參考文獻
[1]A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Trans. Image Process., Vol. 13, No. 8, pp. 1147-1156, 2004.
[2] B. G. Mobasseri, R. J. Berger, M. P. Marcinak, and Y. J. NaikRaikar, “Data Embedding in JPEG Bitstream by Code Mapping,” IEEE Transactions on Image Processing, Vol. 19, Issue 4, pp. 958 – 966, April 2010.
[3]C. C. Chang, and T. C. Lu, “Reversible Index-domain Information Hiding Scheme Based on Side- Match Vector Quantization,” Journal of System and Software, Vol. 79, No. 8, pp. 1120-1129, 2006.
[4]C. C. Chang, P. Y. Pai, C. M. Yeh, Y. K. Chan, “A high payload frequency-based reversible image hiding method,” Information Sciences, Vol. 180, Issue 11, pp. 2286–2298, June 2010.
[5] C. C. Chang, T. D. Kieu, “A reversible data hiding scheme using complementary embedding strategy,” Information Sciences, Vol. 180, Issue 16, pp. 3045–3058, August 2010.
[6] C. C. Chang, W. L. Tai, C. C. Lin, “A Reversible Data Hiding Scheme Based on Side Match Vector Quantization,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, Issue 10, pp. 1301 – 1308, Oct. 2006.
[7] C. C. Lin, W. L. Tai, C. C. Chang, “Multilevel reversible data hiding based on histogram modification of difference image,” Pattern Recognition, Vol. 41, Issue 12, pp. 3582–3591, December 2008.
[8] C. F. Lee, H. L. Chen, H. K. Tso, “Embedding capacity raising in reversible data hiding based on prediction of difference expansion,” The
103
Journal of Systems and Software, Vol. 83, Issue 10, pp. 1864–1872, October 2010.
[9] C. F. Lee, Y. H. Huang, C. C. Chang, T. C. Liu, “A Prediction-Based Adaptive Reversible Data Embedding Scheme,” Journal of Software, Vol. 6, No 9, pp. 1813-1820, September 2011.
[10] C. H. Yang, M. H. Tsai, “Improving histogram-based reversible data hiding by interleaving predictions,” IET, Image Processing, Vol. 4, Issue 4, pp. 223–234, August 2010.
[11] C. K. Chan, L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, Vol. 37, Issue 3, pp. 469-474, March 2004.
[12] C. N. Lin, D. J. Buehrer, C. C. Chang, T. C. Lu, “Using quad smoothness to efficiently control capacity-distortion of reversible data hiding,” The Journal of Systems and Software, Vol. 83, Issue 10, pp. 1805-1812, October 2010.
[13] C. T. Hsu and J. L. Wu, “Hidden Digital Watermarks in Images,” IEEE Transaction on Image Processing, Vol. 8, Issue 1, pp.58-68, January 1999.
[14] D. M. Thodi and J. J. Rodriguez, “Prediction-error based reversible watermarking,” in Proc. IEEE Int. Conf. Image Process., Vol. 3, pp. 1549-1552, 2004.
[15] E. T. Lin and E. J. Delp, “A Review of Fragile Image Watermarks,” Proceeding of the Multimedia and Security Workshop, Florida, pp. 25-29, USA October 1999.
[16] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information Hiding A-Survey,” Proceedings of the IEEE, Vol.87, No. 7, pp.1062-1078, 1999.
[17] F. H. Hsu , M. H. Wu, S. J. Wang “Dual-watermarking by QR-code Applications in Image Processing ”Proc. of 9th IEEE International Conference
104
on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, pp. 638-643, 2012.
[18] F. Peng, X. Li, B. Yang, “Adaptive reversible data hiding scheme based on integer transform,” Signal Processing, Vol. 92, Issue 1, pp. 54–62, January 2012.
[19] H. C. Huang, F. C. Chang, W. C. Fang, “Reversible Data Embedding Using a Difference Expansion for QR code applications” IEEE Transactions on Consumer Electronics, , Vol. 57, Issue 2, , pp. 779–787,May 2011
[20] H. C. Huang, Y. H. Chen, Y. Y. Lu, “Histogram-Based Difference Expansion for Reversible Data Hiding with Content Statistics,” Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 37 – 40, 2011.
[21] H. Luo, F. X. Yu, H. Chen, Z. L. Huang, H. Li, P. H. Wang, “Reversible data hiding based on block median preservation,” Information Sciences, Vol. 181, Issue 2, pp. 308–328, January 2011.
[22] H.W. Tseng, C.P. Hsieh ,”Prediction-based reversible data hiding”. Inform Sci Vol.179, No.14, pp. 2460-2469,2009
[23] ISO/IEC 18004:information technology-Automatic identification and data capturetechniques- Bar code symbology- QR Code
[24] J. Fridrich, M. Goljan, R. Du, “Invertible authentication watermark for JPEG images,” Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Content, San Jose, CA, pp.223-227, 2001.
[25] J. Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Transaction on Circuits and Systems for Video Technology, Vol. 13, No. 8, August 2003.
