-
1
-
-
28844486742
-
Reversible data embedding into images using wavelet techniques and sorting
-
1057-7149
-
Kamstra, L., and Heijmans, J.A.M.: ' Reversible data embedding into images using wavelet techniques and sorting ', IEEE Trans. Image Process., 2005, 14, (12), p. 2082-2090 1057-7149
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.12
, pp. 2082-2090
-
-
Kamstra, L.1
Heijmans, J.A.M.2
-
2
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
0001-0782
-
Rivest, R., Shamir, A., and Adleman, L.: ' A method for obtaining digital signatures and public-key cryptosystems ', Commun. ACM, 1978, 21, (2), p. 120-126 0001-0782
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
3
-
-
0001187269
-
Information hiding terminology
-
Pfitzman, B.: ' Information hiding terminology ', Information Hiding Workshop, 1996, p. 347-350, (Lect. Notes Comput. Sci., 1996, 1174)
-
(1996)
Information Hiding Workshop
, pp. 347-350
-
-
Pfitzman, B.1
-
4
-
-
0242408697
-
Localized lossless authentication watermark
-
Celik, M.U., Sharma, G., Tekalp, A.M., and Saber, E.: ' Localized lossless authentication watermark ', Proc. SPIE, 2003, 5020, p. 689-698
-
(2003)
Proc. SPIE
, vol.5020
, pp. 689-698
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
5
-
-
19744376440
-
SVD-based digital image watermarking scheme
-
0167-8655
-
Chang, C.C., Tsai, P.Y., and Lin, M.H.: ' SVD-based digital image watermarking scheme ', Pattern Recognit. Lett., 2005, 26, (10), p. 1577-1586 0167-8655
-
(2005)
Pattern Recognit. Lett.
, vol.26
, Issue.10
, pp. 1577-1586
-
-
Chang, C.C.1
Tsai, P.Y.2
Lin, M.H.3
-
6
-
-
32644434350
-
A watermarking-based image ownership and tampering authentication scheme
-
0167-8655
-
Chang, C.C., Hu, Y.S., and Lu, T.C.: ' A watermarking-based image ownership and tampering authentication scheme ', Pattern Recognit. Lett., 2006, 27, (5), p. 439-446 0167-8655
-
(2006)
Pattern Recognit. Lett.
, vol.27
, Issue.5
, pp. 439-446
-
-
Chang, C.C.1
Hu, Y.S.2
Lu, T.C.3
-
7
-
-
35349002199
-
A fragile watermarking scheme for digital images authentication using pixel-difference
-
1368-2199
-
Chang, C.C., Lin, P.Y., and Chuang, J.C.: ' A fragile watermarking scheme for digital images authentication using pixel-difference ', Imaging Sci. J., 2007, 55, (3), p. 140-147 1368-2199
-
(2007)
Imaging Sci. J.
, vol.55
, Issue.3
, pp. 140-147
-
-
Chang, C.C.1
Lin, P.Y.2
Chuang, J.C.3
-
8
-
-
84961844573
-
Invertible authentication watermark for JPEG images
-
San Jose, CA
-
Fridrich, J., Goljan, J., and Du, R.: ' Invertible authentication watermark for JPEG images ', Proc. SPIE Conf. Security and Watermarking of Multimedia Content, San Jose, CA, 2001, p. 223-227
-
(2001)
Proc. SPIE Conf. Security and Watermarking of Multimedia Content
, pp. 223-227
-
-
Fridrich, J.1
Goljan, J.2
Du, R.3
-
9
-
-
0036488240
-
Lossless data embedding - New paradigm in digital watermarking
-
1110-8657
-
Fridrich, J., Goljan, M., and Du, R.: ' Lossless data embedding - new paradigm in digital watermarking ', EURASIP J. Appl. Signal Process., 2002, 2002, (2), p. 185-196 1110-8657
-
(2002)
EURASIP J. Appl. Signal Process.
, vol.2002
, Issue.2
, pp. 185-196
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
10
-
-
0030384775
-
Techniques for data hiding
-
0018-8670
-
Bender, W., Gruhl, D., Morimoto, N., and Lu, A.: ' Techniques for data hiding ', IBM Syst. J., 1996, 35, (3/4), p. 313-336 0018-8670
-
(1996)
IBM Syst. J.
