|
References
[1]A. M. Alattar, "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Transactions on Image Processing, Vol. 13, 2004, pp. 1147-1156. [2]G. Ateniese, C. Blundo, A. D. Santis and D. R. Stinson, "Visual cryptography for general access structures," Information and Computation, Vol. 129, 1996, pp. 86-106. [3]W. Bender, N. Morimoto and A. Lu, "Techniques for data hiding," IBM Systems Journal, Vol. 35, 1996, pp. 313-336. [4]C. Blundo and A. D. Santis, "Visual cryptography schemes with perfect reconstruction of black pixels," Journal for Computers & Graphics, Vol. 22, 1998, pp. 449-455. [5]M. U. Celik, G. Sharma, A. M. Tekalp and E. Saber, "Reversible data hiding," Proceedings of IEEE International Conference on Image Processing, 2002, pp. 157-160. [6]C. K. Chan and L. M. Chen, "Hiding data in images by simple LSB substitution," Pattern Recognition, Vol. 37, 2004, pp. 469-474. [7]C. K. Chan and L. M. Cheng, "Improved hiding data in images by optimal moderately significant-bit replacement," IEE Electronics Letters, Vol. 37, 2001, pp. 1017-1018. [8]C. C. Chang and G. I. Chen, "Enhancement algorithm for nonlinear context-based predictors," IEE Proceedings Vision, Image & Signal Processing, Vol. 150, 2003, pp. 15-19. [9]C. C. Chang, T. S. Chen and L. Z. Chung, "A steganographic method based upon JPEG and quantization table modification," Informatics and Computer Science, Vol. 141, pp. 123-138, 2002. [10]J. Chen, T. S. Chen, H. C. Hsu and H. W. Chen, "New visual cryptography system based on circular shadow images and fixed angle segmentation," Journal of Electronic Imaging (JEI), Vol. 14, 2005, 033018(1-5). [11]W. J. Chen and S. C. Tai, "The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS," IEEE Transactions on Image Processing, Vol. 9, 2000, pp. 1309-1324. [12]K. L. Chung, C. H. Shen and L. C. Chang, "A novel SVD- and VQ-based image hiding scheme," Pattern Recognition Letters, Vol. 2, 2001, pp. 1051-1058. [13]R. W. Floyd and L. Steinberg, "An adaptive algorithm for spatial greyscale," Proceedings of the Society for Information Display, Vol. 17, 1976, pp. 75-77. [14]J. Fridrich, M. Goljan and R. Du, "Invertible authentication," Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents III, Vol. 3971, 2001, pp. 197-208. [15]J. Fridrich, M. Goljan and R. Du, "Lossless data embedding-New paradigm in digital watermarking," EURASIP Journal on Applied Signal Processing, Vol. 2002, 2002, pp. 185-196. [16]M. Goljan, J. Fridrich and R. Du, "Distortion-free data embedding for images," Proceedings of 4th International Workshop on Information Hiding, Vol. 2137, 2001, pp. 27-41. [17]C. W. Honsinger, P. Jones, M. Rabbani and J. C. Stoffel, "Lossless recovery of an original image containing embedd data," U.S. Patent 6278791 B1, Aug. 21, 2001. [18]Y. C. Hou, "Visual cryptography for color images," Pattern Recognition, Vol. 36, 2003, pp. 1619-1629. [19]J. Jiang, B. Guo and S. Y. Yang, "Revisiting the JPEG-LS prediction scheme," IEE Proceedings Vision, Image & Signal Processing, Vol. 147, 2000, pp. 575-580. [20]X. Li and M. T. Orchard, "Edge-directed prediction for lossless compression of natural images," IEEE Transactions on Image Processing, Vol. 10, 2001, pp. 813-817. [21]B. Macq and F. Deweyand, "Trusted headers for medical images," DFG VIII-D II Watermarking Workshop, Erlangen, Germany, 1999. [22]L. M. Marvel, C. G. Boncelet and C. T. Retter, "Spread spectum image steganography," IEEE Transactions on Image Processing, Vol. 8, 1999, pp. 1075-1083. [23]B. Meyer and P. Tischer, "TMW-a new method for lossless image