105
[26] K. H. Jung, K.Y. Yoo, “Data hiding method using image interpolation,” Computer Standards & Interfaces, Vol. 31, Issue 2, pp. 465–470, February 2009.
[27] K. L. Chung, C. H. Shen, L. C. Chang, “A novel SVD- and VQ-based image hiding scheme,” Pattern Recognition Letters, Vol. 22, Issue 9, Pages 1051–1058, July 2001.
[28] K. S. Kim, M. J. Lee, H. Y. Lee, H. K. Lee, “Reversible data hiding exploiting spatial correlation between sub-sampled images,” Pattern Recognition, Vol. 42, Issue 11, pp. 3083–3096, November 2009.
[29] L. Kamstra, and H. J. A. M. Heijmans, “Reversible data embedding into image using wavelet techniques and sorting,” IEEE Trans. Image Process., Vol. 14, No. 12, pp. 2082-2090, 2005.
[30] M. S. Kankanhalli, K. R. Ramakrishnan, “Adaptive visible watermarking of images,” IEEE International Conference on Multimedia Computing and Systems, Vol.1, pp. 568 – 573, 1999.
[31] M. U. Celik, G. Sharma, A. M. Tekalp, E. Saber, “Reversible data hiding,” Proceedings of IEEE International Conference on Image Processing, Vol. 2, pp. 157-160, 2002.
[32] P. Tsai, “Histogram-based reversible data hiding for vector quantisation-compressed images,” IET, Image Processing, Vol. 3, Issue 2, pp. 100 - 114, April 2009.
[33] P. Tsai, Y. C. Hu, H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, Vol. 89, Issue 6, pp. 1129–1143, June 2009.
[34] R. B. Wolfgang and E. J. Delp, “Fragile Watermarking Using the VW2D Watermark,” Proceeding of the IS&T/SPIE Conference on Security and
106
Watermarking of Multimedia Contents, San Jose, California, pp. 204-213, January 1999.
[35] R. Chu, X. You, X. Kong, X. Ba, “A DCT-based image steganographic method resisting statistical attacks,” IEEE International Conference on Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04), Vol.5, pp. 953-6, May 2004.
[36] S. P. Mohanty, K. R. Ramakrishnan, M. S. Kankanhalli, “A DCT domain visible watermarking technique for images,” IEEE International Conference on Multimedia and Expo, 2000, ICME 2000, Vol. 2, pp. 1029 – 1032, 2000.
[37] S.Y. Wang, C. Y. Li, W. C. Kuo, “Reversible data hiding based on two-dimensional prediction errors,” IET, Image Processing, Vol. 7, Issue 9, pp. 805–816, December 2013
[38] T.C. Lu, C.C. Chang, Y.H. Huang”High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shiftingMultimedia” Tools and Applications,Vol.72, Issue 1, pp.417-435,Sep. 2014,
[39] V. Solachidis, L. Pitas, “Circularly symmetric watermark embedding in 2-D DFT domain,” IEEE Transactions on Image Processing, Vol. 10, Issue 11, pp. 1741 – 1753, 2001.
[40] W. C. Chu, “DCT-based image watermarking using subsampling,” IEEE Transactions on Multimedia, Vol. 5, Issue 1, pp.34 – 38, March 2003.
[41] W. Hong, T. S. Chen, “Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism,” Journal of Visual Communication and Image Representation, Vol. 22, Issue 2, pp. 131-140, 2011.
107
[42] W. L. Tai, C. M. Yeh, C. C. Chang, “Reversible Data Hiding Based on Histogram Modification of Pixel Differences ,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 19, Issue 6, pp. 906-910, June 2009.
[43] W.Hong , T.S.Chen”Reversible data embedding for high quality images using interpolation andreference pixel distribution mechanism” J Vis Commun Image Represent, Vol.22 no.2,pp:131–140,2011
[44] X. G. Xia, C. Boncelet, and G. Arce, “Wavelet transform based watermark for digital images,” OPTICS EXPRESS, Vol. 3, Issue 12, pp. 497-511, 1998.
[45] Y. Hu, H. K. Lee, and J. Li, “DE-Based Reversible Data Hiding With Improved Overflow Location Map,” IEEE Transaction on Circuits and Systems for Video Technology, Vol. 19, No. 2, February 2009.
[46] Y. Y. Tsai, C. S. Chan, “A Novel Cluster-Based Difference Expansion Transform for Lossless Data Hiding,” Fifth International Conference on Genetic and Evolutionary Computing (ICGEC), pp. 172 – 175, 2011
[47] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” IEEE Transaction on Circuits and Systems for Video Technology, Vol. 16, No.3, March 2006.
[48] 多媒體安全技術, 呂慈純, 陸哲明, 張真誠 著, 全華圖書股份有限公司.
[49] 挑戰影像處理, 潘正祥, 張真誠, 林詠章 著, 滄海書局出版.
[50] 陳文淵, 卓江南, “資訊隱藏技術之研究,” 勤益學報第二十一卷第一期, pp. 117-132.[51] 數位影像處理 數位影像處理 ,徐曉珮 徐曉珮 譯,高立圖書有限公司 高立圖書有限公司 高立圖書有限公司 高立圖書有限公司 .