, vol.35
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
11
-
-
26444437268
-
A steganographic method for hiding secret data using side match vector quantization
-
0916-8532
-
Chang, C.C., and Wu, W.C.: ' A steganographic method for hiding secret data using side match vector quantization ', IEICE Trans. Inf. Syst., 2005, E88-D, (9), p. 2159-2167 0916-8532
-
(2005)
IEICE Trans. Inf. Syst.
, vol.E88-D
, Issue.9
, pp. 2159-2167
-
-
Chang, C.C.1
Wu, W.C.2
-
12
-
-
33747782523
-
New image steganographic methods using run-length approach
-
Chang, C.C., Lin, C.Y., and Wang, Y.Z.: ' New image steganographic methods using run-length approach ', Inf. Sci., 2006, 176, (22), p. 3393-3408
-
(2006)
Inf. Sci.
, vol.176
, Issue.22
, pp. 3393-3408
-
-
Chang, C.C.1
Lin, C.Y.2
Wang, Y.Z.3
-
13
-
-
33845650617
-
Reversible steganography for VQ-compressed images using side matching and relocation
-
Chang, C.C., and Lin, C.Y.: ' Reversible steganography for VQ-compressed images using side matching and relocation ', IEEE Trans. Inf. Forensics Secur., 2006, 1, (4), p. 493-501
-
(2006)
IEEE Trans. Inf. Forensics Secur.
, vol.1
, Issue.4
, pp. 493-501
-
-
Chang, C.C.1
Lin, C.Y.2
-
14
-
-
33751501445
-
A reversible data hiding scheme based on side match vector quantization
-
1051-8215
-
Chang, C.C., Tai, W.L., and Lin, C.C.: ' A reversible data hiding scheme based on side match vector quantization ', IEEE Trans. Circuits Syst. Video Technol., 2006, 16, (10), p. 1301-1308 1051-8215
-
(2006)
IEEE Trans. Circuits Syst. Video Technol.
, vol.16
, Issue.10
, pp. 1301-1308
-
-
Chang, C.C.1
Tai, W.L.2
Lin, C.C.3
-
15
-
-
1642302769
-
Reversible data hiding
-
Celik, M.U., Sharma, G., Tekalp, A.M., and Saber, E.: ' Reversible data hiding ', Proc. IEEE Int. Conf. Image Processing, 2002, II, p. 157-160
-
(2002)
Proc. IEEE Int. Conf. Image Processing
, vol.2
, pp. 157-160
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
16
-
-
0141862029
-
Reversible data embedding using a difference expansion
-
1051-8215
-
Tian, J.: ' Reversible data embedding using a difference expansion ', IEEE Trans. Circuits Syst. Video Technol., 2003, 13, (8), p. 890-896 1051-8215
-
(2003)
IEEE Trans. Circuits Syst. Video Technol.
, vol.13
, Issue.8
, pp. 890-896
-
-
Tian, J.1
-
17
-
-
0035369669
-
Edge-directed prediction for lossless compression of natural images
-
1057-7149
-
Li, X., and Orchard, M.T.: ' Edge-directed prediction for lossless compression of natural images ', IEEE Trans. Image Process., 2001, 10, (6), p. 813-817 1057-7149
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.6
, pp. 813-817
-
-
Li, X.1
Orchard, M.T.2
-
18
-
-
0003966349
-
-
6,278,791
-
Honsinger, C.W., Jones, P.W., Rabbani, M., and Stoffel, J.C.: ' Lossless recovery of an original image containing embedded data ', (6,278,791)
-
Lossless Recovery of An Original Image Containing Embedded Data
-
-
Honsinger, C.W.1
Jones, P.W.2
Rabbani, M.3
Stoffel, J.C.4
-
19
-
-
0038273964
-
Circular interpretation of bijective transformations in lossless watermarking for media asset management
-
Vleeschouwer, D.C., Delaigle, J.F., and Macq, B.: ' Circular interpretation of bijective transformations in lossless watermarking for media asset management ', IEEE Trans. Multimedia, 2003, 5, (1), p. 97-105
-
(2003)
IEEE Trans. Multimedia
, vol.5
, Issue.1
, pp. 97-105
-
-
Vleeschouwer, D.C.1
Delaigle, J.F.2
MacQ, B.3
-
20
-
-
13244269881
-
Lossless generalized-LSB data embedding
-
1057-7149
-
Celik, M.U., Sharma, G., Tekalp, A.M., and Saber, E.: ' Lossless generalized-LSB data embedding ', IEEE Trans. Image Process., 2005, 14, (2), p. 253-266 1057-7149
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.2
, pp. 253-266
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
21
-
-
0001086037
-
Lossless image compression by two-dimensional linear prediction with variable coefficients
-
0916-8508
-
Kuroki, N., Nomura, T., Tomita, M., and Hirano, K.: ' Lossless image compression by two-dimensional linear prediction with variable coefficients ', IEICE Trans. Fundam. Electron., Commun. Comput. Sci., 1992, E75-A, (7), p. 882-889 0916-8508
-
(1992)
IEICE Trans. Fundam. Electron., Commun. Comput. Sci.