compression," presented at Picture Coding Symposium, Berlin, Germany, 1997. [24]J. Mielikainen, "LSB matching revisited," IEEE Signal Processing Letters, Vol. 13, 2006, pp. 285-287. [25]M. Naor and A. Shamir, "Visual cryptography," Advances in Cryptology-EUROCRYPT’94, Lecture Notes in Computer Science, Springer-Verlag, Vol. 950, 1995, pp. 1-12. [26]National Bureau of Standards, "Data Encryption Standard," FIPS Publication, US Department of Commerce, Vol. 46, 1977. [27]Z. Ni, Y. Q. Shi, N. Ansari and W. Su, "Reversible data hiding," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, 2006, pp. 354-362. [28]H. Noda, J. Spaulding, N. N. Shirazi and E. Kawaguchi, "Application of bit-plane decomposition steganography to JPEG2000 encoded images," IEEE Signal Processing Letters, Vol. 9, 2002, pp. 410-413. [29]N. Provos and P. Honeyman, "Hide and seek: an introduction to steganography," IEEE Security and Privacy Magazine, Vol. 1, 2003, pp. 32-44. [30]V. Rijmen and B. Preneel, "Efficient colour visual encryption or 'Shared colours of Benetton'," Presented at the rump session of Eurocrypt'96, Also available at http://www.iacr.org/conferences/ec96/rump/preneel.ps [31]R. L. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Communications of the ACM, Vol. 21, 1978, pp. 120-126. [32]B. Schneier, Applied Cryptography. New York: Wiley, 1996. [33]A. Shamir, "How to share a secret," Communications of the ACM, Vol. 22, 1979, pp. 612-613. [34]J. Spaulding, H. Noda, M. N. Shirazi and E. Kawaguchi, "BPCS steganography using EZW lossy compressed images," Pattern Recognition Letters, Vol. 23, 2002, pp. 1579-1587. [35]C. C. Thien and J. C. Lin, "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function," Pattern Recognition, Vol. 36, 2003, pp. 2875-2881. [36]J. Tian, "Reversible data embedding using a difference expansion," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, 2003, pp. 890-896. [37]E. R. Verheul and H. C. A. V. Tilborg, "Constructions and properties of k out of n visual secret sharing scheme," Designs, Codes, and Cryptography, Vol. 1, 1997, pp. 179-196. [38]C. D. Vleeschouwer, J. F. Delaigle and B. Macq, "Circular interpretation on histogram for reversible watermarking," Proceedings of IEEE 4th Workshop Multimedia Signal Processing. France, 2001, pp. 345-350. [39]R. Z. Wang, C. F. Lin and J. C. Lin, "Hiding data in images by optimal moderately significant-bit replacement," IEE Electronics Letters, Vol. 36, 2000, pp. 2069-2070. [40]R. Z. Wang, C. F. Lin and J. C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, Vol. 34, 2001, pp. 671-683. [41]D. C. Wu and W. H. Tsai, "Data hiding in images via multiple-based number conversion and lossy compression," IEEE Transactions on Consumer Electronics, Vol. 44, 1998, pp. 1406-1412. [42]D. C. Wu and W. H. Tsai, "Spatial-domain image hiding using image differencing," IEE Proceedings Vision, Image & Signal Processing, Vol. 147, 2000, pp. 29-37. [43]X. Wu and N. Memon, "Context-based, adaptive, lossless image coding," IEEE Transactions on Communications, Vol. 45, 1997, pp. 437-444. [44]G. Xuan, J. Zhu, J. Chen, Y. Q. Shi, Z. Ni and W. Su, "Distortionless data hiding based on integer wavelet transform," IEE Electronics Letters, Vol. 38, 2002, pp. 1646-1648. [45]Y. H. Yu, C. C. Chang and Y. C. Hu, "Hiding secret data in images via predictive coding," Pattern Recognition, Vol. 38, 2005, pp. 691-705. [46]X. Zhang and S. Wang, "Steganography using multiple-base notational system and human vision sensitivity," IEEE Signal Processing Letters, Vol. 12, 2005, pp. 67-70.
|