References
- J. Tian, “Wavelet-based reversible watermarking for authentication,” Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents IV, Vol.4675, January, 2002, pp.679-690. https://doi.org/10.1117/12.465329
- J. Tian, “Reversible Watermarking by Difference Expansion,” Proc. of Workshop on Multimedia and Security: Authentication, Secrecy, and Steganalysis, December, 2002, pp.19-22.
- Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” In Proc. of International Symposium on Circuits and Systems, Bangkok, Thailand, Vol.2, May, 2003, pp.912-915. https://doi.org/10.1109/MWSCAS.2003.1562435
- D. M. Thodi and J. J. Rodríguez, “Expansion Embedding Techniques for Reversible Watermarking,” IEEE Trans. Image Process, Vol.16, No.3, 2007, pp.721-730. https://doi.org/10.1109/TIP.2006.891046
- P. Tsai, Y. C. Hu and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, Vol.89, Issue 6, June, 2009, pp.1129-1143. https://doi.org/10.1016/j.sigpro.2008.12.017
- H. C. Wu, C. C. Lee, C. S. Tsai, Y. P. Chu, H. R. Chen, “A high capacity reversible data hiding scheme with edge prediction and difference expansion,” Journal of Systems and Software, In Press, Corrected Proof, Available online 11 July, 2009. https://doi.org/10.1016/j.jss.2009.06.056
- H. W. Tseng and C. P. Hsieh, “Prediction-based reversible data hiding.,” Information Sciences, Vol.179, No.14, 2009, pp.2460-2469. https://doi.org/10.1016/j.ins.2009.03.014
- N. Ahmed, T. Natarajan and K. R. Rao, “Discrete cosine transform,” IEEE Transactions on Computers, Vol.C-23, 1974, pp.90-93. https://doi.org/10.1109/T-C.1974.223784
- O. Rioul and P. Duhamel, “Fast algorithms for wavelet transforms,” IEEE Transaction on Information Theory, Vol.38, No.2, 1992, pp.569-586. https://doi.org/10.1109/18.119724
- E. O. Brigham, “The fast Fourier transform,” Englewood Cliffs, NJ: Prentice-Hall, 1974.
- C. C. Chang, T. S. Chen and L. Z. Chung, “A steganographic method based upon JPEG and quantization table modification,” Information Sciences, Vol.141, No.1-2, 2002, pp.123-138. https://doi.org/10.1016/S0020-0255(01)00194-3
- W. C. Du and W. J. Hsu, “Adaptive data hiding based on VQ compressed images,” IEE Proceedings on Vision, Image, and Signal Processing, Vol.150, No.4, 2003, pp.233-238. https://doi.org/10.1049/ip-vis:20030525
- J. X. Wang and Z. M. Lu, “A path optional lossless data hiding scheme based on VQ joint neighboring coding,” Information Sciences, Vol.179, No.19, 2009, pp.3332-3348. https://doi.org/10.1016/j.ins.2009.05.021
- C. C. Chang, T. D. Kieu and W. C. Wu, “A lossless data embedding technique by joint neighboring coding,” Pattern Recognition, Vol.42, No.7, 2009, pp.1597-1603. https://doi.org/10.1016/j.patcog.2008.11.040
- C. C. Chang, C. Y. Lin and Y. Z. Wang, “New image steganographic methods using run-length approach,” Information Sciences, Vol.176, No.22, 2006, pp.3393-3408. https://doi.org/10.1016/j.ins.2006.02.008
- B. Yang, Z. M. Lu and S. H. Sun, “Reversible watermarking in the VQ-compressed domain,” in: Proceedings of the Fifth International Conference on Visualization, Imaging, and Image Processing, Benidorm, Spain, 2005, pp.289-303.
- C. C. Chang, T. D. Kieu and W. C. Wu, “A lossless data embedding technique by joint neighboring coding,” Pattern Recognition, Vol.42, No.7, 2009, pp.1597-1603. https://doi.org/10.1016/j.patcog.2008.11.040
- Y. K. Lee and L. H. Chen, “High capacity image steganographic model,” IEE Proceedings-Vision, Image, and Signal Processing, Vol.147, No.3, 2000, pp.288-294. https://doi.org/10.1049/ip-vis:20000341
- C. C. Chang, J. Y. Hsiao and C. S. Chan, “Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy,” Pattern Recognition, Vol.36, No.7, 2003, pp.1583-1595. https://doi.org/10.1016/S0031-3203(02)00289-3
- C. C. Chang, C. C. Lin, C. S. Tseng and W. L. Tai, “Reversible hiding in DCT-based compressed images,” Information Sciences, Vol.177, No.13, 2007, pp.2768-2786. https://doi.org/10.1016/j.ins.2007.02.019
- R. M. Gray and Y. Linde, “Vector quantization and predictive quantizers for Gauss-Markov sources,” IEEE Transactions on Communications, Vol.30, No.2, 1982, pp.381-389. https://doi.org/10.1109/TCOM.1982.1095471
- C. C. Chang and T. S. Chen, “A new tree-structured quantization with closest-coupled multipath searching method,” Optical Engineering, Vol.36, No.6, 1997, pp.1713-1720. https://doi.org/10.1117/1.601197
- C. C. Chang, D. C. Lin and T. S. Chen, “An improved VQ codebook search algorithm using principal component analysis,” Journal of Visual Communication and Image Representation, Vol.8, No.1, 1977, pp.27-127. https://doi.org/10.1006/jvci.1997.0327
- Z. H. Wang, C. C. Chang, K. N. Chen and M. C. Li, “An encoding method for both image compression and data lossless information hiding,” The Journal of Systems and Software, Vol.83, No.11, 2010, pp.2073-2082. https://doi.org/10.1016/j.jss.2010.06.007
- T. S. Chen, C. C. Chang, K. F. Hwang, Digital Image Processing, FLAG, ROC, 2006.
Cited by
- Motion detection with pyramid structure of background model for intelligent surveillance systems vol.25, pp.7, 2012, https://doi.org/10.1016/j.engappai.2012.02.002
- Aspect ratio invariant visual cryptography by image filtering and resizing vol.17, pp.5, 2013, https://doi.org/10.1007/s00779-012-0535-0