|
[Bend96] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM systems journal, vol. 35, no. 3.4, pp. 313–336, 1996. [Chan04] C.-K. Chan and L.-M. Cheng, “Hiding data in images by simple lsb substitution,” Pattern recognition, vol. 37, no. 3, pp. 469–474, 2004. [Chen19] X. Chen, H. Zhong, and A. Qiu, “Reversible data hiding scheme in multiple encrypted images based on code division multiplexing,” Multimedia Tools and Applications, vol. 78, no. 6, pp. 7499–7516, 2019. [Cran98] R. Crandall, “Some notes on steganography,” Posted on steganography mailing list, pp. 1–6, 1998. [Frid06] J. Fridrich and D. Soukal, “Matrix embedding for large payloads,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 3, pp. 390–395, 2006. [Hong10] W. Hong, T.-S. Chen, Y.-P. Chang, and C.-W. Shiu, “A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification,” Signal Processing, vol. 90, no. 11, pp. 2911–2922, 2010. [Hong12] W. Hong, T.-S. Chen, H.-Y. Wu, An improved reversible data hiding in encrypted images using side match, IEEE Signal Processing Letters 19 (4) (2012) 199–202. [Hu08A] Y. Hu, H.-K. Lee, and J. Li, “De-based reversible data hiding with improved overflow location map,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 2, pp. 250–260, 2008. [Hu08B] Y. Hu, H.-K. Lee, K. Chen, and J. Li, “Difference expansion based reversible data hiding using two embedding directions,” IEEE Transactions on Multimedia, vol. 10, no. 8, pp. 1500–1512, 2008. [Hwan06] J. Hwang, J. Kim, and J. Choi, “A reversible watermarking based on histogram shifting,” in International Workshop on Digital Watermarking. Springer, 2006, pp. 348–361. [Jana17] B. Jana, D. Giri, and S. K. Mondal, “Partial reversible data hiding scheme using (7, 4) hamming code,” Multimedia Tools and Applications, vol. 76, no. 20, pp. 21 691–21 706, 2017. [Kim09] K.-S. Kim, M.-J. Lee, H.-Y. Lee, and H.-K. Lee, “Reversible data hiding exploiting spatial correlation between sub-sampled images,” Pattern Recognition, vol. 42, no. 11, pp. 3083–3096, 2009. [Kim18] C. Kim, D. Shin, C.-N. Yang, and Y.-S. Chou, “Improving capacity of hamming (n, k)+ 1 stego-code by using optimized hamming+ k,” Digital Signal Processing, vol. 78, pp. 284–293, 2018. [Ma13] K. Ma, W. Zhang, X. Zhao, N. Yu, F. Li, Reversible data hiding in encrypted images by reserving room before encryption, IEEE Transactions on information forensics and security 8 (3) (2013) 553–562. [Ma16] B. Ma and Y. Q. Shi, “A reversible data hiding scheme based on code division multiplexing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 9, pp. 1914–1927, 2016. [Miel06] J. Mielikainen, “Lsb matching revisited,” IEEE signal processing letters, vol. 13, no. 5, pp. 285–287, 2006. [Ni06] Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on circuits and systems for video technology, vol. 16, no. 3, pp. 354–362, 2006. [Ou13] B. Ou, X. Li, Y. Zhao, R. Ni, and Y.-Q. Shi, “Pairwise prediction-error expansion for efficient reversible data hiding,” IEEE Transactions on Image Processing, vol. 22, no. 12, pp. 5010–5021, 2013. [Ou17] B. Ou, X. Li, J. Wang, and F. Peng, “High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion,” Neurocomputing, vol. 226, pp. 23–34, 2017. [Tian03] J. Tian, “Reversible data embedding using a difference expansion,” IEEE transactions on circuits and systems for video technology, vol. 13, no. 8, pp. 890–896, 2003. [Wang16] J. Wang, J. Ni, X. Zhang, and Y.-Q. Shi, “Rate and distortion optimization for reversible data hiding using multiple histogram shifting,” IEEE transactions on cybernetics, vol. 47, no. 2, pp. 315–326, 2016. [Wang17] W. Wang, J. Ye, T. Wang, and W. Wang, “Reversible data hiding scheme based on significant-bit-difference expansion,” IET image processing, vol. 11, no. 11, pp. 1002–1014, 2017. [West01] A. Westfeld, “F5ła steganographic algorithm,” in International workshop on information hiding. Springer, 2001, pp. 289–302. [Wu14] X. Wu, W. Sun, High-capacity reversible data hiding in encrypted images by prediction error, Signal Processing 104 (2014) 387–400. [Wu19] H.-T. Wu, Y.-m. Cheung, Z. Yang, S. Tang, A high-capacity reversible data hiding method for homomorphic encrypted images, Journal of Visual Communication and Image Representation 62 (2019) 87–96 [Yang17] C.-N. Yang, S.-C. Hsu, and C. Kim, “Improving stego image quality in image interpolation based data hiding,” Computer Standards & Interfaces, vol. 50, pp. 209–215, 2017. [Yang19] C.-N. Yang, S.-Y. Wu, Y.-S. Chou, and C. Kim, “Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme,” Multimedia Tools and Applications, pp. 1–22, 2019. [Zhan07A] X. Zhang, W. Zhang, and S. Wang, “Efficient double-layered steganographic embedding,” Electronics letters, vol. 43, no. 8, pp. 482–483, 2007. [Zhan07B] W. Zhang, S. Wang, and X. Zhang, “Improving embedding efficiency of covering codes for applications in steganography,” IEEE Communications Letters, vol. 11, no. 8, pp. 680–682, 2007. [Zhan11] X. Zhang, Reversible data hiding in encrypted image, IEEE signal processing letters 18 (4) (2011) 255–258. [Zhan12] R. Zhang, V. Sachnev, M. B. Botnan, H. J. Kim, and J. Heo, “An efficient embedder for bch coding for steganography,” IEEE Transactions on Information Theory, vol. 58, no. 12, pp. 7272–7279, 2012. [Zhan15] C. Qin, X. Zhang, Effective reversible data hiding in encrypted image with privacy protection for image content, Journal of Visual Communication and Image Representation 31 (2015) 154–164. [Zhan16] C. Kim and C.-N. Yang, “Data hiding based on overlapped pixels using hamming code,” Multimedia Tools and Applications, vol. 75, no. 23, pp. 15 651–15 663, 2016.
|