High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation
暂无分享,去创建一个
Xiaochun Cao | Dan Meng | Xiaojie Guo | Xingxing Wei | Ling Du | Xiaochun Cao | Xiaojie Guo | Xingxing Wei | Dan Meng | Ling Du
[1] Cordelia Schmid,et al. Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search , 2008, ECCV.
[2] Rui Du,et al. Invertible authentication watermark for JPEG images , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[3] Ajay Luthra,et al. Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..
[4] Tung-Shou Chen,et al. An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.
[5] Zhenxing Qian,et al. Efficient reversible data hiding in encrypted images , 2014, J. Vis. Commun. Image Represent..
[6] Yu-Chen Hu,et al. Reversible image hiding scheme using predictive coding and histogram shifting , 2009, Signal Process..
[7] Chin-Feng Lee,et al. Reversible data hiding scheme based on dual stegano-images using orientation combinations , 2011, Telecommunication Systems.
[8] M. Elad,et al. $rm K$-SVD: An Algorithm for Designing Overcomplete Dictionaries for Sparse Representation , 2006, IEEE Transactions on Signal Processing.
[9] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[10] Konstantinos N. Plataniotis,et al. An Analysis of Random Projection for Changeable and Privacy-Preserving Biometric Verification , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[11] Heung-Kyu Lee,et al. Difference Expansion Based Reversible Data Hiding Using Two Embedding Directions , 2008, IEEE Transactions on Multimedia.
[12] Gwoboa Horng,et al. (k, n)-Image Reversible Data Hiding , 2014, J. Inf. Hiding Multim. Signal Process..
[13] Michael Elad,et al. Analysis K-SVD: A Dictionary-Learning Algorithm for the Analysis Sparse Model , 2013, IEEE Transactions on Signal Processing.
[14] A. Bruckstein,et al. K-SVD : An Algorithm for Designing of Overcomplete Dictionaries for Sparse Representation , 2005 .
[15] Bin Luo,et al. Separable and Error-Free Reversible Data Hiding in Encrypted Image with High Payload , 2014, TheScientificWorldJournal.
[16] Jeng-Shyang Pan,et al. Parity-invariability-based reversible watermarking , 2009 .
[17] Kumar Parasuraman,et al. Reversible image watermarking using interpolation technique , 2014, 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE).
[18] Gary J. Sullivan,et al. Video Compression - From Concepts to the H.264/AVC Standard , 2005, Proceedings of the IEEE.
[19] Din-Chang Tseng,et al. Image subband coding using fuzzy inference and adaptive quantization , 2003, IEEE Trans. Syst. Man Cybern. Part B.
[20] Weiming Zhang,et al. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.
[21] Chin-Chen Chang,et al. Reversible Data Hiding Based on Histogram Modification of Pixel Differences , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[22] Jeho Nam,et al. A Novel Difference Expansion Transform for Reversible Data Embedding , 2008, IEEE Transactions on Information Forensics and Security.
[23] Luc Van Gool,et al. The Pascal Visual Object Classes (VOC) Challenge , 2010, International Journal of Computer Vision.
[24] Xuelong Li,et al. Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[25] Tieyong Zeng,et al. Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.
[26] Michael Elad,et al. Compression of facial images using the K-SVD algorithm , 2008, J. Vis. Commun. Image Represent..
[27] Chin-Chen Chang,et al. Multilevel reversible data hiding based on histogram modification of difference images , 2008, Pattern Recognit..
[28] Vinod M. Prabhakaran,et al. On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.
[29] Chien-Feng Huang,et al. Improving Histogram-based Reversible Information Hiding by an Optimal Weight-based Prediction Scheme , 2013, J. Inf. Hiding Multim. Signal Process..
[30] Frank Y. Shih,et al. Genetic algorithm based methodology for breaking the steganalytic systems , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[31] Weiming Zhang,et al. Reversibility improved data hiding in encrypted images , 2014, Signal Process..
[32] Edgar R. Weippl,et al. Framework Based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.
[33] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[34] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[35] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[36] Yao Zhao,et al. Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.
[37] Shiguo Lian,et al. Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[38] Xinpeng Zhang,et al. Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.
[39] Yao Zhao,et al. Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs , 2008, IEEE Signal Processing Letters.
[40] Dinu Coltuc,et al. Improved Embedding for Prediction-Based Reversible Watermarking , 2011, IEEE Transactions on Information Forensics and Security.
[41] David Zhang,et al. Fast block-based image restoration employing the improved best neighborhood matching approach , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[42] Alessandro Neri,et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..
[43] Wenjun Zeng,et al. Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.