1 |
D. M. Thodi, J. J. Rodriguez, "Expansion Embedding Techniques for Reversible Watermarking," IEEE Trans. Image Process, vol. 16, no. 3, pp. 721-730, 2007.
DOI
|
2 |
Q. Li, X. Wang, X. Wang, et al., "An Encrypted Coverless Information Hiding Method Based on Generative Models," Information Sciences, vol. 553, no. 3, pp. 19-30, 2020.
|
3 |
O. S. Faragallah, M. A. Elaskily, A. F. Alenezi, et al., "Quadruple Histogram Shifting-based Reversible Information Hiding Approach for Digital Images," Multimed Tools Appl, vol. 80, pp. 26297-26317, 2021.
DOI
|
4 |
Y. Ke, M. Q. Zhang, J. Liu, et al., "Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain," IEEE Trans. Circuits and Systems for Video Technology, vol. 30, no. 8, pp. 2353-2365, 2020.
DOI
|
5 |
S. Gujjunoori, M. Oruganti, "Difference Expansion Based Reversible Data Embedding and Edge Detection," Multimed Tools Appl, vol. 78, pp. 25889-25917, 2019.
DOI
|
6 |
A. Roy, R. S. Chakraborty, "Toward Optimal Prediction Error Expansion-Based Reversible Image Watermarking," IEEE Trans. Circuits and Systems for Video Technology, vol. 30, no. 8, pp. 2377-2390, 2020.
DOI
|
7 |
P. V. Sabeen Govind, B. M. Varghese, M.V. Judy, "A high imperceptible data hiding technique using quorum function," Multimed Tools Appl, vol. 80, pp. 20527-20545, 2021.
DOI
|
8 |
Y. Jia, Z.Yin, X. Zhang, et al., "Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting," Signal Processing, vol. 163, pp. 238-246, 2019.
DOI
|
9 |
F. Peng, Y. Zhao, X. Zhang, et al., "Reversible Data Hiding Based on RSBEMD Coding and Adaptive Multi-segment Left and Right Histogram Shifting," Signal Processing: Image Communication, vol. 81, pp. 115715, 2020.
DOI
|
10 |
H. Liu, P. Su, M. Hsu, "An Improved Steganography Method Based on Least-Significant-Bit Substitution and Pixel-Value Differencing," KSII Transactions on Internet and Information Systems, vol. 14, no. 11, pp. 4537-4556, 2020.
DOI
|
11 |
W. Chen, C. C. Chang, S. W. Weng, et al., "Multi-layer mini-Sudoku based high-capacity data hiding method," IEEE Access, vol. 8, pp. 69256-69267, 2020.
DOI
|
12 |
Y. Liu, C. C. Chang, T. S. Nguyen, "High capacity turtle shell-based data hiding," IET Image Process, vol. 10, no. 2, pp. 130-137, 2016.
DOI
|
13 |
J. Lin, J. H. Horng, Y. J. Liu, et al., "An Anisotropic Reference Matrix for Image Steganography," Journal of Visual Communication and Image Representation, Vol. 74, pp. 102969, 2021.
DOI
|
14 |
C. F. Lee, J. J. Shen, S. Agrawal, et al., "Data Hiding Method Based on 3D Magic Cube," IEEE Access, Vol. 8, pp. 39445-39453, 2020.
DOI
|
15 |
J. H. Horng, S. Xu, C. C. Chang, et al., "An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu," Sensors, vol. 20, no. 9, pp. 2739, 2020.
DOI
|
16 |
X. Z. Xie, Y. Liu, C. C. Chang, "Extended Squared Magic Matrix for Embedding Secret Information with Large Payload," Multimed Tools Appl, vol. 78, pp. 19045-19059, 2019.
DOI
|
17 |
X. Z. Xie, C. C. Lin, C. C. Chang, "Data hiding based on a two-layer turtle shell matrix," Symmetry, vol. 10, no. 2, pp. 47, 2018.
DOI
|
18 |
C. C. Chang, "Adversarial learning for invertible steganography," IEEE Access, vol. 8, pp. 198425-198435, 2020.
DOI
|
19 |
Y. Liu, C. Yang, Q. Sun, "Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding," IEEE Access, vol. 6, pp. 5374-5378, 2017.
DOI
|
20 |
C. C. Chang, Y. Liu, T. S. Nguyen, "A novel turtle shell based scheme for data hiding," in Proc. of 10th Int. Conf. Intell. Inf. Hiding Multimedia Signal Process. (IIHMSP), Kitakyushu, Japan, pp. 89-93, Aug. 2014.
|
21 |
C. Kim, "Data Hiding by an Improved Exploiting Modification Direction," Multimed Tools Appl, vol. 69, pp. 569-584, 2014.
DOI
|
22 |
I. Caciula, H. G. Coanda, D. Coltuc, "Multiple Moduli Prediction Error Expansion Reversible Data Hiding," Signal Processing: Image Communication, vol. 71, pp. 120-127, 2019.
DOI
|
23 |
M. He, Y. Liu, C. C. Chang, et al., "A mini-Sudoku matrix-based data embedding scheme with high payload," IEEE Access, vol. 7, pp. 141414-141425, 2019.
DOI
|
24 |
X. Li, W. Zhang, X. Gui, et al., "Efficient Reversible Data Hiding Based on Multiple Histograms Modification," IEEE Trans. Inf. Forensics Security, vol. 10, no. 9, pp. 2016-2027, 2015.
DOI
|
25 |
B. Ou, Y. Zhao, "High Capacity Reversible Data Hiding Based on Multiple Histograms Modification," IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 8, pp. 2329-2342, 2020.
DOI
|
26 |
D. Shehzad, T. Dag, "LSB Image Steganography Based on Blocks Matrix Determinant Method," KSII Transactions on Internet and Information Systems, vol. 13, no. 7, pp. 3778-3793, 2019.
DOI
|
27 |
R. Shreelekshmi, M. Wilscy, C. E. Veni Madhavan, "Undetectable least significant bit replacement steganography," Multimed Tools Appl, vol. 78, pp. 10565-10582, 2019.
DOI
|
28 |
C. K. Chan, L. M. Cheng, "Hiding Data in Images by Simple LSB Substitution," Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004.
DOI
|
29 |
X. Li, Y. Luo, W. Bian, "Retracing extended sudoku matrix for high-capacity image steganography," Multimed Tools Appl, vol. 80, pp. 18627-18651, 2021.
DOI
|
30 |
C. C. Chang, Y. C. Chou, T. D. Kieu, "An information hiding scheme using Sudoku," in Proc. of 3rd Int. Conf. Innov. Comput. Inf. Control (ICICIC), Dalian, China, pp. 17-22, Jun. 2008.
|
31 |
L. Li, W. Zhang, C. Qin, et al., "Adversarial batch image steganography against CNN-based pooled steganalysis," Signal Processing, vol. 181, pp. 107920, 2021.
DOI
|
32 |
B. Ou, X. Li, Y. Zhao, et al., "Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding," IEEE Trans. Image Process, vol. 22, no. 12, pp. 5010-5021, 2013.
DOI
|
33 |
C. C. Chang, "Cryptospace invertible steganography with conditional generative adversarial networks," Security and Communication Networks, vol. 2021, 2021.
|