|
[1]C. C. Lin and X. L. Liu, “A Reversible Data Hiding Scheme for Block Truncation Compressions based on Histogram Modification,” Sixth International Conference Genetic and Evolutionary Computing. pp. 157-160, 2012. [2]Y. H. Lin and S. C. Shie, “A Reversible Data Hiding Scheme Implemented on Block Truncation Coding of Imag,” TANET, vol. 774, pp. 444-450, 2013. [3]F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding-A Survey,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, July 1999. [4]Jun Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Transactions on Circuits and System Video Technology., vol. 13, no. 8, pp. 890-896, August 2003. [5]S. H. Liu, T. H. Chen, H. X. Yao, and W. Gao, “A Variable Depth LSB Data Hiding Technique in Images,” Proceedings of the Third International Conference on Machine Learning Cybernetics., pp. 3990-3994, August 2004. [6]K. H. Jung, K. J. Ha, and K. Y. Yoo, “Image Data Hiding Method Based on Multi-Pixel Differencing and LSB Substitution Methods,” International Conference on Convergence and Hybrid Information Technology., pp. 355-358, 2008. [7]Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” IEEE Transactions on Circuits System for Video Technology., vol. 16, no. 3, pp. 354-362, March 2006. [8]W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM System Journal., vol. 35, no.3, pp. 313-336, 1996. [9]F. Pan, J. Li, and X. Yang, “Image Steganography Method Based on PVD and Modulus Function,” 2011 International Conference on Electronics Communications and Control, no. 2, pp. 282-284, 2011. [10]M. Sabokdast and M. Mohammadi, “A Steganographic Method for Images with Modulus Function and Modified LSB Replacement Based on PVD,” 5th Conference on Information Knowledge Technology., pp. 121-126, 2013. [11]L. Yang, Y .Jing, and S. Wei, “Reversible Data Hiding Algorithm Based on Prediction Error,” 2nd International Asia Conference on Informatics Control Automation and Robotics., vol. 3, pp. 353-356, 2010. [12]R. Kaur, S. Budhiraja, and A. Dhindsa, “Reversible Data Hiding Technique Based on Prediction Error Expansion and Complexity Gene,” 2nd International Conference on Recent Advances Engineering Computational Sciences., 2016. [13]P. Premaratne and C. C. Ko, “A Novel Watermark Embedding and Detection Scheme for Images in DFT domain,” 7th International Conference on Image Processing and its Applications, no. 465, pp. 780-783, 1999. [14]G. C. Langelaar and R. L. Lagendijk, “Optimal Differential Energy Eatermarking of DCT Encoded Images and Video,” IEEE Transactions on Image Processing., vol. 10, no. 1, pp. 148-158, 2001. [15]C. S. Lu and H. Y. M. Liao, “Multipurpose Watermarking for Image Authentication and Protection,” IEEE Transactions on Image Processing., vol. 10, no. 10, pp. 1579-1592, 2001. [16]T. Meenpal and A. K. Bhattacharjee, “High Capacity Reversible Data Hiding Using IWT,” in 2011 International Symposium on Electronic System Design, pp. 352-357, 2011. [17]E. J. Delp and O. R. Mitchell, “Image Compression Using Block Truncation Coding,” IEEE Transaction on Commuications., vol. 27, no. 9, pp. 1335-1342, 1979. [18]C. C. Chang, W. L. Tai, and C. C. Lin, “A Reversible Data Hiding Scheme Based on Side Match Vector Quantization,” IEEE Transaction Circuits and System for Video Technology., vol. 16, no. 10, pp. 1301-1308, 2006. [19]G. Li, Y. Zhao, and B. Yuan, “Using the fractal code to watermark images,” in International Conference on Signal Processing Proceedings., vol. 1, pp. 829-832, 2002. [20]M. D. Lema and O. R. Mitchell, “Absolute Moment Block Truncation Coding and its Application to Color Images,” IEEE Transaction on Commuications., vol. 32, no. 10, pp. 1148-1157, 1984. [21]J. C. Chuang and C. C. Chang, “Using a Simple and Fast Image Compression Algorithm to Hide Secret Information,” International Journal of Computers and Applications., vol. 28, no. 4, pp. 329-333, 2006. [22]C. C. Chang, C. Y. Lin, and Y. H. Fan, “Lossless Data Hiding for Color Images Based on Block Truncation Coding,” Pattern Recognit., vol. 41, no. 7, pp. 2347-2357, 2008. [23]Z. Zhao, H. Luo, Z. M. Lu, and J. S. Pan, “Reversible Data Hiding Based on Multilevel Histogram Modification and Sequential Recovery,” International Journal Electronics and Communication., vol. 65, no. 10, pp. 814-826, 2011. [24]C. C. Lo, Y. C. Hu, W. L. Chen, and C. M. Wu, “Reversible Data Hiding Scheme for BTC-compressed Images Based on Histogram Shifting,” International Journal of Security and Its Applications., vol. 8, no. 2, pp. 301-314, March 2014. [25]C. C. Chang, H. L. Wu, and T. F. Chung, “Applying Histogram Modification to Embed Secret Message in AMBTC,” 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing., no. 1, pp. 489-492, 2014. [26]C. C. Lin, X. L. Liu, W. L. Tai, and S. M. Yuan, “A Novel Reversible Data Hiding Scheme based on AMBTC Compression Technique,” Multimed. Tools Appl., vol. 74, no. 11, pp. 3823-3842, 2015. [27]S. Sun, Z. Yin, J. Tang, and B. Luo, “Improved Reversible Data Hiding Scheme Based on AMBTC Compression Techmique” Industrial IoT Technologies and Applications.,vol. 202, pp. 111-118, 2017. [28]A. Malik, G. Sikka, and H. K. Verma, “A High Payload Data Hiding Scheme Based on Modified AMBTC Technique,” Multimed. Tools Appl., vol. 76, no. 12, 2017. [29]Y. Y. Chen and K. Y. Chi, “Cloud Image Watermarking: High Quality Data Hiding and Blind Decoding Scheme Based on Block Truncation Coding,” Multimedia System., 2017. [30] http://exile.felk.cvut.cz/boss/BOSSFinal/index.php?mode=VIEW&tmpl=materials
|