|
[1]Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai, “Reversible hiding in DCT-based compressed images,” Information Sciences, Vol. 177, Issue 13, pp. 2768-2786, 2007. [2]H.C. Huang, F.H. Wang and J.S. Pan, “Efficient and robust watermarking algorithm with vector quantization,” Electronics Letters, Vol. 37, pp. 826-828, 2001. [3]H.C. Huang, F.H. Wang and J.S. Pan, “A VQ-based robust multiwatermarking algorithm,” IEICE Transactions on Fundamentals of Electronics, Vol. E85-A, pp. 1719-1726, 2002. [4]Y.H. Ku and X. Sun, “The Chinese remainder theorem,” Journal of The Franklin Institute, Vol. 329, pp. 93-97, 1992. [5]Jiang-Lung Liu, Der-Chyuan Lou, Ming-Chang Chang and Hao-Kuan Tso, “A robust watermarking scheme using self-reference image,” Computer Standards & Interfaces, Vol. 28, pp. 356-367, 2006. [6]D.C. Lou, H.K. Tso and J.L. Liu, “A copyright protection scheme for digital images using visual cryptography technique,” Computer Standards & Interfaces, Vol. 29, pp. 125-131, 2007. [7]Tien-You Lee and Shinfeng D. Lin, “Dual watermark for image tamper detection and recovery,” Pattern Recognition, Vol. 41, pp. 3497-3506, 2008. [8]Shinfeng D. Lin, Shih-Chieh Shie and J.Y. Guo, “Improving the robustness of DCT-based image watermarking against JPEG compression,” Computer Standards & Interfaces, Vol.32, pp.54-60, 2010. [9]Chia-Chen Lin and Pei-Feng Shiu, “DCT-based reversible data hiding scheme,” Journal of Software, Vol. 5, No. 2, pp. 214-224, 2010. [10]Chia-Chen Lin and Pei-Feng Shiu, “High capacity data hiding scheme for DCT-based images,” Journal of Information Hiding and Multimedia Signal Processing, Vol. 1, No. 3, pp. 220-240, 2010. [11]Jagdish C. Patra, Jiliang E. Phua and Cedric Bornand, “A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression,” Digital Signal Processing, Vol. 20, pp. 1597-1611, 2010. [12]Jagdish C. Patra, A. Karthik and Cedric Bornand, “A novel CRT-based watermarking technique for authentication of multimedia contents,” Digital Signal Processing, Vol. 20, pp. 442-453, 2010. [13]Jau-Ji Shen and Jia-Min Ren, “A robust associative watermarking technique based on vector quantization,” Digital Signal Processing, Vol. 20, pp. 1408-1423, 2010. [14]Han-Min Tsai and Long-Wen Chang, “Secure reversible visible image watermarking with authentication,” Signal Processing: Image Communication, Vol. 25, pp. 10-17, 2010. [15]Chun-Wei Yang and Jau-Ji Shen, “Recover the tampered image based on VQ indexing,” Signal Processing, Vol. 90, pp. 331-343, 2010.
|