|
[1]S. Katzenbeisser and F. A. P. Petitcolas (2000), “Information Hiding Techniques for Steganography and Digital Watermarking,” Artch House, Boston, London. [2]W. Bender, D. Gruhl, N. Morimoto, and A. Lu (1996), “Techniques for Data Hiding,” IBM Systems Journal, Vol. 35, No. 3-4, pp.313-336. [3]X. Zhang and S. Wang (2006), “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communications Letters, Vol. 10, No. 11, pp. 1-3. [4]W. J. Chen, C. C. Chang, T. Hoang Ngan Le (2010), “High Payload Steganography Mechanism Using Hybrid Edge Detector,” Expert Systems with Applications, Vol. 37, No. 4, pp. 3292–3301. [5]J. Tian (2003), “Reversible Data Embedding Using a Difference Expansion,” IEEE Trans. Circuits Syst. Video Technology, Vol. 13, No. 8, pp.890-896. [6]A. M. Alattar (2004), “Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform,” IEEE Transactions on Image Processing, Vol. 13, No. 8, pp. 1147-1156. [7]Z. Ni, Y. Q. Shi, N. Ansari, and W. Su (2006), “Reversible Data Hiding,” IEEE Trans. Circuits Syst. Video Technology, Vol. 16, No. 3, pp. 354–362. [8]S. K. Lee, Y. H. Suh, and Y. S. Ho (2006), “Reversible Image Authentication Based on Watermarking,” Proc. IEEE Int. Conf. Multimedia Expo, pp. 1321–1324. [9]W. Hong (2012), “Adaptive Reversible Data Hiding Method Based on Error Energy Control and Histogram Shifting,” Vol. 285, No. 2, pp. 101–108. [10]P. Y. Tsai, Y. C. Hu, H. L. Yeh (2009), “Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting,” Signal Processing, Vol. 89, No. 6, pp. 1129–1143. [11]Y. T. Chang, C. T. Huang, C. F. Lee, S. J. Wang (2013), “Image Interpolating Based Data Hiding in Conjunction with Pixel-Shifting of Histogram,” The Journal of Supercomputing, Vol. 66, No. 2, pp 1093-1110. [12]K. H. Jung and K.Y. Yoo (2009), “Data Hiding Method Using Image Interpolation,” Computer Standards & Interfaces, Vol. 31, pp. 465-470. [13]Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli (2004), “Image Quality Assessment: from Error Visibility to Structural Similarity,” IEEE Transactions on Image Processing, Vol. 13, No. 4, pp. 600−612. [14]X. L. Li, J. Li, B. Li, and B. Yang (2013), “High-Fidelity Reversible Data Hiding Scheme Based on Pixel–Value-Ordering and Prediction–Error Expansion,” Signal Processing, Vol. 93, Issue 1, pp. 198–205. [15]F. Peng, X. L. Li, B. Yang (2014), “Improved PVO-Based Reversible Data Hiding,” Digital Signal Processing, Vol.25, pp. 255–265. [16]B. Ou, X. Li, Y. Zhao, and R. Ni (2014), “Reversible Data Hiding Using Invariant Pixel-Value-Ordering and Prediction-Error Expansion,” Signal Processing: Image Communication, Vol. 29, pp. 760-772. [17]X. Qu, H. J. Kim (2015), ” Pixel-Based Pixel Value Ordering Predictor for High-Fidelity Reversible Data Hiding,” Signal Processing, Vol. 111, pp. 249–260. [18]X. Wang, J. Ding, Q. Pei (2015), “A Novel Reversible Image Data Hiding Scheme Based on Pixel Value Ordering and Dynamic Pixel Block Partition,” Information Sciences, Vol. 310, pp. 16–35.
|