, vol.E75-A
, Issue.7
, pp. 882-889
-
-
Kuroki, N.1
Nomura, T.2
Tomita, M.3
Hirano, K.4
-
22
-
-
0025660620
-
Reversible compression of HDTV images using median adaptive prediction and arithmetic coding
-
Martucci, S.: ' Reversible compression of HDTV images using median adaptive prediction and arithmetic coding ', IEEE Int. Symp. Circuits Syst., 1990, 2/4, p. 1311-1313
-
(1990)
IEEE Int. Symp. Circuits Syst.
, vol.2-4
, pp. 1311-1313
-
-
Martucci, S.1
-
23
-
-
34548064855
-
Reversible image watermarking based on integer-to-integer wavelet transform
-
Lee, S., Chang, D.Y., and Kalker, T.: ' Reversible image watermarking based on integer-to-integer wavelet transform ', IEEE Trans. Inf. Forensics Secur., 2007, 2, (3), p. 321-330
-
(2007)
IEEE Trans. Inf. Forensics Secur.
, vol.2
, Issue.3
, pp. 321-330
-
-
Lee, S.1
Chang, D.Y.2
Kalker, T.3
-
24
-
-
33845461965
-
Lossless data hiding using histogram shifting method based on integer wavelets
-
Jeju Island, Korea, (LNCS, 4283)
-
Xuan, G., Shi, Y.Q., Yao, Q., Ni, Z., Yang, J.G., and Chai, P.: ' Lossless data hiding using histogram shifting method based on integer wavelets ', Int. Workshop Digital Watermarking, Jeju Island, Korea, 2006, p. 323-332, (LNCS, 4283)
-
(2006)
Int. Workshop Digital Watermarking
, pp. 323-332
-
-
Xuan, G.1
Shi, Y.Q.2
Yao, Q.3
Ni, Z.4
Yang, J.G.5
Chai, P.6
-
25
-
-
21844479323
-
Simple reversible watermarking scheme
-
San Jose, CA
-
Coltuc, D., and Tremeau, A.: ' Simple reversible watermarking scheme ', Proc. SPIE Conf. Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, 2006, p. 561-568
-
(2006)
Proc. SPIE Conf. Security, Steganography, and Watermarking of Multimedia Contents
, pp. 561-568
-
-
Coltuc, D.1
Tremeau, A.2
-
26
-
-
33645663915
-
Simple reversible watermarking schemes: Further results
-
San Jose, CA
-
Coltuc, D., and Chassery, J.M.: ' Simple reversible watermarking schemes: further results ', Proc. SPIE Conf. Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, 2006, p. 739-746
-
(2006)
Proc. SPIE Conf. Security, Steganography, and Watermarking of Multimedia Contents
, pp. 739-746
-
-
Coltuc, D.1
Chassery, J.M.2
-
27
-
-
0036817886
-
Reliable information bit hiding
-
1051-8215
-
Huang, J., and Shi, Y.Q.: ' Reliable information bit hiding ', IEEE Trans. Circuits Syst. Video Technol., 2002, 12, (10), p. 916-920 1051-8215
-
(2002)
IEEE Trans. Circuits Syst. Video Technol.
, vol.12
, Issue.10
, pp. 916-920
-
-
Huang, J.1
Shi, Y.Q.2
|