-
1
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding", IBM System Journal, vol. 35, pp. 313-336, 2003.
-
(2003)
IBM System Journal
, vol.35
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
2
-
-
80053148181
-
Reversible run length data embedding for medical images, Communication Software and Networks (ICCSN)
-
Z. Chang and J. Xu, "Reversible run length data embedding for medical images," Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference, pp. 260-263, 2011.
-
(2011)
2011 IEEE 3rd International Conference
, pp. 260-263
-
-
Chang, Z.1
Xu, J.2
-
3
-
-
77649336544
-
A high payload frequency-based reversible image hiding method
-
C. C. Chang, P. Y. Pai, C. M. Yeh, and Y. K. Chan, "A high payload frequency-based reversible image hiding method," Information Sciences, vol.180, pp. 2286-2298, 2010.
-
(2010)
Information Sciences
, vol.180
, pp. 2286-2298
-
-
Chang, C.C.1
Pai, P.Y.2
Yeh, C.M.3
Chan, Y.K.4
-
4
-
-
63149108004
-
-
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
-
C. C. Chang, W. L. Tai, and K. N. Chen, "Lossless data hiding based on histogram for image authentication," IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 506-511, 2008.
-
(2008)
Lossless data hiding based on histogram for image authentication
, pp. 506-511
-
-
Chang, C.C.1
Tai, W.L.2
Chen, K.N.3
-
5
-
-
34247156504
-
Reversible hiding in DCT-based compressed images
-
C. C. Chang, C. C. Lin, C. S. Tseng, W. L. Tai, "Reversible hiding in DCT-based compressed images," Information Sciences, vol. 177, no. 13, pp. 2768-2786, 2007.
-
(2007)
Information Sciences
, vol.177
, Issue.13
, pp. 2768-2786
-
-
Chang, C.C.1
Lin, C.C.2
Tseng, C.S.3
Tai, W.L.4
-
6
-
-
41549096759
-
Lossless data hiding for color images based on block truncation coding
-
C. C. Chang, C. C. Lin, Y. H. Fan, "Lossless data hiding for color images based on block truncation coding," Pattern Recognition, vol. 41, pp. 2347-2357, 2008.
-
(2008)
Pattern Recognition
, vol.41
, pp. 2347-2357
-
-
Chang, C.C.1
Lin, C.C.2
Fan, Y.H.3
-
7
-
-
79751510659
-
A capacity-enhanced reversible data hiding scheme based on SMVQ
-
Feb
-
S. F. Chiou, I E. Liao, and M. S. Hwang, "A capacity-enhanced reversible data hiding scheme based on SMVQ", Imaging Science Journal, vol. 59, no. 1, pp. 17-24, Feb. 2011.
-
(2011)
Imaging Science Journal
, vol.59
, Issue.1
, pp. 17-24
-
-
Chiou, S.F.1
Liao, I.E.2
Hwang, M.S.3
-
8
-
-
79751510659
-
A capacity-enhanced reversible data hiding scheme based on SMVQ
-
Feb
-
S. F. Chiou, I E. Liao, and M. S. Hwang, "A capacity-enhanced reversible data hiding scheme based on SMVQ", Imaging Science Journal, vol. 59, no. 1, pp. 17-24, Feb. 2011.
-
(2011)
Imaging Science Journal
, vol.59
, Issue.1
, pp. 17-24
-
-
Chiou, S.F.1
Liao, I.E.2
Hwang, M.S.3
-
9
-
-
84872786596
-
-
Digital Imaging and Communications in Medicine
-
Digital Imaging and Communications in Medicine. Available at http://medical.nema.org/.
-
-
-
-
10
-
-
79952328143
-
Reversible and high-capacity data hiding in medical images
-
M. Fallahpour, D. Megias, and M. Ghanbari, "Reversible and high-capacity data hiding in medical images," IET Image Process, vol. 5, Iss. 2, pp. 190-197, 2011.
-
(2011)
IET Image Process
, vol.5
, Issue.2
, pp. 190-197
-
-
Fallahpour, M.1
Megias, D.2
Ghanbari, M.3
-
11
-
-
33845467262
-
Reversible watermarking: Current status and key issues
-
J. B. Feng, I. C. Lin, C. S. Tsai, and Y. P. Chu, "Reversible watermarking: Current status and key issues," International Journal Network Security, vol. 12, no. 3, pp. 161-171, 2006.
-
(2006)
International Journal Network Security
, vol.12
, Issue.3
, pp. 161-171
-
-
Feng, J.B.1
Lin, I.C.2
Tsai, C.S.3
Chu, Y.P.4
-
13
-
-
55749115813
-
Multiple layer data hding scheme for medical images
-
D. C. Lou, M. C. Hu, and J. L. Liu, "Multiple layer data hding scheme for medical images," Computer Standards and Interfaces, vol. 31, pp. 329-335, 2009.
-
(2009)
Computer Standards and Interfaces
, vol.31
, pp. 329-335
-
-
Lou, D.C.1
Hu, M.C.2
Liu, J.L.3
-
14
-
-
78049351319
-
Reversible data hiding based on block median preservation
-
H. Luo, F. X. Yu, H. Chen, Z. L. Huang, H. Li, and P. H. Wang, "Reversible data hiding based on block median preservation," Information Sciences, vol. 181, pp. 308-328, 2011.
