참고문헌
- W. Stallings, Cryptography and Network Security: Principles and Practice. New Jersey: Pearson Education, 2003.
- M. Park, E. Cho, and T. T. Kwon, "Multi server password authenticated key exchange using attribute-based encryption," J. KICS, vol. 40, no. 8, pp. 1597-1605, Aug. 2015. https://doi.org/10.7840/kics.2015.40.8.1597
- J.-H. Kim, S.-K. Yoo, and S.-H. Lee, "Fully homomorphic encryption scheme without key switching," J. KICS, vol. 38, no. 5, pp. 428-433, May 2015.
- Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn "Information hiding-a survey," in Proc. IEEE, special issue on protection of multimedia content, May 1999. Invited paper.
- R. J. Anderson and F. A. P. Petitcolas. "On the limits of steganography," IEEE J. Sel. Areas on Commun., vol. 16, pp. 474-481, 1998. https://doi.org/10.1109/49.668971
- J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, Aug. 2003. https://doi.org/10.1109/TCSVT.2003.815962
- M. U. Celik, G. Sharma, A. M. Tekalp, and E.Saber, "Lossless generalized-lsb data embedding," IEEE Trans. Image Process., vol. 14, no. 2, pp. 253-266, Feb. 2005. https://doi.org/10.1109/TIP.2004.840686
- Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, 2006. https://doi.org/10.1109/TCSVT.2006.869964
- L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, "Reversible image watermarking using interpolation technique," IEEE Trans. Inf. Forensics Secur., vol. 5, no. 1, pp. 187-193, 2010. https://doi.org/10.1109/TIFS.2009.2035975
- X. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Processing Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011. https://doi.org/10.1109/LSP.2011.2114651
- W. Hong, T.-S. Chen, and H.-Y. Wu, "An improved reversible data hiding in encrypted images using side match," IEEE Signal Processing Lett., vol. 19, no. 4, pp. 199-202, Apr. 2012. https://doi.org/10.1109/LSP.2012.2187334
- J. Fridirich, M. Goljan, and R Du, "Lossless data embedding for all image formats," SPIE Proc. photonics West, Electronic Imaging, Security and Watermarking of multimedia Contents, vol. 4675, pp. 572-583, 2002.
- Y. C. Li, C. M. Yeh, and C. C. Chang, "Data hiding based on the similarity between neighboring pixels with reversibility," Digital Signal Processing, vol. 20, pp. 1116-1128, 2010.
- P. Tsai, Y. C. Hu, and H. L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Processing, vol. 89, no. 6, pp. 1129-1143, 2009.
- W. L. Tai, C. M. Yeh, and C. C. Chang, "Reversible data hiding based on histogram modification of pixel differences," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp. 906-910, Jun. 2009. https://doi.org/10.1109/TCSVT.2009.2017409
- H. C. Wu, H. C. Wang, C. S. Tsai, and C. M. Wang, "Reversible image steganographic scheme via predictive coding," Displays, vol. 31, no. 1, pp. 35-43, Jan. 2010. https://doi.org/10.1016/j.displa.2009.10.002
- C.-C. Chang, C.-C. Lin, and Y.-H. Chen, "Reversible data-embedding scheme using differences between original and predicted pixel values," Inf. Secur., vol. 2, no. 2, pp. 35-46, 2008. https://doi.org/10.1049/iet-ifs:20070004
- S. Lian, Z. Liu, Z. Ren, and H. Wang, "Commutative encryption and watermarking in video compression," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774-778, 2007. https://doi.org/10.1109/TCSVT.2007.896635
- Y.-S. Kim, C.-J. Ryu, and S.-J. Han, "Refined reversible data hiding scheme in encrypted image," in Proc. KIIT Summer Conf. 2011, pp. 78-82, May 2011.
- J.-H. Jeong, K.-J. Kang, Y.-S. Kim, and D.-W. Lim, "Reversible data hiding scheme using dynamic bit selection in encrypted image," in Proc. KIISC Int. Conf. 2012, pp. 56-59, Dec. 2012.
- Y.-S. Kim and D.-W. Lim, "Reversible data hiding scheme based on lattices," J. KMMS, vol. 16, no. 4, pp. 27-33, Dec. 2012.
- S.-H. Cho, D.-S. Kim, and K.-Y. Yoo, "Improved reversible data hiding scheme based on difference value of adjacent pixels," in Proc. KICS Int. Conf. Commun., pp. 205-206, Jeju Island, Korea, Jun. 2013.
- T.-S. Kim, M.-H. Jang, and S.-H. Kim, "Transmission methods using RS codes to improve spatial relationship of images in reversible data hiding systems," J. KICS, vol. 40, no. 8, pp. 1477-1484, Aug. 2015. https://doi.org/10.7840/kics.2015.40.8.1477
피인용 문헌
- 영역 분할을 이용한 변형된 스위칭 필터에 관한 연구 vol.41, pp.10, 2016, https://doi.org/10.7840/kics.2016.41.10.1284
- 암호화된 영상의 가역적 데이터 은닉을 위한 일반화된 섭동 함수 설계 vol.41, pp.11, 2016, https://doi.org/10.7840/kics.2016.41.11.1329
- New Fluctuation Functions to Measure Spatial Correlation of Encrypted Images in Reversible Data Hiding vol.42, pp.2, 2016, https://doi.org/10.7840/kics.2017.42.2.331