1 |
A.R. Calderbank et al., "Wavelet Transforms that Map Integers to Integers," Appl. Computational Harmonics Anal., vol. 5, no. 3, 1998, pp. 332-369.
DOI
ScienceOn
|
2 |
K. Yamamoto and M. Iwakiri, "Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument," J. Inf. Hiding Multimedia Signal Process., vol. 1, no. 2, 2010, pp. 59-71.
|
3 |
C.Y. Yang et al., "A Simple Digital Watermarking by the Adaptive Bit-Labeling Scheme," Int. J. Innovative Computing, Inf. Control, vol. 6, no. 3, 2010, pp. 1401-1410.
|
4 |
J. Tian, "Reversible Data Embedding Using a Difference Expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, 2003, pp. 890-896.
DOI
ScienceOn
|
5 |
A.M. Alattar, "Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform," IEEE Trans. Image Process., vol. 13, no. 8, 2004, pp. 1147-1156.
DOI
ScienceOn
|
6 |
D.M. Thodi and J.J. Rodriguez, "Expansion Embedding Techniques for Reversible Watermarking," IEEE Trans. Image Process., vol. 16, no. 3, 2007, pp. 721-730.
|
7 |
K.S. Kim et al., "Reversible Data Hiding Exploiting Spatial Correlation Between Sub-sampled Images," Pattern Recognition, vol. 42, 2009, pp. 3083-3096.
DOI
ScienceOn
|
8 |
W. Hong, T.S. Chen, and C.W. Shiu, "Reversible Data Hiding for High Quality Images Using Modification of Prediction Error," J. Syst. Software, vol. 82, 2009, pp. 1833-1842.
DOI
ScienceOn
|
9 |
V. Sachnev et al., "Reversible Watermark Algorithm Using Sorting and Prediction," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, 2009, pp. 989-999.
|
10 |
C.F. Lee, H.L. Chen, and H.K. Tso, "Embedding Capacity Raising in Reversible Data Hiding Based on Prediction of Different Expansion," J. Syst. Software, vol. 83, 2010, pp. 1864-1872.
DOI
ScienceOn
|
11 |
X.R. Luo and T.L.Yin, "Reversible Data Hiding Exploiting Variance in Wavelet Coefficients," J. Computer Sci. Technol., vol. 11, no. 1, 2011, pp. 27-33.
|
12 |
C.Y. Yang and W.C. Hu, "High-Performance Reversible Data Hiding with Overflow/Underflow Avoidance," ETRI J., vol. 33, no. 4, Aug. 2011, pp. 580-588.
DOI
ScienceOn
|
13 |
Z. Ni et al., "Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication," IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 4, 2008, pp. 497-509.
|
14 |
X.T. Zeng, L.D. Ping, and X.Z. Pan, "A Lossless Robust Data Hiding Scheme," Pattern Recognition, vol. 43, 2010, pp. 1656- 1667.
DOI
ScienceOn
|
15 |
F.Y. Shih, Digital Watermarking and Steganography: Fundamentals and Techniques, Boca Raton, FL: CRC Press, 2008.
|
16 |
I.J. Cox et al., Digital Watermarking and Steganography, 2nd ed., Burlington, MA: Morgan Kaufmann, 2008.
|
17 |
S. Wang, B. Yang, and X. Niu, "A Secure Steganography Method Based on Genetic Algorithm," J. Inf. Hiding Multimedia Signal Process., vol. 1, no. 1, 2010, pp. 28-35.
|
18 |
Z.G. Qu et al., "Novel Quantum Steganography with Large Payload," Optics Commun., vol. 283, no. 13, 2010, pp. 4782-4786.
|