|
[1] D. A. Huffman, “A method for the construction of minimum redundancy codes,” Resonance, vol. 11, pp. 91-99, 2006. [2] T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, “Introduction to algorithms,” 2nd edition, Cambridge, MA, MIT Press, 2001. [3] National Institute of Standards & Technology, “Data encryption standard (DES),” Federal Information Processing Standards Publication, vol. 46, 1977. [4] National Institute of Standards & Technology, “Announcing the advanced encryption standard (AES),” Federal Information Processing Standards Publication, vol. 197, 2001. [5] R. L. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, pp. 120-126, 1978. [6] C. H. Yang, C. Y. Weng, S. J. Wang and H. M. Sun, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Transactions on Information Forensics and Security, vol. 3, pp. 488-497, 2008. [7] C. C. Chang, J. Y. Hsiao and C. S. Chan, “Finding optimal LSB substitution in image hiding by dynamic programming strategy,” Pattern Recognition, vol. 36, pp. 1583-1595, 2003. [8] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp. 890-896, 2003. [9] D. M. Thodi and J. J. Rodríguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, vol. 16, pp. 721-730, 2007. [10] X. Zhang and S. Wang, “Fragile watermarking scheme using a hierarchical mechanism,” Signal Processing, vol. 89, no. 4, pp. 675-679, April 2009. [11] Y. Lee, H. Kim and Y. Park, “A new data hiding scheme for binary image authentication with small image distortion,” Information Sciences, vol. 179, no. 22, pp. 3866-3884, November 2009. [12] S. H. Liu, H. X. Yao, W. Gao and Y. L. Liu, “An image fragile watermark scheme based on chaotic image pattern and pixel-pairs,” Applied Mathematics and Computation, vol. 185, no. 2, pp. 869-882, February 2007. [13] M. Holliman and N. Memon, “Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes,” IEEE Transactions on Image Processing, vol. 9, no. 3, pp. 432-441, March 2000. [14] M. Holliman and N. Memon, “Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes,” IEEE Transactions on Image Processing, vol. 9, no. 3, pp. 432-441, March 2000. [15] Z. Dawei, C. Guanrong and L. Wenbo, “A chaos-based robust wavelet-domain watermarking algorithm,” Choas, Solitons & Fractals, vol. 22, pp. 47-54, October 2004. [16] A. Mooney and J. G. Keating. “Generation and detection of watermarks derived from chaotic functions,” Proceedings of Opto-Ireland 2005: Imaging and Vision, vol. 5823, pp. 58-69, Dublin, June 2005. [17] Z. Dawei, C. Guanrong and L. Wenbo, “A chaos-based robust wavelet-domain watermarking algorithm,” Choas, Solitons & Fractals, vol. 22, pp. 47-54, October 2004. [18] A. Mooney, J. G. Keating and I. Pitas, “A comparative study of chaotic and white noise signals in digital watermarking,” Chaos, Solitons & Fractals, vol. 35, no. 5, pp. 913-921, March 2008. [19] R. W. Hamming, “Error detecting and error correcting codes,” Bell system technical journal, vol. 26, no. 2, pp. 147-160, April 1950. [20] R. M. Gray, “Vector quantization,” IEEE Transactions on Acoustics, Speech and Signal Processing, pp. 4-29, 1984. [21] Y. Linde, A. Buzo and R. M. Gray, “An algorithm for vector quantizer design,” IEEE Transactions on Communications, vol. 28, pp. 84-95, 1980. [22] Z. H. Wang, K. N. Chen, C. C. Chang and M. C. Li, “Hiding information in VQ index tables with reversibility,” Proceedings of the Second International Workshop on Computer Science and Engineering, Qingdao, China, pp. 1-6, October 2009. [23] J. X. Wang and Z. M. Lu, “A path optional lossless data hiding scheme based on VQ joint neighboring coding,” Information Sciences, vol. 179, no. 19, pp. 3332-3348, 2009.
|