References
- J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Cir. Syst. Video Technol., vol. 13, no. 8, pp. 890-896, 2003. https://doi.org/10.1109/TCSVT.2003.815962
- Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. Cir. Syst. Video Technol., vol. 16, no. 8, pp. 354- 362, 2006. https://doi.org/10.1109/TCSVT.2006.869964
- M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. Image Process., vol. 14, no. 2, pp. 253-266, 2005. https://doi.org/10.1109/TIP.2004.840686
- D. M. Thodi and J. J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. Image Process., vol. 16, no. 3, pp. 721-730, 2007. https://doi.org/10.1109/TIP.2006.891046
- C. C. Chang, C. C. Lin, and Y. H. Chen, "Reversible data-embedding scheme using differences between original and predicted pixel values," Inform. Secur., vol. 2, no. 2, pp. 35-46, 2008. https://doi.org/10.1049/iet-ifs:20070004
- L. Luo, Z. Chen, M. Chen, X. Zeng, and H Xiong, "Reversible image watermarking using interpolation technique," IEEE Trans. Inf. Foren. Secur., vol. 5, no. 1, Mar. 2010.
- W. Hong and T. S. Chen, "Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism," J. Vis. Commun. Image Represent., vol. 22, no. 2, pp. 131-140, 2011. https://doi.org/10.1016/j.jvcir.2010.11.004
- S. Kang, H.-J. Hwang, and H.-J. Kim, "Reversible watermark using an accurate predictor and sorter based on payload balancing," ETRI J., vol. 34, no. 3, pp. 410-420, Jun. 2012. https://doi.org/10.4218/etrij.12.0111.0075
- J.-H. Kim, S.-K. Yoo, and S.-H. Lee, "Fully homomorphic encryption scheme without key switching," J. KICS, vol. 38C, no. 5, pp. 428-433, Jun. 2013. https://doi.org/10.7840/kics.2013.38C.5.428
- K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, "Reversible data Hiding in encrypted images reserving room before encryption," IEEE Trans. Inf. Foren. Secur., vol. 8, no. 3, Mar. 2013.
- X. Zhang, "Reversible data hiding in encrypted images," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, 2011. https://doi.org/10.1109/LSP.2011.2114651
- X. Zhang, "Separable reversible data hiding in encrypted image," IEEE Trans. Inf. Foren. Secur., vol. 7, no. 2, Apr. 2012.
- T. Kim, M.-H. Jang, and S. Kim, "Transmission methods using RS codes to improve spacial relationship of images in reversible data hiding system," J. KICS, vol. 40, no. 8, pp. 1477-1484, Aug. 2015. https://doi.org/10.7840/kics.2015.40.8.1477
- F.-T.-Z. Khanam, D. M. Nguyen, and S. Kim, "Improved reversible data hiding in encrypted image using new fluctuation function," in Proc. KICS Int. Conf. Commun, Jeju island, Jun. 2016.
- Y.-H. Kim, D.-W. Lim, and Y.-S. Kim, "Design of fluctuation function to improve BER performance of data hiding in encrypted image," J. KICS, vol. 41, no. 3, pp. 307-316, Mar. 2016. https://doi.org/10.7840/kics.2016.41.3.307
- W. Hong, T. S. Chen, and H.-Y. Wu, "An improved reversible data hiding in encrypted images using side match," IEEE Sign. Process. Lett., vol. 19, no. 4, pp. 199-202, Apr. 2012. https://doi.org/10.1109/LSP.2012.2187334