A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy
暂无分享,去创建一个
[1] Der-Chyuan Lou,et al. Multiple layer data hiding scheme for medical images , 2009, Comput. Stand. Interfaces.
[2] Chin-Chen Chang,et al. A difference expansion oriented data hiding scheme for restoring the original host images , 2006, J. Syst. Softw..
[3] R. Davis,et al. The data encryption standard in perspective , 1978, IEEE Communications Society Magazine.
[4] Min Wu. Joint security and robustness enhancement for quantization based data embedding , 2003, IEEE Trans. Circuits Syst. Video Technol..
[5] Jeho Nam,et al. A Novel Difference Expansion Transform for Reversible Data Embedding , 2008, IEEE Transactions on Information Forensics and Security.
[6] Luxi Yang,et al. Optimal pilot sequence design for channel estimation in MIMO OFDM systems , 2006, IEEE Commun. Lett..
[7] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[8] Adnan M. Alattar,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .
[9] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[10] Jeffrey J. Rodríguez,et al. Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.
[11] Hu Jian-ping,et al. A method for hiding information utilizing double-random phase-encoding technique , 2007 .
[12] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[13] Faouzi Kossentini,et al. The emerging JBIG2 standard , 1998, IEEE Trans. Circuits Syst. Video Technol..
[14] Henk J. A. M. Heijmans,et al. Reversible data embedding into images using wavelet techniques and sorting , 2005, IEEE Transactions on Image Processing.
[15] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[16] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[17] Jeng-Shyang Pan,et al. Robust VQ-based digital watermarking for memoryless binary symmetric channel , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[18] Benoit M. Macq,et al. Lossless multiresolution transform for image authenticating watermarking , 2000, 2000 10th European Signal Processing Conference.
[19] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[20] Yi-Ta Wu,et al. Digital watermarking based on chaotic map and reference register , 2007, Pattern Recognit..
[21] Christophe De Vleeschouwer,et al. Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..