1 |
W. Stallings, Cryptography and Network Security: Principles and Practice. New Jersey: Pearson Education, 2003.
|
2 |
M. Park, E. Cho, and T. T. Kwon, "Multi server password authenticated key exchange using attribute-based encryption," J. KICS, vol. 40, no. 8, pp. 1597-1605, Aug. 2015.
DOI
|
3 |
J.-H. Kim, S.-K. Yoo, and S.-H. Lee, "Fully homomorphic encryption scheme without key switching," J. KICS, vol. 38, no. 5, pp. 428-433, May 2015.
|
4 |
Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn "Information hiding-a survey," in Proc. IEEE, special issue on protection of multimedia content, May 1999. Invited paper.
|
5 |
R. J. Anderson and F. A. P. Petitcolas. "On the limits of steganography," IEEE J. Sel. Areas on Commun., vol. 16, pp. 474-481, 1998.
DOI
|
6 |
J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, Aug. 2003.
DOI
|
7 |
M. U. Celik, G. Sharma, A. M. Tekalp, and E.Saber, "Lossless generalized-lsb data embedding," IEEE Trans. Image Process., vol. 14, no. 2, pp. 253-266, Feb. 2005.
DOI
|
8 |
Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, 2006.
DOI
|
9 |
L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, "Reversible image watermarking using interpolation technique," IEEE Trans. Inf. Forensics Secur., vol. 5, no. 1, pp. 187-193, 2010.
DOI
|
10 |
X. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Processing Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011.
DOI
|
11 |
W. Hong, T.-S. Chen, and H.-Y. Wu, "An improved reversible data hiding in encrypted images using side match," IEEE Signal Processing Lett., vol. 19, no. 4, pp. 199-202, Apr. 2012.
DOI
|
12 |
J. Fridirich, M. Goljan, and R Du, "Lossless data embedding for all image formats," SPIE Proc. photonics West, Electronic Imaging, Security and Watermarking of multimedia Contents, vol. 4675, pp. 572-583, 2002.
|
13 |
Y. C. Li, C. M. Yeh, and C. C. Chang, "Data hiding based on the similarity between neighboring pixels with reversibility," Digital Signal Processing, vol. 20, pp. 1116-1128, 2010.
|
14 |
P. Tsai, Y. C. Hu, and H. L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Processing, vol. 89, no. 6, pp. 1129-1143, 2009.
|
15 |
W. L. Tai, C. M. Yeh, and C. C. Chang, "Reversible data hiding based on histogram modification of pixel differences," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp. 906-910, Jun. 2009.
DOI
|
16 |
H. C. Wu, H. C. Wang, C. S. Tsai, and C. M. Wang, "Reversible image steganographic scheme via predictive coding," Displays, vol. 31, no. 1, pp. 35-43, Jan. 2010.
DOI
|
17 |
C.-C. Chang, C.-C. Lin, and Y.-H. Chen, "Reversible data-embedding scheme using differences between original and predicted pixel values," Inf. Secur., vol. 2, no. 2, pp. 35-46, 2008.
DOI
|
18 |
J.-H. Jeong, K.-J. Kang, Y.-S. Kim, and D.-W. Lim, "Reversible data hiding scheme using dynamic bit selection in encrypted image," in Proc. KIISC Int. Conf. 2012, pp. 56-59, Dec. 2012.
|
19 |
S. Lian, Z. Liu, Z. Ren, and H. Wang, "Commutative encryption and watermarking in video compression," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774-778, 2007.
DOI
|
20 |
Y.-S. Kim, C.-J. Ryu, and S.-J. Han, "Refined reversible data hiding scheme in encrypted image," in Proc. KIIT Summer Conf. 2011, pp. 78-82, May 2011.
|
21 |
Y.-S. Kim and D.-W. Lim, "Reversible data hiding scheme based on lattices," J. KMMS, vol. 16, no. 4, pp. 27-33, Dec. 2012.
|
22 |
S.-H. Cho, D.-S. Kim, and K.-Y. Yoo, "Improved reversible data hiding scheme based on difference value of adjacent pixels," in Proc. KICS Int. Conf. Commun., pp. 205-206, Jeju Island, Korea, Jun. 2013.
|
23 |
T.-S. Kim, M.-H. Jang, and S.-H. Kim, "Transmission methods using RS codes to improve spatial relationship of images in reversible data hiding systems," J. KICS, vol. 40, no. 8, pp. 1477-1484, Aug. 2015.
DOI
|