Reversible Watermarking with Adaptive Embedding Threshold Matrix
暂无分享,去创建一个
Xingming Sun | Yun Q. Shi | Zongmin Cui | Guangyong Gao | Caixue Zhou | Liya Xu | Xingming Sun | Guangyong Gao | Zongmin Cui | Cai-xue Zhou | Yun Q. Shi | Liya Xu
[1] Yih-Kai Lin,et al. High capacity reversible data hiding scheme based upon discrete cosine transformation , 2012, J. Syst. Softw..
[2] S. Pincus. Approximate entropy (ApEn) as a complexity measure. , 1995, Chaos.
[3] Ling Shao,et al. A rapid learning algorithm for vehicle classification , 2015, Inf. Sci..
[4] Bin Gu,et al. Incremental Support Vector Learning for Ordinal Regression , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[5] Jie Zhu,et al. Steganography for MP3 audio by exploiting the rule of window switching , 2012, Comput. Secur..
[6] Nora Cuppens-Boulahia,et al. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting , 2013, IEEE Transactions on Information Forensics and Security.
[7] I. Daubechies,et al. Wavelet Transforms That Map Integers to Integers , 1998 .
[8] Shyr-Shen Yu,et al. A HDWT-based reversible data hiding method , 2009, J. Syst. Softw..
[9] X. Liao,et al. An image encryption approach based on chaotic maps , 2005 .
[10] Yun Q. Shi,et al. Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform , 2015, IEEE Signal Processing Letters.
[11] Chin-Chen Chang,et al. A high payload frequency-based reversible image hiding method , 2010, Inf. Sci..
[12] Jeffrey J. Rodríguez,et al. Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.
[13] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[14] Zhihua Xia,et al. Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.
[15] Yun Q. Shi,et al. Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data Hiding , 2012, IWDW.
[16] Bin Gu,et al. A Robust Regularization Path Algorithm for $\nu $ -Support Vector Classification , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[17] Naixue Xiong,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.
[18] Guangyong Gao. Composite chaos-based lossless image authentication and tamper localization , 2012, Multimedia Tools and Applications.
[19] M. Omair Ahmad,et al. A Study of Multiplicative Watermark Detection in the Contourlet Domain Using Alpha-Stable Distributions , 2014, IEEE Transactions on Image Processing.
[20] Tiegang Gao,et al. A novel reversible robust watermarking algorithm based on chaotic system , 2013, Digit. Signal Process..
[21] Ioan-Catalin Dragoi,et al. Local-Prediction-Based Difference Expansion Reversible Watermarking , 2014, IEEE Transactions on Image Processing.
[22] Wang Jun. A High Performance Reversible Watermarking Scheme Based on Histogram Shifting , 2012 .
[23] Teddy Furon,et al. A New Measure of Watermarking Security: The Effective Key Length , 2013, IEEE Transactions on Information Forensics and Security.
[24] Gang Chen,et al. Full 4-D quaternion discrete Fourier transform based watermarking for color images , 2014, Digit. Signal Process..
[25] Chin-Chen Chang,et al. Reversible data hiding with oriented and minimized distortions using cascading trellis coding , 2015, Inf. Sci..
[26] A. Murat Tekalp,et al. Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.
[27] Qian Wang,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[28] Muhammad Arsalan,et al. Intelligent reversible watermarking in integer wavelet domain for medical images , 2012, J. Syst. Softw..
[29] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[30] Liang Yang,et al. A Reversible Data Hiding Scheme Based on Histogram Modification in Integer DWT Domain for BTC Compressed Images , 2016, Int. J. Netw. Secur..
[31] Chengyun Yang,et al. Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique , 2004, IWDW.
[32] Bin Gu,et al. Incremental learning for ν-Support Vector Regression , 2015, Neural Networks.