|
[1]A.M. Alattar, "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Transactions on Image Processing, Vol. 13, 2004, pp. 1147-1156. [2]R.J. Anderson, F.A.P. Petitcolas, “On the limits of steganography,” IEEE Journal of Selected Areas in Communications, Vol. 16, 1998, pp. 474-481. [3]P. Bao and X. Ma, “Image adaptive watermarking using wavelet domain singular value decomposition,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 15, 2005, pp. 96-102. [4]P. Barreto, H.Y. Kim, and V. Rijmen, “Toward a secure public-key blockwise fragile authentication watermarking,” Proceedings of IEEE International Conference on Image Processing, Vol. 2, 2001, pp. 494-497. [5]W. Bender, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Systems Journal, Vol. 35, 1996, pp. 313-336. [6]R.E Burkard, “Selected topics on assignment problems,” Discrete Applied Mathematics, Vol. 36, 2002, pp. 257-302. [7]C.C. Chang, J.Y. Hsiao, C.S. Chan, “Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy,” Pattern Recognition, Vol. 36, 2003, pp. 1583-1595. [8]C.K Chan, L.M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, Vol. 37, 2004, pp. 469-474. [9]L. H. Chen and J. J. Lin, “Mean quantization based image watermarking,” Image and Vision Computing, Vol. 21, 2003, pp. 717-727. [10]R.M. Davis, The data encryption standard in perspective. Computer Security and the Data Encryption Standard, National Bureau of Standards Special Publication, Feb. 1978. [11]M.S. Fu and O.C. Au, “Data hiding by smart pair toggling for halftone images,” Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 4, 2000, pp. 2318-2321. [12]M.S. Fu and O.C. Au, “Data hiding in halftone images by stochastic error diffusion,” Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 3, 2001, pp. 1965–1968. [13]M.S. Fu and O.C. Au, “Data hiding for halftone images,” Proceedings of SPIE, Vol. 3971, San Diego, California, USA, 2000, pp. 228-236. [14]J. Fridrich, M. Goljan, and R. Du, "Invertible authentication," in SPIE Photonics West, Security and Watermarking of Multimedia Contents III, Vol. 3971. San Jose, CA, 2001, pp. 197-208. [15]J. Fridrich, M. Goljan, and R. Du, "Lossless data embedding-New paradigm in digital watermarking," EURASIP Journal on Applied Signal Processing, Vol. 2002, pp. 185-196. [16]M. Holliman and N. Memon, “Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes,” IEEE Transactions on Image Processing, Vol. 9, No. 3, March 2000, pp. 432-441. [17]K.C. Ho, “Non-causal error diffusion for image halftoning,” Proceedings of IEEE International Symposium on Circuits and Systems, Vol. 5, Arizona, USA, 2002, pp. 257-260. [18]S.Y. Ho, H.M. Chen, L.S. Shu, “Solving large knowledge base partitioning problems using the intelligent genetic algorithm,” Proceedings of the Genetic and Evolutionary Computation Conference, 1999, pp. 1567-1572. [19]N.F. Johnson, S. Jajodia, “Exploring steganography: seeing the unseen,” IEEE Computer Magazine, Vol. 31, No. 2, 1998, pp. 26-34. [20]H.Y. Kim and A. Afif, “A secure authentication watermarking for halftone and binary images,” International Journal of Imaging Systems and Technology, 2004, pp. 147-152. [21]H.W. Kuhn, ”The Hungarian method for the assignment problem,” Naval research logistics quarterly, Vol. 2, 1955, pp. 83-98. [22]S. J. Lee and S. H. Jung, “A survey of watermarking techniques applied to multimedia,” IEEE International Symposium on Industrial Electronics, Vol. 1, Pusan, South Korea, 2001, pp. 272-277. [23]M. Mese and P. P. Vaidyanathan, “Optimized halftoning using dot diffusion and methods for inverse halftoning,” IEEE Transactions on Image Processing, Vol. 9, No. 4, 2000, pp. 691-709. [24]Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, 2006, pp. 354-362. [25]F. Petitcolas, RJ Anderson, and MG Kuhn, “Information hiding - a survey,” Proceedings of the IEEE: special issue on Protection of Multimedia Content, Vol. 87, No. 7, 1999, pp. 1062-1078. [26]R. Rivest, A. Shamir, L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, Vol. 21, No. 2, 1978, pp. 120-126. [27]R. L. Rivest, “The MD5 message digest algorithm,” IETF RFC 1321, April 1992. [28]B. Schneier, Applied Cryptography, second ed., Wiley, New York, 1996. [29]S. Suthaharan, “Fragile image watermarking using a gradient image for improved localization and security,” Pattern Recognition Letters, Vol. 25, 2004, pp. 1893-1903. [30]J. Tian, "Reversible data embedding using a difference expansion," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, 2003, pp. 890-896. [31]C.L. Tsai, H.F. Chiang, K.C. Fan and C.D. Chung, “Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism,” Pattern Recognition, Vol. 38, 2005, pp. 1993-2006. [32]R.G.. Van Schyndel, A.Z. Tirkel, and C.F. Osborne, “A digital watermark,” Proceedings of IEEE International Conference on Image Processing, Vol. 2, 1994, pp. 86-90. [33]R.Z. Wang, C.F. Lin, J.C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, Vol. 34, 2001, pp. 671-683. [34]P.W. Wong, “A watermark for image integrity and ownership verification,” Proceedings of the IS&T PIC Conference, Oregon, Portland, 1998, pp. 374-379. [35]P.W. Wong, “A public key watermark for image verification and authentication,” Proceedings of IEEE International Conference on Image Processing, Vol. 1, 1998, pp. 455-459. [36]P.W. Wong and N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Transactions on Image Processing, Vol. 10, No. 10, 2001, pp. 1593-1601. [37]G. Voyatzis, I. Pitas, "Chaotic mixing of digital images and applications to watermarking," European Conference on Multimedia Applications, Vol. 2, 1996, pp. 687-695. [38]X. Zhang and S. Wang, "Steganography using multiple-base notational system and human vision sensitivity," IEEE Signal Processing Letters, Vol. 12, 2005, pp. 67-70.
|