메뉴 건너뛰기




Volumn 7, Issue 4, 2012, Pages 1155-1167

The scalar scheme for reversible information-embedding in gray-scale signals: Capacity evaluation and code constructions

Author keywords

Arithmetic coding; gray scale signals; rate distortion function; reversible information embedding; steganography

Indexed keywords

ARITHMETIC CODING; CODE CONSTRUCTION; GRAY SCALE; GRAY-SCALE IMAGES; HOST SIGNALS; IMAGE PREDICTION; INFORMATION EMBEDDING; ITERATIVE ALGORITHM; MEAN SQUARED ERROR; RATE-DISTORTION BOUNDS; RATE-DISTORTION FUNCTION; SIGNAL TRANSITION;

EID: 84864090417     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2012.2197614     Document Type: Article
Times cited : (38)

References (26)
  • 2
    • 0002500694 scopus 로고    scopus 로고
    • Image authentication techniques for surveillance applications
    • PII S0018921901084298
    • F. Bartolini, A. Tefas, M. Barni, and I. Pitas, "Image authentication techniques for surveillance applications," Proc. IEEE, vol. 89, no. 10, pp. 1403-1418, Oct. 2001. (Pubitemid 33766629)
    • (2001) Proceedings of the IEEE , vol.89 , Issue.10 , pp. 1403-1418
    • Bartolini, F.1    Tefas, A.2    Barni, M.3    Pitas, I.4
  • 3
    • 0032680807 scopus 로고    scopus 로고
    • Information hiding:A survey
    • Jul
    • F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding:A survey," Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, Jul. 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1062-1078
    • Petitcolas, F.A.P.1    Anderson, R.J.2    Kuhn, M.G.3
  • 4
    • 0037353686 scopus 로고    scopus 로고
    • Information-theoretic analysis of information hiding
    • Mar
    • P. Moulin and J. A. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inform. Theory, vol. 49, no. 3, pp. 563-593, Mar. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , Issue.3 , pp. 563-593
    • Moulin, P.1    O'sullivan, J.A.2
  • 5
    • 64249127145 scopus 로고    scopus 로고
    • Capacity of steganographic channels
    • Apr
    • J. J. Harmsen and W. A. Pearlman, "Capacity of steganographic channels," IEEE Trans. Inform. Theory, vol. 55, no. 4, pp. 1775-1792, Apr. 2009.
    • (2009) IEEE Trans. Inform. Theory , vol.55 , Issue.4 , pp. 1775-1792
    • Harmsen, J.J.1    Pearlman, W.A.2
  • 6
    • 45249103920 scopus 로고    scopus 로고
    • Perfectly secure steganography: Capacity, error exponents, and code constructions
    • Jun
    • Y. Wang and P. Moulin, "Perfectly secure steganography: Capacity, error exponents, and code constructions," IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2706-2722, Jun. 2008.
    • (2008) IEEE Trans. Inform. Theory , vol.54 , Issue.6 , pp. 2706-2722
    • Wang, Y.1    Moulin, P.2
  • 7
    • 15044345755 scopus 로고    scopus 로고
    • Capacity and codes for embedding information in gray-scale signals
    • DOI 10.1109/TIT.2004.842707
    • F. M. J. Willems and M. V. Dijk, "Capacity and codes for embedding information in gray-scale signals," IEEE Trans. Inform. Theory, vol. 51, no. 3, pp. 1209-1214, Mar. 2005. (Pubitemid 40377587)
    • (2005) IEEE Transactions on Information Theory , vol.51 , Issue.3 , pp. 1209-1214
    • Willems, F.M.J.1    Dijk, M.V.2
  • 16
    • 51349120735 scopus 로고    scopus 로고
    • Coding for channels with rate-limited side information at the decoder, with applications
    • Sep
    • Y. Steinberg, "Coding for channels with rate-limited side information at the decoder, with applications," IEEE Trans. Inform. Theory, vol. 54, no. 9, pp. 4283-4295, Sep. 2008.
    • (2008) IEEE Trans. Inform. Theory , vol.54 , Issue.9 , pp. 4283-4295
    • Steinberg, Y.1
  • 17
    • 77951585908 scopus 로고    scopus 로고
    • Variations on information embedding in multiple access and broadcast channels
    • May
    • S. P. Kotagiri and J. N. Laneman, "Variations on information embedding in multiple access and broadcast channels," IEEE Trans. Inform. Theory, vol. 56, no. 5, pp. 2225-2240, May 2010.
    • (2010) IEEE Trans. Inform. Theory , vol.56 , Issue.5 , pp. 2225-2240
    • Kotagiri, S.P.1    Laneman, J.N.2
  • 19
    • 3843102623 scopus 로고    scopus 로고
    • Reversiblewatermark using the difference expansion of a generalized integer transform
    • Aug
    • A.M.Alattar, "Reversiblewatermark using the difference expansion of a generalized integer transform," IEEE Trans. Image Processing, vol. 13, no. 8, pp. 1147-1156, Aug. 2004.
    • (2004) IEEE Trans. Image Processing , vol.13 , Issue.8 , pp. 1147-1156
    • Alattar, A.M.1
  • 21
    • 33947247978 scopus 로고    scopus 로고
    • Expansion embedding techniques for reversible watermarking
    • DOI 10.1109/TIP.2006.891046
    • D. M. Thodi and J. J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. Image Process., vol. 16, no. 3, pp. 721-730, Mar. 2007. (Pubitemid 46431970)
    • (2007) IEEE Transactions on Image Processing , vol.16 , Issue.3 , pp. 721-730
    • Thodi, D.M.1    Rodriguez, J.J.2
  • 22
    • 80052976140 scopus 로고    scopus 로고
    • Capacity-approaching codes for reversible data hiding
    • W. Zhang, B. Chen, and N. Yu, "Capacity-approaching codes for reversible data hiding," Lecture Notes in Computer Science, vol. 6958/ 2011, pp. 255-269, 2011.
    • (2011) Lecture Notes in Computer Science , vol.6958 , Issue.2011 , pp. 255-269
    • Zhang, W.1    Chen, B.2    Yu, N.3
  • 24
    • 84864096960 scopus 로고    scopus 로고
    • Arithmetic coding
    • 2nd ed. San Francisco, CA:Morgan Kaufmann, ch. 4
    • K. Sayood, "Arithmetic coding," in Introduction to Data Compression, 2nd ed. San Francisco, CA:Morgan Kaufmann, 2000, ch. 4.
    • (2000) Introduction to Data Compression
    • Sayood, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.