vector Regression," Neural Networks, vol. 67, pp. 140-150, 2015. Article (CrossRef Link) DOI |
11 | X. Wen, L. Shao, Y. Xue, and W. Fang, “A Rapid Learning Algorithm for Vehicle Classification,” Information Sciences, vol. 295, no. 1, pp. 395-406, 2015. Article (CrossRef Link) DOI |
12 | Z. Yuhui, J. Byeungwoo, X. Danhua, W.Q.M. Jonathan and Z. Hui, “Image Segmentation by Generalized Hierarchical Fuzzy C-means Algorithm,” Journal of Intelligent and Fuzzy Systems, vol. 28, no. 2, pp. 961-973, 2015. Article (CrossRef Link) |
13 | J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006. Article (CrossRef Link) DOI |
14 | W. Hong and T.S. Chen, “A Novel Data Embedding Method Using Adaptive Pixel Pair Matching,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 1, pp. 176-184, 2012. Article (CrossRef Link) DOI |
15 | Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, 2006. Article (CrossRef Link) DOI |
16 | X.L. Li, J. Li, B. Li, and B. Yang, “High-Fidelity Reversible Data Hiding Scheme Based on Pixel-Value-Ordering and Prediction-Error Expansion,” Signal Processing, vol.93, no. 1, pp. 198-205, 2013. Article (CrossRef Link) DOI |
17 | X. Zhang, S. Wang, Z. Qian, and G. Feng, “Reversible Fragile Watermarking for Locating Tampered Blocks in JPEG Images,” Signal Processing, vol. 90, no. 12, pp. 3026-3036, 2010. Article (CrossRef Link) DOI |
18 | X. Wang, J. Ding, and Q.Q. Pei, “A Novel Reversible Image Data Hiding Scheme Based on Pixel Value Ordering and Dynamic Pixel Block Partition,” Information Science, vol. 310, pp. 16-35, 2015. Article (CrossRef Link) DOI |
19 | W. Hong, T.S. Chen, and J. Chen, “Reversible Data Hiding Using Delaunay Triangulation and Selective Embedment,” Information Sciences, vol. 308, pp. 140-154, 2015. Article (CrossRef Link) DOI |
20 | W.J. Wang, C.T. Huang, C.M. Liu, P.C. Su, and S.J. Wang, “Data Embedding for Vector Quantization Image Processing on the Basis of Adjoining State-Codebook Mapping,” Information Sciences, vol. 246, pp. 69-82, 2013. Article (CrossRef Link) DOI |
21 | W. Hong, T.S. Chen, C.W. Shiu, and M.C. Wu, “Lossless Data Embedding in BTC Codes Based on Prediction and Histogram Shifting,” Applied Mechanics and Materials, vol. 65, pp. 182-185, 2011. Article (CrossRef Link) DOI |
22 | J. Chen, W. Hong, T.S. Chen and C.W. Shiu, “Steganography for BTC Compressed Images Using No Distortion Technique,” Image Science Journal, vol. 58, no. 4, pp. 177-185. 2010. Article (CrossRef Link) DOI |
23 | C.C. Chang, C.Y. Lin, and Y.H. Fan, “Reversible Steganography for BTC-Compressed Images,” Fundamenta Informaticae, vol. 109, no. 2, pp. 121-134, 2011. Article (CrossRef Link) |
24 | C.C. Lo, Y.C. Hu, W.L. Chen, and C.M. Wu, “Reversible Data Hiding Scheme for BTC-Compressed Images Based on Histogram Shifting,” International Journal of Security and Its Applications, vol. 8, no. 2, pp. 301-314, 2014. Article (CrossRef Link) DOI |
25 | The USC-SIPI Image Database [Online]. Available: http://sipi.usc.edu/database/ |
26 | Y.Y. Tsai, C.S. Chan, C.L. Liu, and B.R Su, “A Reversible Steganographic Algorithm for BTC-Compressed Images Based on Difference Expansion and Median Edge Detector,” Imaging Science Journal, vol. 62, no. 1, pp. 48-55, 2014. Article (CrossRef Link) DOI |
27 | M.D. Lema and O.R. Mitchell, “Absolute Moment Block Truncation Coding and Its Application to Color Images,” IEEE Transactions on Communication, vol. 32, no. 10, pp. 1148-1157, 1984. Article (CrossRef Link) DOI |