1 |
"USC-SIPI Image Database - Miscellaneous," Available: {http://sipi.usc.edu/database/database.cgi?volume=misc}.
|
2 |
L. Kamstra and H.J.A.M. Heijmans, "Reversible data embedding into images using wavelet techniques and sorting," IEEE Trans. on Image Processing, Vol.14, No.12, pp.2082-2090, 2005.
DOI
ScienceOn
|
3 |
D.M. Thodi and J.J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. on Image Processing, Vol.16, No.3, pp.721-730, 2007.
DOI
ScienceOn
|
4 |
Z. Ni, Y.-Q. Shi, N. Ansari and W. Su, "Reversible data hiding," IEEE Trans. on Circuits and Systems for Video Technology, Vol.16, No.3, pp.354-362, 2006.
DOI
ScienceOn
|
5 |
J.H. Hwang, J.W. Kim and J.U. Choi, "A reversible watermarking based on histogram shifting," International Workshop on Digital Watermarking, Lecture Notes in Computer Science, Vol.4283, pp.348-361, 2006.
|
6 |
W.-C. Kuo, D.-J. Jiang and Y.-C. Huang, "Reversible data hiding based on histogram," International Conference on Intelligent Computing, Lecture Notes in Artificial Intelligence, Vol.4682, pp.1152-1161, 2007.
|
7 |
S.-K. Lee, Y.-H. Suh and Y.-S. Ho, "Lossless data hiding based on histogram modification of difference images," Pacific Rim Conference on Multimedia, Lecture Notes in Computer Science, Vol.3333, pp.340-347, 2005.
|
8 |
C.-C. Lin, W.-L. Tai and C.-C. Chang, "Multilevel reversible data hiding based on histogram modification of difference images," Pattern Recognition, Vol.41, No.12, pp.3582-3591, 2008.
DOI
ScienceOn
|
9 |
P. Tsai, Y.-C. Hu and H.-L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Processing, Vol.89, No.6, pp.1129-1143, 2009.
DOI
ScienceOn
|
10 |
C.W. Honsinger, P. Jones, M. Rabbani and J.C. Stoffel, "Lossless recovery of an original image containing embedded data," US Patent application, Docket No: 77102/E-D, 1999.
|
11 |
"JBIG-KIT lossless image compression library," (online), Available: {http://www.cl.cam.ac.uk/~mgk25/jbigkit/}.
|
12 |
S. Lee, C.D. Yoo and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Trans. on Information Forensics and Security, Vol.2, No.3, pp.321-330, 2007.
DOI
ScienceOn
|
13 |
J.Y. Kim, H.-Y. Lee, D.-H. Im, S.-J. Ryu, J.-H. Choi, and H.-K. Lee, "Print-Scan Resilient Curve Watermarking using B-Spline Curve Model and Its 2D Mesh Spectral Transform," 한국정보처리학회 논문지, Vol.15-B(4), pp.307-314, 2008.
과학기술학회마을
DOI
ScienceOn
|
14 |
B. Yang, M. Schmucker, C.B.W. Funk and S. Sun, "Integer DCT-based reversible watermarking for images using compounding technique," Proc. of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, Vol.5306, pp.405-415, 2004.
|
15 |
G. Xuan, Q. Yao, C. Yang, J. Gao, P. Chai, Y.Q. Shi and Z. Ni, "Lossless data hiding using histogram shifting method based on integer wavelets," International Workshop on Digital Watermarking, Lecture Notes in Computer Science, Vol.4283, pp.323-332, 2006.
|
16 |
J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. on Circuits and Systems for Video Technology, Vol.13, No.8, pp.890-896, Aug. 2003.
DOI
ScienceOn
|
17 |
A.M. Alattar, "Reversible watermark using difference expansion of triplets," Proc. of the IEEE International Conference on Image Processing, Vol.1, pp.501-504, 2003.
|
18 |
A.M. Alattar, "Reversible watermark using difference expansion of quads," Proc. of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol.3, pp.377-380, 2004.
|
19 |
A.M. Alattar, "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Trans. on Image Processing, Vol.13, No.8, pp.1147-1156, 2004.
DOI
ScienceOn
|
20 |
I. Cox, M. Miller, J. Bloom, J. Fridrich and T. Kalker, "Digital Watermarking and Steganography," Morgan Kaufmann Publishers Inc., San Francisco, CA, 2007.
|
21 |
H.-Y. Lee, H. Kim, and H.-K. Lee, "Robust image watermarking using local invariant features," Optical Engineering, Vol.45. No.3, 2006.
|
22 |
S.Y. Choi, H.-Y. Lee, I. K. Kang, and H.-K. Lee, "Video Fingerprinting System through Zero-based Code Modulation Technique," 한국정보처리학회 논문지, Vol.12-B(4), pp.443-450, 2005.
과학기술학회마을
DOI
ScienceOn
|
23 |
K.-S. Kim, M.-J. Lee, H.-Y. Lee and H.-K. Lee, "Reversible data hiding exploiting spatial correlation between subsampled images," Pattern Recognition, Vol.42, No.11, pp.3083-3096, 2009.
DOI
ScienceOn
|
24 |
C.D. Vleeschouwer, J.-F. Delaigle, and B. Macq, "Circular interpretation of Bijective transformations in lossless watermarking for media asset management," IEEE Trans. on Multimedia, Vol.5, No.1, pp. 97-105, 2003.
DOI
ScienceOn
|
25 |
J. Fridrich, J. Goljan and R. Du, "Invertible authentication," Proc. of the SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, Vol.4314, pp.197-208, 2001.
|
26 |
M.U. Celik, G. Sharma, A.M. Tekalp and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. on Image Processing, Vol.14, No.2, pp.253-266, 2005.
DOI
ScienceOn
|