1 |
D.-G. Yeo, H.-Y. Lee, and B. M. Kim, "High Capacity Reversible Watermarking using Differential Histogram Shifting and Predicted Error Compensation," Journal of Electronic Imaging, SPIE, Vol.20, No.1, 2011.
|
2 |
S. Lee, C.D. Yoo and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Trans. on Information Forensics and Security, Vol.2, No.3, pp.321-330, 2007.
DOI
ScienceOn
|
3 |
J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. on Circuits and Systems for Video Technology, Vol.13, No.8, pp.890-896, 2003.
DOI
ScienceOn
|
4 |
D.M. Thodi and J.J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. on Image Processing, Vol.16, No.3, pp.721-730, 2007.
DOI
ScienceOn
|
5 |
Z. Ni, Y.-Q. Shi, N. Ansari and W. Su, "Reversible data hiding," IEEE Trans. on Circuits and Systems for Video Technology, Vol.16, No.3, pp.354-362, Mar., 2006.
DOI
ScienceOn
|
6 |
W.-C. Kuo, D.-J. Jiang and Y.-C. Huang, "Reversible data hiding based on histogram," International Conference on Intelligent Computing, Lecture Notes in Artificial Intelligence, Vol.4682, Springer-Verlag, Qing Dao, China, pp.1152-1161, 2007.
|
7 |
S.-K. Lee, Y.-H. Suh and Y.-S. Ho, "Lossless data hiding based on histogram modification of difference images," Pacific Rim Conference on Multimedia, Lecture Notes in Computer Science, Vol.3333, Springer-Verlag, Tokyo, Japan, pp.340-347, 2005.
|
8 |
P. Tsai, Y.-C. Hu and H.-L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Processing, Vol.89, No.6, pp.1129-1143, 2009.
DOI
ScienceOn
|
9 |
K.-S. Kim, M.-J. Lee, H.-Y. Lee and H.-K. Lee, "Reversible data hiding exploiting spatial correlation between sub-sampled images," Pattern Recognition, Vol.42, No.11, pp.3083-3096, 2009.
DOI
ScienceOn
|
10 |
D.-G. Yeo, H.-Y. Lee, B. M. Kim, K.-S. Kim, "Reversible Image Watermarking with Differential Histogram Shifting and Error Prediction Compensation," Journal of KIISE : Software and Applications, Vol.37, No.6, pp.417-429, 2010.
|
11 |
X. Q. Zhou, H. K. Huang, S. L. Lou, "Authenticity and integrity of digital mammography images," IEEE Trans. Medical Imaging, Vol.20, No.8, pp.784-791, Aug., 2001.
DOI
ScienceOn
|
12 |
A. U. Rajendra, D. Anand, B. P. Subbanna, U. C. Niranjan, "Compact storage of medical images with patient information," IEEE Trans. Information Technology in Biomedicine, Vol.5, No.4, pp.320-323, Dec., 2001.
DOI
ScienceOn
|
13 |
G.-J. Yu, C.-S. Lu, H.-Y. M. Liao, "Mean-quantization-based fragile watermarking for image authentication," Optical Engineering, Vol.40, No.7, pp.1396-1408, Jul., 2001.
DOI
ScienceOn
|
14 |
K.-F. Li, T.-S. Chen, S.-C. Wu, "Image tamper detection and recovery system based on discrete wavelet transform," IEEE Pacific Rim Conf. on Communications, Computers and Signal Processing, Vol.1, pp.164-167, Aug., 2001.
|
15 |
P.-L. Lin, P.-W. Huang, A.-W. Peng, "A fragile watermarking scheme for image authentication with localization and recovery," IEEE Sixth International Symposium on Multimedia Software Engineering, pp.146-153, Dec., 2004.
|
16 |
C.-L. Wang, R.-H. Hwang, T.-S. Chen, H.-Y. Lee, "Detecting and restoring system of tampered image based on discrete wavelet transformation and block truncation coding," 19th International Conference on Advanced Information Networking and Applications, 2005.
|
17 |
I. J. Cox, M. Miller, J. A. Bloom, J. Fridrich and T. Kalker, "Digital Watermarking and Steganography," Morgan Kaufmann Publishers Inc., San Francisco, CA, 2007.
|
18 |
P. L. Lin, C. K. Hsieh, P. W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, Vol.38, No.12, pp.2519-2529, Dec., 2005.
DOI
ScienceOn
|
19 |
T.-Y. Lee, S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, Vol.41, No.11, pp.3497-3506, Nov., 2008.
DOI
ScienceOn
|
20 |
M.U. Celik, G. Sharma, A.M. Tekalp and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. on Image Processing, Vol.14, No.2, pp.253-266, 2005.
DOI
ScienceOn
|
21 |
M. Awrangjeb, "An Overview of Reversible Data Hiding," Proc. of the Sixth International Conference on Computer and Information Technology, Jahangirnagar University, Bangladesh, pp.75-79, 2003.
|