|
[FRID01]J. Fridrich, M. Goljan, and R. Du, “Reliable detection of LSB steganog-raphy in grayscale and color images,” Proceedings of the ACM Workshop on Multimedia and Security, pp. 27-30, 2001. [HWAN06]J. Hwang, J.W. Kim, and J.U. Choi, “A reversible watermarking based on histogram shifting,” International Workshop on Digital Watermarking, Vol. 4283, pp. 348-361, 2006. [JANA17]B. Jana, D. Giri, and J.U. Choi, “Partial reversible data hiding scheme using (7, 4) hamming code,” Multimedia Tools and Applications, Vol. 6, pp. 21691-21706, 2017. [KIM09] K.S. Kim, M.J. Lee, H.Y. Lee, and H.K. Lee, “Reversible data hiding exploiting spatial correlation between sub-sampled images,” Pattern Recognition, Vol. 42, pp. 3083-3096, 2009. [KIM16]C. Kim, and C.N. Yang, “Data hiding based on overlapped pixels using Hamming code,” Multimedia Tools and Applications, Vol. 75, pp. 15651-15663, 2016. [KUO07]W.C. Kuo, D.J. Jiang, and Y.C. Huang, “Reversible data hiding based on histogram,” International Conference on Intelligent Computing, Vol. 4682, pp. 1152-1161, 2007. [LIAO15]X. Liao, and C. Shu, “Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels,” Visual Communication and Image Representation, Vol. 28, pp. 21-27, 2015. [MA13]K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Transac-tions on Information Forensics and Security, Vol. 8, pp. 553-562, 2013. [MIEL06]J. Mielikainen, “LSB Matching revisited,” IEEE Signal Processing Let-ters, Vol. 13, pp. 285-287, 2006. [NI06]Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, pp. 354-362, 2006. [RASH18]A. Rashid, N. Salamat, and V.B.S. Prasath, “An algorithm for data hiding in radiographic images and ePHI/R application,” Technologies, Vol. 6(1), pp. 1-12, 2018. [TAI09]W.L. Tai, C.M. The, and C.C. Chang “Reversible data hiding based on histogram modification of pixel differences,” IEEE Transactions on Cir-cuits and Systems for Video Technology, Vol. 19, pp. 906-910, 2009. [TIAN03]J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, pp. 890-896, 2003. [TSAI09]P. Tsai, Y.C. Hu, and H.L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, Vol. 50, pp. 1227-1231, 2009 [VARS06]E. Varsaki, V. Fotopoulos, and A.N. Skodras, “A reversible data hiding technique embedding in the image histogram,” Technical Report HOU-CS-TR-2006-08-GR, 2006. [WEB01]R. Crandall, Some notes on steganography, http://dde.binghamton.edu/ download/Crandall/matrix.pdf. (Accessed31 May 2017). [WEB02]C.A. Rashid, Pairs of values and the chi-squared attack, https://orion. math.iastate.edu/dept/thesisarchive/MSCC/CStanleyMSSS05.pdf. (Ac-cessed 28 Jan 2019). [WANG17]W. Wang, J. Ye, T. Wang, and W. Wang, “Reversible data hiding scheme based on significant-bit difference expansion,” IET Image Processing, Vol. 11, pp. 1002-1014, 2017. [WEST01]A. Westfeld, “F5: a steganographic algorithm,” International Workshop on Information Hiding, Vol. 2137, pp. 289-302, 2001. [WU14]X. Wu, and W. Sun, “High-capacity reversible data hiding in encrypted images by prediction error,” Signal Processing, Vol. 104, pp. 387-400, 2014. [XIA16]Z. Xia, X. Wang, X. Sun, Q. Liu, and N. Xiong, “Steganalysis of LSB matching using differences between nonadjacent pixels,” Multimedia Tools and Applications, Vol. 75, pp. 1947-1962, 2016. [YANG17]C.N. Yang, S.C. Hsu, and C. Kim, “Improving stego image quality in im-age interpolation based data hiding,” Computer Standards & Interfaces, Vol. 50, pp. 209-215, 2017. [ZHAN07A]X. Zhang, W. Zhang, and S. Wang, “Efficient double layered ste-gano-graphic embedding,” Electronics Letters, Vol. 43, pp. 482-483, 2007. [ZHAN07B]W. Zhang, S. Wang, and X. Zhang, “Improving embedding efficiency of covering codes for applications in steganography,” IEEE Communications Letters, Vol. 11, pp.680-682, 2007. [ZHAN12A]R. Zhang, V. Sachnev, M. Bakke Botnan, H.J. Kim, and J. Heo, “An effi-cient embedder for BCH coding for steganography,” IEEE Transactions on Information Theory, Vol. 58, pp. 7272-7279, 2012. [ZHAN12B]X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Transactions on Information Forensics and Security, Vol. 7, pp. 826-832, 2012.
|