|
[1] K. H. Jung and K. Y. Yoo, “Data hiding method using image interpolation,” Computer Standards &; Interfaces, vol. 31, pp. 465-470. Feb. 2009. [2] C.-F. Lee and Y.-L. Huang, “An efficient image interpolation increasing payload in reversible data hiding,” Expert Systems with Applications, vol. 39, issue 8, pp. 6712-6719, June 2012. [3] C.-K. Chan and L.-M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, pp. 469-474, March 2004. [4] C.-H. Yang, C.-Y. Weng, S.-J. Wang, and H.-M. Sun, “Adaptive data hiding in edged areas of images with spatial LSB domain systems,” IEEE Transactions on Information Forensics and Security, vol. 3, pp. 488-497, Sep. 2008. [5] W.-J. Chen, C.-C. Chang, and T. H. N. Le, “High payload steganography mechanism using hybrid edge detector,” Expert Systems with Applications, vol. 37, pp. 3292-3301, April 2010. [6] C.-F. Lee and H.-L Chen, “A novel data hiding scheme based on modulus function,” Journal of Systems and Software, vol. 83, pp. 832-843, May 2010. [7] H.-M. Sun, C.-Y. Weng, C.-F., Lee, and C.-H. Yang, “Anti-forensics with steganographic data embedding in digital images,” IEEE Journal on Selected Areas in Communications, vol. 29, pp. 1392-1403, Aug. 2011. [8] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp. 890-896, Aug. 2003. [9] A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, vol. 13, pp. 1147-1156, Aug. 2004. [10] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized-LSB data embedding,” IEEE Transactions on Image Processing, vol. 14, pp. 253-266, Feb. 2005. [11] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, pp. 354-362, Mar. 2006. [12] C.-F. Lee and W.-T. Chang, “Recovery of color images by composed associative mining and edge detection,” Journal of Information Hiding and Multimedia Signal Processing, vol. 1, pp. 310-324, July 2010. [13] C.-F. Lee, C.-C. Chang, P.-Y. Pai, and W.-H. Huang, “An effective demosaicing method for CFA image,” International Journal of Innovative Computing, Information and Control, vol. 6, pp. 5485-5499, Dec. 2010. [14] T. M. Lehmann, C. Gonner, and K. Spitzer, “Survey: interpolation methods in medical image processing,” IEEE Transactions on Medical Imaging, vol. 18, pp. 1049-1075, Nov. 1999. [15] P. Thévenaz, T. Blu, and M. Unser, “Interpolation revisited,” IEEE Transactions on Medical Imaging, vol. 19, pp. 739-758, July 2000.
|