|
[1]S.K. Bandyopadhyay, D. Bhattacharyya, D. Debnath and P. Das. (2008) “Bi-Color Nonlinear Data Embedding and Extraction of Handwritten Signature” Industrial Electronics and Applications, ICIEA 2008. 3rd IEEE Conference on. IEEE, p1896 -1901. [2] J. Y. Byun, K. H. Jung and K.Y. Yoo. (2008) “Improve Data Hiding Method by Block Parity for Binary Images” Computer Science and Software Engineering, 2008 International Conference on (Volume:3 ). IEEE, p 931 - 934. [3]C. C. Chang, Y. H. Huang and W. C. Chang. (2015) “Reversible data hiding for VQ indices using XOR operator and SOC codes” Machine Learning and Cybernetics (ICMLC), International Conference on . IEEE, p 340 - 345. [4]H. Cao. and A.C. Kot (2012) “EAG: Edge Adaptive Grid Data Hiding for Binary Image Authentication” Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), Asia-Pacific. IEEE,p1 –6. [5] B. Feng, W. Lu and W. Sun.(2014) “Reversible Data Hiding Method Based on Exclusive-OR with Two Host Images” Trustworthy Systems and their Applications (TSA), International Conference on. IEEE, p 69 – 74. [6]J.M. Guo, G.H. Lai,K.S. Wong and L.C. Chang(2015) “Progressive Halftone Watermarking Using Multilayer Table Lookup Strategy” Image Processing, IEEE Transactions on (Volume:24 , Issue: 7 ) .IEEE, p 1057-7149. [7]M. Guo and H. Zhang. (2010) “High Capacity Data Hiding for Binary Image Authentication” Pattern Recognition (ICPR), 20th International Conference on. IEEE, p 1441 - 1444. [8]Q. Hou, D. Junping, Li Li, J. Lu And C.C. Chang.(2014) “Scanned binary image watermarking based on additive model and sampling” Springer Science+Business Media New York ,2014 Multimedia Tools and Applications, Multimedia Tools and Applications, Volume 74, Issue 21 , pp 9407-9426. [9]P. T. Huy1 and C. Kim. (2013) “Binary Image Data Hiding Using Matrix Encoding Technique in Sensors” International Journal of Distributed Sensor Networks Volume, Article ID 340963, 7 pages. [10]K.H. Jung, K.S. Ha and K.Y. Yoo. (2008) “Data Hiding in Binary Images by Pixel-valueWeighting” International Conference on Convergence and Hybrid Information Technology, Seventh International Conference on. IEEE, p 262 - 265. [11]S. Khan and A. Bhattacharya. (2015) “Secure Data Pixels for Binary Host Images Using Edge-Adaptive Grid Technique” Communication Technologies (GCCT), Global Conference on . IEEE,p 691 - 695. [12]K. T. Lin. (2011) “Data Encrypting In A Binary Image Base On Modified Data Hiding Method” Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Seventh International Conference on. IEEE, p 69 - 72. [13]C.C. Lo ,C.M. Lee, B.Y. Liao and J.S. Pan (2008) “Halftone Image Data Hiding with Reference to Original Multitone Image” Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP '08 International Conference on. IEEE, p265 - 268. [14]R. Naskar and R. S. Chakraborty. (2011) “Lossless Data Hiding for Halftone Images” Image Information Processing (ICIIP), International Conference on. IEEE,p 1 - 6. [15] H. Tirandaz, R. Davarzani and, M. Monemizadeh and J. Haddadnia. (2009) “Invisible and High Capacity Data Hiding in Binary Text Images Based on Use of Edge Pixels” International Conference on Signal Processing Systems. IEEE, p 130 - 134. [16]C.C. Wang, Y.F. Chang, C.C. Chang, J.K. Jan and C.C. Lin, (2014) “A high capacity data hiding scheme for binary images based on block patterns” The Journal of Systems and Software 93. ScienceDirect, p152 –162. [17]X.Y. Yu and A. Wang. (2009) “Chain Coding Based Data Hiding in Binary Images” Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP '09. Fifth International Conference on. IEEE, p 933 - 936. [18]C.-H.T. Yang , Y. T. Hsu , C.C. Wu And J.W. Chang.(2014) “Reversible Data Hiding Method Based on Exclusive-OR with Two Host Images” Trustworthy Systems and their Applications (TSA), International Conference on. IEEE,p 69 – 74. [19]H.B. Zhang and L. Man (2008) “Data hiding in binary line drawing images” Wavelet Analysis and Pattern Recognition, 2008. ICWAPR '08. International Conference on (Volume:1 ). IEEE, p 134 - 140.
|