A reversible data hiding scheme using complementary embedding strategy
暂无分享,去创建一个
[1] Hu Jian-ping,et al. A method for hiding information utilizing double-random phase-encoding technique , 2007 .
[2] Jessica J. Fridrich,et al. Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.
[3] Iwan Setyawan,et al. Watermarking digital image and video data. A state-of-the-art overview , 2000 .
[4] Benoit M. Macq,et al. Lossless multiresolution transform for image authenticating watermarking , 2000, 2000 10th European Signal Processing Conference.
[5] Ahmed H. Tewfik,et al. A novel high-capacity data-embedding system , 2006, IEEE Transactions on Image Processing.
[6] Min Wu. Joint security and robustness enhancement for quantization based data embedding , 2003, IEEE Trans. Circuits Syst. Video Technol..
[7] Yi-Ta Wu,et al. Digital watermarking based on chaotic map and reference register , 2007, Pattern Recognit..
[8] Faouzi Kossentini,et al. The emerging JBIG2 standard , 1998, IEEE Trans. Circuits Syst. Video Technol..
[9] Christophe De Vleeschouwer,et al. Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..
[10] William Stallings,et al. THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.
[11] Edward J. Delp,et al. Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..
[12] Yen-Ping Chu,et al. Adaptive lossless steganographic scheme with centralized difference expansion , 2008, Pattern Recognit..
[13] Tzu-Chao Lin,et al. Wavelet-based copyright-protection scheme for digital images based on local features , 2009, Inf. Sci..
[14] Elizabeth Lennon. The Advanced Encryption Standard (AES): A Status Report , 1999 .
[15] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[16] Yun Q. Shi,et al. Reversible Data Hiding , 2003, IWDW.
[17] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[18] Alison Webb. Why Audit a Web Server , 2001 .
[19] Henk J. A. M. Heijmans,et al. Reversible data embedding into images using wavelet techniques and sorting , 2005, IEEE Transactions on Image Processing.
[20] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[21] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[22] Ton Kalker,et al. Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.
[23] Nien-Lin Hsueh,et al. A lossless data hiding scheme based on three-pixel block differences , 2008, Pattern Recognit..
[24] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[25] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[26] Jeffrey J. Rodríguez,et al. Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.
[27] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[28] Nien-Lin Hsueh,et al. Adaptive embedding techniques for VQ-compressed images , 2009, Inf. Sci..
[29] Marie A. Wright. Feature: The Advanced Encryption Standard , 2001 .
[30] Hsien-Wen Tseng,et al. Prediction-based reversible data hiding , 2009, Inf. Sci..
[31] Zhe-Ming Lu,et al. A path optional lossless data hiding scheme based on VQ joint neighboring coding , 2009, Inf. Sci..
[32] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[33] Chin-Chen Chang,et al. A Reversible Data Hiding Scheme Based on Side Match Vector Quantization , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[34] Adnan M. Alattar,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .
[35] Jeho Nam,et al. A Novel Difference Expansion Transform for Reversible Data Embedding , 2008, IEEE Transactions on Information Forensics and Security.
[36] Luxi Yang,et al. Optimal pilot sequence design for channel estimation in MIMO OFDM systems , 2006, IEEE Commun. Lett..
[37] Chiang-Lung Liu,et al. High-performance JPEG steganography using complementary embedding strategy , 2008, Pattern Recognit..