|
[1].I. Lai and Wen. Tsai, “Secret-fragment-visible mosaic image-a new computer art and its application to information hiding,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 936–945, Sep. 2011. [2].W.M. Zhang, H. Wang, D. Hou, and N. Yu,” Reversible Data Hiding in Encrypted Images by Reversible Image Transformation”, IEEE Trans. Multimedia, vol. 18, no. 8, Aug. 2016. [3].Y. Lee and W. Tsai, “A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformation,” IEEE Trans. Circuits Syst. Video Technol., vol. 24, no. 4, pp. 695–703, Apr. 2014. [4].I.C. Dragoi, H.G. Coanda and D. Coltuc, “Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction” 2017 25th European Signal Processing Conference (EUSIPCO) [5].I.C. Dragoi and D. Coltuc, “Local-prediction-based difference expansion reversible watermarking,” IEEE Trans. Image Process., vol. 23, no. 4, pp. 1779–1790, Apr. 2014. [6].T. Kalker and F.M. Willems, “Capacity bounds and code constructions for reversible data-hiding,” 14th Int. Conf. Digital Signal Processing, pp. 71-76, 2002. [7].X. Zhang, “Reversible data hiding in encrypted images”, IEEE Signal Process. Lett., vol. 18, pp. 255–258, 2011. [8].W. Hong, T. Chen, and H. Wu, “An improved reversible data hiding in encrypted images using side match”, IEEE Signal Process. Lett., vol. 19, pp. 199–202, 2012. [9].J.C. Chang, Y.H. Chou, C.H. Ni, H.L Wu, “Reversible Data Hiding in Pairwisely Encrypted Images”, 2016 Third International Conference on Computing Measurement Control and Sensor Network, pp. 60–63, 2016. [10].W. Hong, T. Chen, and H. Wu, ”An Improved Reversible Data Hiding Scheme Based On Neighboring Pixel Differences,” IEEE Signal Processing Letters, vol. 19, no. 4, April 2012. [11].M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, ”On compressing encrypted data,” IEEE Transactions on Signal Processing, Vol.52 (10), pages 2992–3006, 2004. [12].H. J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, and H. G. Choo, ”A Novel Difference Expansion Transform for Reversible Data Embedding,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, September. 2008. [13].W. Liu, W. Zeng, L. Dong, and Q. Yao, ”Efficient compression of encrypted grayscale images,” IEEE Transactions on Image Processing, Vol.19 (4), pages 1097–1102, 2010. [14].X. Wu and W. Sun, “High-capacity Reversible Data Hiding in Encrypted Image by Prediction Error,” Signal processing, Vol.104, pp. 387-400, NOV.2014.
|