1 |
C.F. Lee and Y.L. Huang, "An Efficient Image Interpolation Increasing Payload in Reversible Data Hiding," Expert Systems with Applications, Vol. 39, pp. 6712-6719, 2012.
DOI
|
2 |
J.H. Lee, P.H. Kim, K.H. Jung, and K.Y. Yoo, "Information Hiding Method Based on Interpolation Using Max Difference of RGB Pixel for Color Images," Journal of Korea Multimedia Society, Vol. 20, No. 4, pp. 629-639, 2017.
DOI
|
3 |
B. Jana, D. Giri, and S.K. Mondal, "Weighted Matrix Based Reversible Data Hiding Scheme Using Image Interpolation," Computer Intelligence in Data Mining, Vol. 2, pp. 239-248, 2016.
|
4 |
T.C. Lu, "Interpolation-based Hiding Scheme Using the Modulus Function and Re-encoding Strategy," Signal Processing, Vol. 142, pp. 244-259, 2018.
DOI
|
5 |
K.H. Jung and K.Y. Yoo, "Data Hiding Method Using Image Interpolation," Computer Standards & Interfaces, Vol. 31, pp. 465-470, 2009.
DOI
|
6 |
D.C. Wu and W.H. Tsai, "A Steganographic Method for Images by Pixel-value Differencing," Pattern Recognition Letters, Vol. 24, pp. 1613-1626, 2003.
DOI
|
7 |
Z. Ni, Y.U.N.Q. Shi, N. Ansari and W.E.I. Su, "Reversible Data Hiding," IEEE Transactions on Circuits and System for Video Technology, Vol. 16, No. 3, pp. 354-362, 2006.
DOI
|
8 |
P.H. Kim, K.Y. Ryu, and K.H. Jung, "Reversible Data Hiding Scheme Based on Pixelvalue Differencing in Dual Images," Distributed Sensor Networks, Vol. 16, No. 7, 2020.
|
9 |
J. Hu and T. Li, "Reversible Steganography Using Extended Image Interpolation Technique," Computers and Electrical Engineering, Vol. 46, pp. 447-455, 2015.
DOI
|
10 |
S. Wang, Z. Cao, M.A. Strangio, and L. Wang, "Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol," IEEE Communications Letters, Vol. 12, No. 2, pp. 149-151, 2008.
DOI
|
11 |
C.W. Leung, F.Y. Ng, and D.S. Wong, "On the Security of a Visual Cryptography Scheme for Color Images," Pattern Recognition, Vol. 42, No. 5, pp. 920-940, 2009
|
12 |
W. Bender, D. Gruhl, N. Morimoto, Aiguo Lu, "Techniques for data hiding," IBM Systems Journal, Vol. 35, No. 3-4, pp. 313-336, 1996.
DOI
|
13 |
N.F. Johnson, and S. Jajodia, "Exploring Steganography: Seeing the Unseen," Computer Practices, Vol. 31, No. 2, pp. 26-34, 1998.
|
14 |
F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Information Hiding - a Survey," Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, Vol. 7, No. 87, pp. 1062-1078, 1999.
|
15 |
C. Kurah and J.Mchughes, "A Cautionary Note on Image Downgrading," IEEE Computer Security Applications Conference, Vol. 2, 1992.
|
16 |
X.Li, J. Li, B. Li, and B. Yang, "High-fidelity Reversible Data Hiding Scheme Based on Pixel-value-ordering and Prediction-error expansion," Signal Process, Vol. 93, pp. 198-205, 2013.
DOI
|