-
(2011)
Information Sciences
, vol.181
, pp. 308-328
-
-
Luo, H.1
Yu, F.X.2
Chen, H.3
Huang, Z.L.4
Li, H.5
Wang, P.H.6
-
15
-
-
52049093161
-
-
Congress on Image and Signal Processing
-
C. C. Lin, S. P. Yang, and N. L. Hsueh, "Lossless data hiding based on difference expansion without a location map," Congress on Image and Signal Processing, pp. 8-12, 2008.
-
(2008)
Lossless data hiding based on difference expansion without a location map
, pp. 8-12
-
-
Lin, C.C.1
Yang, S.P.2
Hsueh, N.L.3
-
16
-
-
55749115813
-
Multiple layer data hiding scheme for medical images
-
D. C. Lou, M. C. Hu, J. L. Liu, "Multiple layer data hiding scheme for medical images," Computer Standard and Interfaces, vol 31, pp. 329-335, 2009.
-
(2009)
Computer Standard and Interfaces
, vol.31
, pp. 329-335
-
-
Lou, D.C.1
Hu, M.C.2
Liu, J.L.3
-
17
-
-
64349085584
-
Robust lossless image data hiding designed semi-fragile image authentication
-
Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun, and X. Lin, "Robust lossless image data hiding designed semi-fragile image authentication," IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 4, pp. 497-509, 2008.
-
(2008)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.18
, Issue.4
, pp. 497-509
-
-
Ni, Z.1
Shi, Y.Q.2
Ansari, N.3
Su, W.4
Sun, Q.5
Lin, X.6
-
18
-
-
33645157142
-
Reversible data hiding
-
Z. Ni, Y, Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, pp. 354-362, 2006.
-
(2006)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.16
, pp. 354-362
-
-
Ni, Z.1
Shi, Y.Q.2
Ansari, N.3
Su, W.4
-
19
-
-
84872779571
-
-
National Cancer Imaging Archive. Available at
-
National Cancer Imaging Archive. Available at https://imaging.nci.nih.gov/.
-
-
-
-
20
-
-
79952542824
-
-
Third International Conference on Communication Systems and Networks
-
M. Rochan, S. Hariharan, and K. Rajamani, "Data hiding scheme for medical images using lossless code for mobile HIMS," Third International Conference on Communication Systems and Networks, pp. 1-4, 2011.
-
(2011)
Data hiding scheme for medical images using lossless code for mobile HIMS
, pp. 1-4
-
-
Rochan, M.1
Hariharan, S.2
Rajamani, K.3
-
22
-
-
0141862029
-
Reversible data embedding using a difference expansion
-
Aug
-
J. Tian, "Reversible data embedding using a difference expansion," IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no 8, pp. 890-896, Aug. 2003.
-
(2003)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.13
, Issue.8
, pp. 890-896
-
-
Tian, J.1
-
23
-
-
64349087630
-
A progressive image transmission method for 2D-GE image based on context feature with different thresholds
-
Feb
-
M. H. Tsai, S. F. Chiou, and M. S. Hwang, "A progressive image transmission method for 2D-GE image based on context feature with different thresholds", International Journal of Innovative Computing, Information and Control, vol. 5, no. 2, pp. 379-386, Feb. 2009.
-
(2009)
International Journal of Innovative Computing, Information and Control
, vol.5
, Issue.2
, pp. 379-386
-
-
Tsai, M.H.1
Chiou, S.F.2
Hwang, M.S.3
-
24
-
-
0038273964
-
Circular interpretation of bijective transformation in lossless watermarking for media asset management
-
C. D. Vleeschouwer, J. F. Deloaigle, and B. Macq, "Circular interpretation of bijective transformation in lossless watermarking for media asset management," IEEE Transactions on Multimedia, vol. 5, pp. 97-105, 2003.
-
(2003)
IEEE Transactions on Multimedia
, vol.5
, pp. 97-105
-
-
Vleeschouwer, C.D.1
Deloaigle, J.F.2
Macq, B.3
-
25
-
-
82155162483
-
VQ applications in steganorgraphic data hiding upon multimedia images
-
W. J. Wang, C. T. Huang, and S. J. Wang, "VQ applications in steganorgraphic data hiding upon multimedia images," IEEE Systems Journal, vol. 5, no. 4, pp. 528-537, 2011.
-
(2011)
IEEE Systems Journal
, vol.5
, Issue.4
, pp. 528-537
-
-
Wang, W.J.1
Huang, C.T.2
Wang, S.J.3
-
26
-
-
80053566409
-
A high quality image sharing with steganography and adaptive authentication scheme
-
C. C. Wu, S. J. Kao, and M. S. Hwang, "A high quality image sharing with steganography and adaptive authentication scheme", Journal of Systems and Software, vol. 84, no. 12, pp. 2196-2207, 2011
-
(2011)
Journal of Systems and Software
, vol.84
, Issue.12
, pp. 2196-2207
-
-
Wu, C.C.1
Kao, S.J.2
Hwang, M.S.3
-
27
-
-
70350238101
-
A new approach to the secret image sharing with steganography and authentication
-
June 2009
-
C. C. Wu, M. S. Hwang, and S. J. Kao, 7 "A new approach to the secret image sharing with steganography and authentication", Imaging Science Journal, vol. 57, no. 3, pp. 140-151, June 2009.
-
Imaging Science Journal
, vol.57
, Issue.3
, pp. 140-151
-
-
Wu, C.C.1
Hwang, M.S.2
Kao, S.J.3
|