|
[1]M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Reversible Data Hiding,” IEEE Int. Conf. Image Process, Vol. 2, pp. 157-160, New York, USA, 2002. [2]J. Tian, “Reversible Data Embedding Using A Difference Expansion,” IEEE Trans. Circuits Syst. Video Technology, Vol. 13, No. 8, pp. 90–896, Aug. 2003. [3]C. C. Lin, W. L. Tai, and C. C. Chang, “Multilevel Reversible Data Hiding based on Histogram Modification of Difference Images,” Pattern Recognition, Vol. 41, pp. 3582-3591, Florida, USA, 2008. [4]曾顯文;蔡逸民, “階層式預測之可逆式資訊隱藏技術,” International Journal of Advanced Information Technologies, Vol.5, pp. 73-90, 2011. [5]陳同孝, 洪維恩, 吳玫珍, “基於最少像素位移的可逆式資訊隱藏技術,” 2011全國計算機會議, pp. 82-89, 國立嘉義大學, 嘉義, 台灣, Dec 2-3, 2011. [6]楊政興, 蔡孟璇, 黃建銘, 吳敏豪,“植基於交錯式預測法之可逆資訊隱藏技術,” TANET 2008 台灣網際網路研討會, pp.127-132, 義守大學, 高雄, 台灣, Oct 20-22, 2008. [7]C. C. Chang, W. C. Wu, and Y. C. Hu, “Lossless Recovery of a VQ Index Table with Embedded Secret Data,” Journal of Visual Communication and Image Representation, Vol. 18, pp. 207-216, 2007. [8]吳大鈞、曾龍順, “一般性多重調整直方圖之無失真資料嵌入法,” 第十六屆全國資訊安全會議, pp. 528-536, 逢甲大學, 台中, 台灣, Jun 8-9, 2006. [9]K.Prasada Rao, B.A.David and P.D.Ratna Raju. “Binary Tree Approach for Data Hiding Based on Histogram Modification,” International Journal of Computer Applications, Vol.5, pp. 21–24, Aug 2010. [10]楊政興, 孔芃勝, 劉俊緯, “二元影像上利用格雷碼特徵及直方圖修改的可逆式資訊隱藏技術,” 2011全國計算機會議, pp. 1-8, 國立嘉義大學, 嘉義, 台灣, Dec 2-3, 2011. [11]H.-M. Yoo, S.-K. Lee, J.-W. Suh, “High Capacity Reversible Data Hiding Using the Histogram Modification of Block Image,” Proceedings of 2010 IEEE International Symposium on Circuits and Systems(ISCAS), pp. 1137-1140, Paris, France, May 30 2010-June 2, 2010. [12]S.-K. Lee, H.-M. Yoo, Y.-H. Suh, J.-W. Suh, “Improved Reversible Data Hiding Based on Histogram Modification of Difference Images,” 2010 Digest of Technical Papers International Conference on Consumer Electronics, pp. 181-182, Las Vegas, Nevada, U.S. A, Jan 9-13, 2010. [13]P. Tsai, Y. C. Hu, and H. L. Yeh, “Revrsible Image Hiding Scheme Using Predictive Coding and Histogram Shifting,” Signal Processing, Vol. 89, pp. 1129-1143, Taipei, Taiwan, 2009. [14]方杏鑫, 吳昭明, “差值擴張可逆式浮水印之性能提升,” 2011全國計算機會議, pp. 48-57, 國立嘉義大學, 嘉義, 台灣, Dec 2-3, 2011. [15]M. Alattar, “Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform,” IEEE Trans. Image Process, Vol.13, No. 8, pp. 1147–1156, Aug. 2004. [16]V. Sachnev, H. J. Kim, and J. Nam, S. Suresh, Y. Q. Shi, “Reversible Watermarking Algorithm Using Sorting and Prediction,” IEEE Trans. Circuits Syst. Video Technol, Vol. 19, No. 7, pp. 989–999, Jul. 2009. [17]L. Kamstra and H. J. A. M. Heijmans, “Reversible Data Embedding Into Images Using Wavelet Techniques and Sorting,” IEEE Trans. Image Process, Vol. 14, No. 12, pp. 2082–2090, Dec. 2005. [18]D. M. Thodi and J. J. Rodriguez, “Expansion Embedding Techniques for Reversible Watermarking,” IEEE Transactions on Image Processing, Vol. 16, pp. 723-730, 2007. [19]林士倫, 鄭宇哲, 陳建源, 施能寅, “九宮格式直方圖的可逆式資訊隱藏技術,”臺灣網際網路研討會暨全球IPv6高峰會議, pp. 1285-1294, 國立彰化師範大學, 彰化, 台灣, 2009. [20]鄭宇哲, 陳建源, 王俊欽, 曾宥傑,“基於相鄰梯度預測法之直方圖可逆資訊隱藏技術,”中華民國第一屆網路智能與應用研討會, pp. 204-208,國立高雄大學, 高雄,台灣, Apr. 2011. [21]陳信宏, 鄭宇哲, 陳建源, 黃健峯, “二維直方圖的可逆資訊隱藏技術,” 第十七屆資訊管理暨實務研討會, 光碟論文集, 嘉南藥理科技大學, 台南, 台灣, Dec 10, 2011. [22]Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” IEEE Transaction on Circuits and Systems for Video Technology, Vol. 16, pp. 354-362, 2006. [23]楊政興, 蔡孟璇, 黃正達, “以棋盤式預測法改善直方圖可逆資訊隱藏技術,”第十九屆資訊安全會議(CISC2009), 台灣科技大學, 6月, 2009。 [24]X. Wu and N. Memon, “Context-Based, Adaptive, Lossless Image Codec,” IEEE Trans. Commun., Vol. 45, pp. 437–444, Apr. 1997. [25]Coltuc, D., “Improved Embedding for Prediction-Based Reversible Watermarking,” IEEE Transactions on Information Forensics and Security, Vol. 6, pp. 873-882, 2011. [26]Xiaolin Chen, Nishan Canagarajah, and Jose L. Nunez-Yanez, “Lossless Multi-Mode Interband Image Compression and Its Hardware Architecture,” Lecture Notes in Electrical Engineering, Vol. 73, pp. 3-26, 2011. [27]T. Meyyappan, S. M. Thamarai, and N. M. Jeya Nachiaban, “A New Method for Lossless Image Compression Using Recursive Crack Coding,” Communications in Computer and Information Science, Vol. 205, pp. 128-135, 2011. [28]S. L. Lin, C. F. Huang, M. H. Liou and C. Y. Chen, “Improving Histogram-Based Reversible Information Hiding by an Optimal Weighted-Based Prediction Scheme,” Journal of information Hiding and Multimedia Signal Processing, Vol. 4, No. 1, pp.19-33, 2013. [29]李宥誠, 陳信宏, 陳建源,“相鄰梯度權重預測法之直方圖可逆資訊隱藏技術,” 第十二屆離島資訊技術與應用研討會, 光碟論文集, 國立金門大學, 金門,台灣, May. 2013. [30]Y.C. Lee, H.-H. Chen, and C.-Y. Chen, “Reversible Data Hiding Based on Histogram by Using Gradient Adjacent Prediction,” International Conference on Information and Social Science, Nagoya, Sep. 2013.
|