References
- W. Stallings, Cryptography and Network Security: Principles and Practice, New Jersey: Pearson Education, 2003.
- J.-H. Kim, S.-K. Yoo, and S.-H. Lee, "Fully homomorphic encryption scheme without key switching," J. KICS, vol. 38, no. 5, pp. 428-433, May 2013.
- F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding-a survey," in Proc. IEEE, special issue on protection of multimedia content, May 1999. Invited paper.
- R. J. Anderson and F. A. P. Petitcolas, "On the limits of steganography," IEEE J. Sel. Areas on Commun., 16:474-481, 1998. https://doi.org/10.1109/49.668971
- J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, Aug. 2003. https://doi.org/10.1109/TCSVT.2003.815962
- M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. Image Process., vol. 14, no. 2, pp. 253-266, Feb. 2005. https://doi.org/10.1109/TIP.2004.840686
- Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, 2006. https://doi.org/10.1109/TCSVT.2006.869964
- D. M. Thodi and J. J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. Image Process., vol. 16, no. 3, pp. 721-730, 2007. https://doi.org/10.1109/TIP.2006.891046
- L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, "Reversible image watermarking using interpolation technique," IEEE Trans. Inf. Forensics Secur., vol. 5, no. 1, pp. 187-193, 2010. https://doi.org/10.1109/TIFS.2009.2035975
- X. Zhang, "Reversible data hiding in encrypted image," IEEE. Sign. Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011. https://doi.org/10.1109/LSP.2011.2114651
- W. Hong, T.-S. Chen, and H.-Y. Wu, "An improved reversible data hiding in encrypted images using side match," IEEE. Sign. Process. Lett., vol. 19, no. 4, pp. 199-202, Apr. 2012. https://doi.org/10.1109/LSP.2012.2187334
- J. Fridirich, M. Goljan, and R Du, "Lossless data embedding for all image formats," SPIE Proc. Security and Watermarking of Multimedia Contents, vol. 4675, pp. 572-583, 2002.
- Y. C. Li, C. M. Yeh, and C. C. Chang, "Data hiding based on the similarity between neighboring pixels with reversibility," Digital Sign. Process., vol. 20, no. 4, pp. 1116-1128, 2010. https://doi.org/10.1016/j.dsp.2009.10.025
- P. Tsai, Y. C. Hu, and H. L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Sign. Process., vol. 89, no. 6, pp. 1129-1143, 2009. https://doi.org/10.1016/j.sigpro.2008.12.017
- W. L. Tai, C. M. Yeh, and C. C. Chang, "Reversible data hiding based on histogram modification of pixel differences," IEEE Trans. Circuits and Syst. for Video Technol., vol. 19, no. 6, pp. 906-910, Jun. 2009. https://doi.org/10.1109/TCSVT.2009.2017409
- H. C. Wu, H. C. Wang, C. S. Tsai, and C. M. Wang, "Reversible image steganographic scheme via predictive coding," Displays, vol. 31, pp. 35-43, 2010. https://doi.org/10.1016/j.displa.2009.10.002
- J.-H. Jeong, K.-J. Kang, Y.-S. Kim, and D.-W. Lim, "Reversible data hiding scheme using dynamic bit selection in encrypted image," in Proc. KIISC C-ISC-W'12, pp. 56-59, Dec. 2012.
- Y.-S. Kim and D.-W. Lim, "Reversible data hiding scheme based on lattices," J. KMMS, vol. 16, no. 4, pp. 27-33, Dec. 2012.
- S.-H. Cho, D.-S. Kim, and K.-Y. Yoo, "Improved reversible data hiding scheme based on difference value of adjacent pixels," in Proc. KICS Int. Conf. Commun., pp. 205-206, Jeju Island, Korea, Jun. 2013.
- J.-H. Choi and K.-Y. Yoo, "A reversible steganography scheme using improved hiding tree," in Proc. KICS Int. Conf. Commun., pp. 176-177, Jun. 2011.
- S. W. Kim, S. Yoo, J. Shin, and J. Ryou, "A study on the protection method for the medical image using DQT encryption," in Proc. KICS Int. Conf. Commun., pp. 205-206, Jeju Island, Korea, Jun. 2013.
- T.-S. Kim, M.-H. Jang, and S.-H. Kim, "Transmission methods using RS codes to improve spatial relationship of images in reversible data hiding systems," J. KICS, vol. 40, no. 8, pp. 1477-1484, Aug. 2015. https://doi.org/10.7840/kics.2015.40.8.1477
- Y.-H. Kim, D.-W. Lim, and Y.-S. Kim, "Design of fluctuation function to improve BER performance of data hiding in encrypted image," J. KICS, vol. 41, no. 3, pp. 307-316, Mar. 2016. https://doi.org/10.7840/kics.2016.41.3.307
- C.-C. Chang, C.-C. Lin, and Y.-H. Chen, "Reversible data-embedding scheme using differences between original and predicted pixel values," Inf. Secur., vol. 2, no. 2, pp. 35-46, 2008. https://doi.org/10.1049/iet-ifs:20070004
- S. Lian, Z. Liu, Z. Ren, and H. Wang, "Commutative encryption and watermarking in video compression," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774-778, 2007. https://doi.org/10.1109/TCSVT.2007.896635
- Image database [Online], Available: http://sipi.usc.edu/database/