References
- C.C. Lin and W. H. Tsai, "Secret multimedia information sharing with data hiding capacity by simple logic operations," in Proc. of 5th World Multi-conference on Systemics, Cybernetics, and Informatics, Vol. I: Information Systems Development, pp. 50-55, 2001.
- M.S. Fu and O.C. Au, "Data hiding in halftone image by stochastic error diffusion," IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1965-1968, 2001.
- M.S. Fu and O.C. Au, "Steganography in halftone images: conjugate error diffusion," Signal Processing, vol. 83, pp. 2171-2178, 2003. https://doi.org/10.1016/S0165-1684(03)00173-7
- M. Wu and B. Liu, "Data hiding in binary image for authentication and annotation," IEEE Trans. on Multimedia, vol. 6, pp. 528-538, 2004. https://doi.org/10.1109/TMM.2004.830814
- P. Sherry and A. Savakis, "Improved techniques for watermarking halftone images," Acoustics, Speech, and Signal Processing, vol. 5, pp. 1005-1008, 2004.
- M. Wu, J. Fridrich, M. Goljan and H. Gou, "Handling uneven embedding capacity in binary images: a revisit," SPIE Conference on Security, Watermarking and Steganography, vol. 5681, pp. 194-205, 2005.
- H. Gou and M. Wu, "Improving embedding payload in binary images with super-pixels," in Proc. of IEEE International Conference on Image Processing, vol.3, pp.III-277-III-280, 2007.
- I.S. Lee and W.H. Tsai, "A dynamic-programming approach to data hiding in binary image using block pattern coding with distortion minimization," IEICE Transaction on Information and Systems, vol. E90-D, no. 8, pp. 1142-1150, 2007. https://doi.org/10.1093/ietisy/e90-d.8.1142
- Y.A. Ho, Y.K. Chan, H.C. Wu and Y.P. Chu, "High-capacity reversible data hiding in binary images using pattern substitution," Computer Standards & Interfaces, vol. 31, pp. 787-794, 2009. https://doi.org/10.1016/j.csi.2008.09.014
- C.L. Tsai, H.F. Chiang, K.C. Fan and C.D. Chung, "Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism," Pattern Recognition, vol. 38, pp. 1993-2006, 2005. https://doi.org/10.1016/j.patcog.2005.03.001
- M. Nakajima and Y. Yamaguchi, "Enhancing registration tolerance of extended visual cryptography for natural images," Journal of Electronic Imaging, vol. 13, pp. 654-662, 2004. https://doi.org/10.1117/1.1758729
- D.Q. Viet and K. Kurosawa, "Almost ideal contrast visual cryptography with reversing," Cryptology- CT-RSA, pp. 353-365, 2004.
- S. Cimato, A. De Santis, A.L. Ferrara and B. Masucci, "Ideal contrast visual cryptography schemes with reversing," Information Processing Letters, vol. 93, pp. 199-206, 2005. https://doi.org/10.1016/j.ipl.2004.10.011
- C.N. Yang, C.C. Wang and T.S. Chen, "Visual cryptography schemes with reversing," The Computer Journal, vol. 51, pp. 710-722, 2008. https://doi.org/10.1093/comjnl/bxm118
- M. Naor and A. Shamir, "Visual Cryptography," Advances in Cryptology- EUROCRYPT'94, pp. 1-12, 1994.
- G. Ateniese, C. Blundo, A. De Santis and D.R. Stinson, "Extended capabilities for visual cryptography," Theoretical Computer Science, vol. 250, pp. 143-161, 2001. https://doi.org/10.1016/S0304-3975(99)00127-9
- C.N. Yang and T.S. Chen, "Extended visual secret sharing schemes: improving the shadow image quality," International Journal of Pattern Recognition and Artificial Intelligence, vol. 21, pp. 879-898, 2007. https://doi.org/10.1142/S0218001407005740
- P. Tuyls, H.D.L. Hollmann, J.H. Van Lint and L. Tolhuizen, "XOR-based visual cryptography schemes," Designs, Codes and Cryptography, vol. 37, no. 1, pp. 169-186, 2005. https://doi.org/10.1007/s10623-004-3816-4
- F. Liu, C.K. Wu and X.J. Lin, "Some extensions on threshold visual cryptography schemes," The Computer Journal, vol. 53, pp. 107-119, 2010. https://doi.org/10.1093/comjnl/bxn072
Cited by
- Watermark with DSA signature using predictive coding vol.74, pp.14, 2015, https://doi.org/10.1007/s11042-013-1667-6
- Data hiding based on overlapped pixels using hamming code vol.75, pp.23, 2011, https://doi.org/10.1007/s11042-014-2355-x
- Lossless data hiding for absolute moment block truncation coding using histogram modification vol.14, pp.1, 2011, https://doi.org/10.1007/s11554-016-0641-8
- Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP vol.14, pp.1, 2011, https://doi.org/10.1007/s11554-017-0674-7
- An efficient histogram-preserving steganography based on block vol.2018, pp.None, 2011, https://doi.org/10.1186/s13640-018-0306-6
- Generalizing Hamming+k data hiding by overlapped pixels vol.78, pp.13, 2011, https://doi.org/10.1007/s11042-018-7101-3