-
1
-
-
0036031345
-
Lossless data embedding for all image formats
-
San Jose, CA
-
J. Fridrich and M. Goljan, "Lossless data embedding for all image formats," in Proc. EI SPIE, Security Watermarking Multimedia Contents IV, San Jose, CA, 2002, vol. 4675, pp. 572-583.
-
(2002)
Proc. EI SPIE, Security Watermarking Multimedia Contents IV
, vol.4675
, pp. 572-583
-
-
Fridrich, J.1
Goljan, M.2
-
2
-
-
13244269881
-
Lossless generalized-LSB data embedding
-
Feb.
-
M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. Image Process., vol. 14, no. 2, pp. 253-266, Feb. 2005.
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.2
, pp. 253-266
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
3
-
-
78349280700
-
Privacy protection of fingerprint database using lossless data hiding
-
S. Li and A. C. Kot, "Privacy protection of fingerprint database using lossless data hiding," in Proc. IEEE Int. Conf.Multimedia Expo., 2010, pp. 1293-1298.
-
(2010)
Proc. IEEE Int. Conf.Multimedia Expo.
, pp. 1293-1298
-
-
Li, S.1
Kot, A.C.2
-
4
-
-
64449088683
-
High-capacity reversible data hiding in binary images using pattern substitution
-
Jun.
-
Y.-A. Ho, Y.-K. Chan, H.-C. Wu, and Y.-P. Chu, "High-capacity reversible data hiding in binary images using pattern substitution," Comput. Standards Interfaces, vol. 31, no. 4, pp. 787-794, Jun. 2009.
-
(2009)
Comput. Standards Interfaces
, vol.31
, Issue.4
, pp. 787-794
-
-
Ho, Y.-A.1
Chan, Y.-K.2
Wu, H.-C.3
Chu, Y.-P.4
-
6
-
-
70350072555
-
Complete video quality-preserving data hiding
-
Oct.
-
K. Wong, K. Tanaka, K. Takagi, and Y. Nakajima, "Complete video quality-preserving data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 10, pp. 1499-1512, Oct. 2009.
-
(2009)
IEEE Trans. Circuits Syst. Video Technol.
, vol.19
, Issue.10
, pp. 1499-1512
-
-
Wong, K.1
Tanaka, K.2
Takagi, K.3
Nakajima, Y.4
-
7
-
-
0141862029
-
Reversible data embedding using a difference expansion
-
Aug.
-
J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, Aug. 2003.
-
(2003)
IEEE Trans. Circuits Syst. Video Technol.
, vol.13
, Issue.8
, pp. 890-896
-
-
Tian, J.1
-
8
-
-
3843102623
-
Reversible watermark using difference expansion of a generalized integer transform
-
Aug.
-
A. M. Alattar, "Reversible watermark using difference expansion of a generalized integer transform," IEEE Trans. Image Process., vol. 13, no. 8, pp. 1147-1156, Aug. 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.8
, pp. 1147-1156
-
-
Alattar, A.M.1
-
9
-
-
49549108193
-
A novel difference expansion transform for reversible data embedding
-
Sep.
-
H.-J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, and H.-G. Choo, "A novel difference expansion transform for reversible data embedding," IEEE Trans. Inf. Forensic Security, vol. 3, no. 3, pp. 456-465, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Forensic Security
, vol.3
, Issue.3
, pp. 456-465
-
-
Kim, H.-J.1
Sachnev, V.2
Shi, Y.Q.3
Nam, J.4
Choo, H.-G.5
-
10
-
-
33947247978
-
Expansion embedding techniques for reversible watermarking
-
Mar.
-
D. M. Thodi and J. J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. Image Process, vol. 16, no. 3, pp. 721-730, Mar. 2007.
-
(2007)
IEEE Trans. Image Process
, vol.16
, Issue.3
, pp. 721-730
-
-
Thodi, D.M.1
Rodriguez, J.J.2
-
11
-
-
59649101643
-
DE-based reversible data hiding with improved overflow location map
-
Feb.
-
Y. Hu, H.-K. Lee, and J. Li, "DE-based reversible data hiding with improved overflow location map," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 2, pp. 250-260, Feb. 2009.
-
(2009)
IEEE Trans. Circuits Syst. Video Technol.
, vol.19
, Issue.2
, pp. 250-260
-
-
Hu, Y.1
Lee, H.-K.2
Li, J.3
-
12
-
-
33645157142
-
Reversible data hiding
-
Mar.
-
Z. Ni, Y. Q. Shi, N. Ansari, and S.Wei, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, Mar. 2006.
-
(2006)
IEEE Trans. Circuits Syst. Video Technol.
, vol.16
, Issue.3
, pp. 354-362
-
-
Ni, Z.1
Shi, Y.Q.2
Ansari, N.3
Wei, S.4
-
13
-
-
60749112009
-
Reversible image hiding scheme using predictive coding and histogram shifting
-
Jun.
-
P. Tsai, Y. C. Hu, and H. L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Process., vol. 89, no. 6, pp. 1129-1143, Jun. 2009.
-
(2009)
Signal Process.
, vol.89
, Issue.6
, pp. 1129-1143
-
-
Tsai, P.1
Hu, Y.C.2
Yeh, H.L.3
-
14
-
-
77249169798
-
Reversible image watermarking using interpolation technique
-
Mar.
-
L. X. Luo, Z. Y. Chen, M. Chen, X. Zeng, and Z. Xiong, "Reversible image watermarking using interpolation technique," IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187-193, Mar. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.1
, pp. 187-193
-
-
Luo, L.X.1
Chen, Z.Y.2
Chen, M.3
Zeng, X.4
Xiong, Z.5
-
15
-
-
46449100620
-
Capacity bounds and code constructions for reversible data-hiding
-
T. Kalker and F.M.Willems, "Capacity bounds and code constructions for reversible data-hiding," in Proc. 14th Int. Conf. DSP, 2002, pp. 71-76.
-
(2002)
Proc. 14th Int. Conf. DSP
, pp. 71-76
-
-
Kalker, T.1
Willems, F.M.2
-
16
-
-
8844269659
-
A code construction for recursive reversible data-hiding
-
Juan-les-Pins, France, Dec. 6
-
D. Maas, T. Kalker, and F.M.Willems, "A code construction for recursive reversible data-hiding," in Proc. Multimedia Security Workshop ACM Multimedia, Juan-les-Pins, France, Dec. 6, 2002.
-
(2002)
Proc. Multimedia Security Workshop ACM Multimedia
-
-
Maas, D.1
Kalker, T.2
Willems, F.M.3
-
17
-
-
80052976140
-
Capacity-approaching codes for reversible data hiding
-
Proc 13th IH Springer-Verlag
-
W. Zhang, B. Chen, and N. Yu, "Capacity-approaching codes for reversible data hiding," in Proc 13th IH, 2011, vol. 6958, LNCS, pp. 255-269, Springer-Verlag.
-
(2011)
LNCS
, vol.6958
, pp. 255-269
-
-
Zhang, W.1
Chen, B.2
Yu, N.3
-
20
-
-
33645695834
-
-
[Online] Posted on steganography mailing list
-
R. Crandall, Some Notes on Steganography 1998 [Online]. Available: http://os.inf.tu-dresden.de/westfeld/crandall.pdf, Posted on steganography mailing list
-
(1998)
Some Notes on Steganography
-
-
Crandall, R.1
|