|
[1]J. B. Feng, I. C. Lin, C. S. Tsai, and Y. P. Chu, “Reversible watermarking: Current status and key issues,” International Journal of Networks and Security, vol. 2, no. 3, pp. 161-170, 2006. [2]Y. Q. Shi, Z. Ni, D. Zou, C. Liang, and G. Xuan, “Lossless data hiding: Fundamentals, algorithms, and applications,” in Proc. IEEE ISCAS, 2004, pp. 33-36. [3]D. C. Lou, M. C. Hu, and C. Li Liu, “Multiple-layer data hiding scheme for medical image,” Computer Standards and Interfaces, vol. 31, no. 2, pp. 329-335, 2010. [4]Q. M. Al-Qershi and B. E. Khoo, “High capacity data hiding schemes for medical images based on difference expansion, ”Journal of Systems and Software, vol. 31, no. 4, pp. 787-794, 2011. [5]J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. on Circuits Systems for Video Technology, vol. 16, no. 3, pp. 890-896, 2003. [6]A. M. Alttar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Trans. on Image Processing, vol. 13, no. 8, pp. 1147-1156, 2004. [7]C. C. Lee, H. C. Wu, C. S. Tsai, and Y. P. Chu, “Adaptive lossless steganography with centralized difference expansion,” Pattern Recognition, vol. 141, no. 6, pp. 2097-2106, 2008. [8]Z. Ni, Y. Q. Shi, N. Ansar, and W. Su, “Reversible data hiding,” IEEE Trans. on Circuits Systems for Video Technology, vol. 16, no. 3, pp. 354-362, 2006. [9]S. Yousefl, H. Rablee, E. Yousefl, and M. Ghanbarl, “Reversible data hiding using histogram sorting and integer transform,” in Proc. IEEE DEST, 2007, pp. 487-490. [10]C. C. Lin, W. L. Tai, C. C. Chang, “Multilevel reversible data hiding based on histogram modification of difference images,” Pattern Recognition, vol. 41, no. 12, pp. 3582-3591, 2008. [11]P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding,” Signal Processing, vol. 89, no. 6, pp. 1129-1143, 2009. [12]C. H. Yang and M. H. Tsai, “Improving histogram-based reversible data hiding by interleaving prediction,” IET Image Processing, vol. 4, no. 4, pp. 223-234, 2010. [13]C. F. Lee, H. L. Chen, and H. K. Tso, “Embedding capacity raising in reversible data hiding based on prediction of difference expansion,” Journal of Systems and Software, vol. 83, no. 10, pp. 1864-1872, 2010. [14]A. Zhao, H. Luo, Z. M. Lu, J. S. Pan, “Reversible data hiding based on multilevel histogram modification and sequential recovery,” AEU-International Journal of Electronics and Communication, vol. 65, no. 10, pp. 814-826, 2011. [15]H. J. Hwang, H. J . Kim, V. Sachnev, and S. H. Joo, “Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting,” KSII Trans. on Internet and Information Systems, vol. 4, no. 4, pp. 555-670, 2010. [16]X. Li, B. Yang, and T. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Trans. on Image Processing, vol. 20, no. 12, pp. 3524-3533, 2011. [17]W. L. Tai, C. M. Yeh, and C. C. Chang, “Reversible data hiding based on histogram modification of pixel differences,” IEEE Trans. on Circuits Systems for Video Technology, vol. 19, no. 6, pp. 906-910, 2009. [18]Z. Zhao, H. Luo, Z.M. Lu, J.S. Pan, “Reversible data hiding base on multilevel histogram modification and sequential recovery” International Journal of Electronics and Communications (AEU), Int. J. Electron. Commun. (AEU) 65 814–826, 2011. [19]X. Li, B. Li, B. Yang, and T. Zeng, “General framework to histogram-shifting-based reversible data hiding” IEEE Transactions on image processing, vol. 22, no. 6, June 2013. [20]C. Y. Weng, C. H. Yang, C. I. Fan, K. L. Liu, and H. M. Sun, “Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality,” in The 8th Asia Joint Conference on Information Security, Seoul, Korea, July 25-26, 2013. [21]C.C. Lin and N.L. Hsueh, “A lossless data hiding scheme based on three-pixel block differences,” Pattern Recognition, 2008, Vol. 41, No. 4, pp. 1415-1425. [22]J.Y. Hsiao, K.F. Chan, and J.M. Chang, “Block-based reversible data embedding,” Signal Processing, 2009, Vol. 89, Issue 4, pp. 556-569. [23]Y. Hu, H. K. Lee, and J. Li, “DE-based reversible data hiding with improved overflow location map,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 2, pp. 250–260, Feb. 2009. [24]L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, “Reversible image watermarking using interpolation technique,” IEEE Trans. Inf. Forens. Security, vol. 5, no. 1, pp. 187–193, Mar. 2010. [25]W. Hong, “Adaptive reversible data hiding method based on error energy control and histogram shifting,” Opt. Commun., vol. 285, no. 2, pp. 101–108, 2012.
|