|
[1]F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding – A survey,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1062–1078, Jul. 1999. [2]C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, pp. 469–474, Mar. 2004. [3]J. Mielikainen, “LSB matching revisited,” IEEE Signal Processing Letters, vol. 13, pp. 285–287, May 2006. [4]X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting modification direction,” IEEE Communications Letters, vol. 10, no. 11, pp. 781–783, Nov. 2006. [5]J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890–896, Aug. 2003. [6]A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, vol. 13, no. 8, pp. 1147–1156, Aug. 2004. [7]V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 7, pp. 989–999, Jul. 2009. [8]D. M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, vol. 16, no. 3, pp. 721–730, Mar. 2007. [9]C. Wang, X. Li, and B. Yang, “Efficient reversible image watermarking by using dynamical prediction-error expansion,” in Proceedings of IEEE International Conference on Image Processing, ICIP’17, Hong Kong, Sep. 2010, pp. 3673–3676. [10]H. J. Hwang, H. J. Kim, V. Sachnev, and S. H. Joo, “Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting,” KSII Transactions on Internet and Information Systems, pp. 655–670, Aug. 2010. [11]X. Li, W. Zhang, X. Gui, and B. Yang, “Efficient reversible data hiding based on multiple histograms modification,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 2016–2027, Sep. 2015. [12]H. J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, and H. G. Choo, “A novel difference expansion transform for reversible data embedding,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 456–465, Sep. 2008. [13]Z. C. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354–362, Mar. 2006. [14]P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, pp. 1129–1143, Jun. 2009. [15]X. Chen, X. Sun, H. Sun, Z. Zhou, and J. Zhang, “Reversible watermarking method based on asymmetric-histogram shifting of prediction errors,” Journal of Systems and Software, vol. 86, no. 10, pp. 2620–2626, Oct. 2013. [16]M. Fallahpour and M. H. Sedaaghi, “High capacity lossless data hiding based on histogram modification,” IEICE Electronics Express, pp. 205–210, Apr. 2007. [17]W. L. Tai, C. M. Yeh, and C. C. Chang, “Reversible data hiding based on histogram modification of pixel differences,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 6, pp. 906–910, Jun. 2009. [18]W. Hong and T. S. Chen, “Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism,” Journal of Visual Communication and Image Representation, vol. 22, no. 2, pp. 131–140, Feb. 2011. [19]C. T. Wang and H. F. Yu, “High-capacity reversible data hiding based on multi-histogram modification,” Multimedia Tools and Applications, vol. 61, no. 2, pp. 299–319, Nov. 2012. [20]T. C. Lu, C. C. Chang, and Y. H. Huang, “High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting,” Multimedia Tools and Applications, vol. 72, no. 1, pp. 417–435, Sep. 2014. [21]T. C. Lu, C. Y. Tseng, and K. M. Deng, “Reversible data hiding using local edge sensing prediction methods and adaptive thresholds,” Signal Processing, vol. 104, pp. 152–166, Nov. 2014. [22]B. Ou, X. Li, and J. Wang, “Improved PVO-based reversible data hiding: A new implementation based on multiple histograms modification,” Journal of Visual Communication and Image Representation, vol. 38, pp. 328–339, Jul. 2016. [23]X. Qu and H. J. Kim, “Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding,” Signal Processing, vol. 111, pp. 249–260, Jun. 2015. [24]H. Xiang, J. Yuan, and S. Hou, “Hybrid predictor and field-biased context pixel selection based on PPVO,” Mathematical Problems in Engineering, vol. 2016, no. 2016, pp. 1–16, Feb. 2016. [25]X. Li, J. Li, B. Li, and B. Yang, “High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion,” Signal Processing, vol. 93, no. 1, pp. 198–205, Jan. 2013. [26]F. Peng, X. Li, and B. Yang, “Improved PVO-based reversible data hiding,” Digital Signal Processing, vol. 25, pp. 255–265, Feb. 2014.
|