參考文獻 |
參考文獻
[1] D. Coltuc and J. M. Chassery, “Very fast watermarking by reversible contrast mapping,” IEEE Signal Processing Letters, vol. 14, no. 4, pp. 255-258, 2007.
[2] C. C. Chang, T. D. Kieu, and Y. C. Chou, “Reversible data hiding scheme using two steganographic images,” Proceedings of IEEE Region 10 International Conference on Tencon, pp. 1-4, 2007.
[3] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, 2006.
[4] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890-896, 2003.
[5] D. M. Thodi and J. J. Rodriguez, “Prediction-error based reversible watermarking,” Proceedings of IEEE Conference on Image Processing, vol. 3, pp. 1549-1552, 2004.
[6] Y. Liu, L. Ju, M. Hu, X. Ma, and H. Zhao, “A robust reversible data hiding scheme for H.264 without distortion drift,” Neurocomputing, vol. 151, no. 3, pp. 1053-1062, 2015.
[7] D. Xu, R. Wang, and Y. Q. Shi, “An improved reversible data hiding-based approach for intra-frame error concealment in H.264/AVC,” Journal of Visual Communication and Image Representation, vol. 25, no. 2, pp. 410-422, 2014.
[8] H. L. Yeh, S. T. Gue, P. Tsai, and W. K. Shih, “Reversible video data hiding using neighbouring similarity,” IET Signal Processing, vol. 8, no. 6, pp. 579-587, 2014.
[9] A. Nishimura, “Reversible audio data hiding using linear prediction and error expansion,” Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 318-321, 2011.
[10] H. J. Shiu, S. Y. Tang, C. H. Huang, R. C. T. Lee, and C. L. Lei, “A reversible acoustic data hiding method based on analog modulation,” Information Sciences, vol. 273, pp. 233-246, 2014.
[11] D. Yan and R. Wang, “Reversible data hiding for audio based on prediction error expansion,” Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 249-252, 2008.
[12] C. C. Chang, T. C. Lu, Y. F. Chang, and R. C. T. Lee, “Reversible data hiding schemes for deoxyribonucleic acid (DNA) medium,” International Journal of Innovative Computing, Information and Control, vol. 3, no. 5, pp. 1145-1160, 2007.
[13] H. J. Shiu, K. L. Ng, J. F. Fang, R. C. T. Lee, and C. H. Huang, “Data hiding methods based upon DNA sequences,” Information Sciences, vol. 180, no. 11, pp. 2196-2208, 2010.
[14] C. C. Chang, T. S. Nguyen, and C. C. Lin, “A reversible data hiding scheme for VQ indices using locally adaptive coding,” Journal of Visual Communication and Image Representation, vol. 22, no. 7, pp. 664-672, 2011.
[15] C. C. Chang, T. S. Nguyen, and C. C. Lin, “A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies,” Journal of Systems and Software, vol. 86, no. 2, pp. 389-402, 2013.
[16] Z. Pan, S. Hu, X. Ma, and L. Wang, “A new lossless data hiding method based on joint neighboring coding,” Journal of Visual Communication and Image Representation, vol. 26, pp. 14-23, 2015.
[17] C. Qin, C. C. Chang, G. Horng, Y. H. Huang, and Y. C. Chen, “Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching,” Security and Communication Networks, vol. 8, no. 6, pp. 899-906, 2014.
[18] W. J. Wang, C. T. Huang, C. M. Liu, P. C. Su, and S. J. Wang, “Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping,” Information Sciences, vol. 246, no. 10, pp. 69-82, 2013.
[19] S. Li, K. Leung, L. M. Cheng, and C. K. Chan, “A novel image-hiding scheme based on block difference,” Pattern Recognition, vol. 39, no. 6, pp. 1168–1176, 2006.
[20] C. C. Lin, W. L. Tai, and C. C. Chang, “Multilevel reversible data hiding based on histogram modification of difference images,” Pattern Recognitation, vol. 41, no.12, pp. 3582–3591, 2008.
[21] J. Mielikainen, “LSB Matching Revisited. IEEE Signal Process,” Lett , vol. 13, pp. 285–287, 2006.
[22] X. Zhang, S. Wang, “Effcient Steganographic Embedding by Exploiting Modification Direction,” IEEE Commun. Lett, vol. 10, pp.781–783, 2006.
[23] W. Hong, T. Chen, “A Novel Data Embedding Method Using Adaptive Pixel Pair Matching,” IEEE Trans. Inf. Forensics Secur, vol. 7, pp. 176–184, 2012.
[24] J. Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Trans. Circuits Syst. Video Technol, vol. 13, pp. 890–896, 2003.
[25] F. Peng, X. Li, B. Yang, “Adaptive Reversible Data Hiding Scheme Based on Integer Transform,” Signal Process, vol. 92, pp. 54–62, 2012.
[26] W. L. Tai, C. M. Yeh, C. C. Chang, “Reversible Data Hiding Based on Histogram Modification of Pixel Di_erences,” IEEE Trans. Circuits Syst. Video Technol, vol. 19, pp. 906–910, 2009.
[27] K. Wang, Z. M. Lu, Y. J. Hu, “A High Capacity Lossless Data Hiding Scheme for JPEG Images,” J. Syst. Softw, vol. 86, pp. 1965–1975, 2013.
[28] Y. P. Lee, J. C. Lee, W. K. Chen, K. C. Chang, I. J. Su, C. P. Chang, “High-Payload Image Hiding with Quality Recovery Using Tri-Way Pixel-Value Differencing,” Inf. Sci. (Ny), vol. 191, pp. 214–225, 2012.
[29] E. Delp, O. Mitchell, “Image Compression Using Block Truncation Coding,” IEEE Trans. Commun, vol. 27, pp. 1335–1342, 1979.
[30] M. Lema, O. Mitchell, “Absolute Moment Block Truncation Coding and Its Application to Color Images,” IEEE Trans. Commun, vol. 32, pp. 1148–1157, 1984.
[31] A. Malik, G. Sikka, H. K. Verma, “A High Payload Data Hiding Scheme Based on Modified AMBTC Technique,” Multimed. Tools Appl, vol. 76, pp. 14151–14167, 2017.
[32] A. Malik, G. Sikka, H. K. Verma, “An AMBTC Compression Based Data Hiding Scheme Using Pixel Value Adjusting Strategy,” Multidimens. Syst. Signal Process, vol. 29, pp. 1801–1818, 2018.
[33] D. Ou, W. Sun, “High Payload Image Steganography with Minimum Distortion Based on Absolute Moment Block Truncation Coding,” Multimed. Tools Appl, vol. 74, pp. 9117–9139, 2015.
[34] W. Hong, T. S. Chen, C. W. Shiu, “Lossless steganography for AMBTC-compressed images,” In: International Congress on Image and Signal Processing, vol. 2, pp. 13–17, 2008.
[35] Y. H. Huang, C. C. Chang, Y. H. Chen, “Hybrid secret hiding schemes based on absolute moment block truncation coding, ” Multimedia Tools and Applications, vol.76, pp. 6159-6174, 2016.
[36] J. Y. Yeh, C. C. Chen, P. L. Liu, and Y. H. Huang, “High-Payload Data-Hiding Method for AMBTC Decompressed Images,” Entropy, vol. 22-2, no. 145, pp. 1-13, 2020.
[37] T. C. Lu, L. P. Chi, C. H. Wu, and H. P. Chang, “Reversible data hiding in dual stego-images using frequency-based encoding strategy,” Multimedia Tools and Applications, vol.76, pp. 23903-23929, 2017.
[38] UCID Image Dataset, http://homepages.lboro.ac.uk/~cogs/datasets/ucid/data/ ucid.v2.tar.gz |