-
1
-
-
13244269881
-
Lossless generalized-LSB data embedding
-
Feb.
-
M. U. Celik, G. Sharma, A. M. Tekalp, "Lossless generalized-LSB data embedding," IEEE Trans. Image Process., vol. 14, no. 2, pp. 253-266, Feb. 2005.
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.2
, pp. 253-266
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
-
2
-
-
84961844573
-
Invertible authentication watermark for JPEG images
-
Las Vegas, NV, USA, Apr.
-
J. Fridrich, M. Goljan, R. Du, "Invertible authentication watermark for JPEG images," in Proc. Inf. Technol. Coding Comput., Las Vegas, NV, USA, Apr. 2001, pp. 223-227.
-
(2001)
Proc. Inf. Technol. Coding Comput.
, pp. 223-227
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
3
-
-
49549108193
-
A novel difference expansion transform for reversible data embedding
-
Sep.
-
H. J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, H. G. Choo, "A novel difference expansion transform for reversible data embedding," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 456-465, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.3
, pp. 456-465
-
-
Kim, H.J.1
Sachnev, V.2
Shi, Y.Q.3
Nam, J.4
Choo, H.G.5
-
4
-
-
80051745146
-
Improved embedding for prediction based reversible watermarking
-
Sep.
-
D. Coltuc, "Improved embedding for prediction based reversible watermarking," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 873-882, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 873-882
-
-
Coltuc, D.1
-
5
-
-
82055163044
-
Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection
-
Dec.
-
X. Li, B. Ying, T. Zeng, "Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection," IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524-3533, Dec. 2011.
-
(2011)
IEEE Trans. Image Process.
, vol.20
, Issue.12
, pp. 3524-3533
-
-
Li, X.1
Ying, B.2
Zeng, T.3
-
6
-
-
57849168054
-
Difference expansion based reversible data hiding using two embedding directions
-
Dec.
-
Y. Hu, H. K. Lee, K. Chen, J. Li, "Difference expansion based reversible data hiding using two embedding directions," IEEE Trans. Multimedia, vol. 10, no. 8, pp. 1500-1511, Dec. 2008.
-
(2008)
IEEE Trans. Multimedia
, vol.10
, Issue.8
, pp. 1500-1511
-
-
Hu, Y.1
Lee, H.K.2
Chen, K.3
Li, J.4
-
7
-
-
84885637866
-
Pairwise predictionerror expansion for efficient reversible data hiding
-
Dec.
-
B. Ou, X. Li, Y. Zhao, R. Ni, Y.-Q. Shi, "Pairwise predictionerror expansion for efficient reversible data hiding," IEEE Trans. Image Process., vol. 22, no. 12, pp. 5010-5021, Dec. 2013.
-
(2013)
IEEE Trans. Image Process.
, vol.22
, Issue.12
, pp. 5010-5021
-
-
Ou, B.1
Li, X.2
Zhao, Y.3
Ni, R.4
Shi, Y.-Q.5
-
8
-
-
67649552769
-
Reversible data hiding based on histogram modification of pixel differences
-
Jun.
-
W. L. Tai, C. M. Yeh, C. C. Chang, "Reversible data hiding based on histogram modification of pixel differences," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp. 906-910, Jun. 2009.
-
(2009)
IEEE Trans. Circuits Syst. Video Technol.
, vol.19
, Issue.6
, pp. 906-910
-
-
Tai, W.L.1
Yeh, C.M.2
Chang, C.C.3
-
9
-
-
49449101106
-
Multilevel reversible data hiding based on histogram modification of difference images
-
Dec.
-
C. C. Lin, W. L. Tai, C. C. Chang, "Multilevel reversible data hiding based on histogram modification of difference images," Pattern Recognit., vol. 41, no. 12, pp. 3582-3591, Dec. 2008.
-
(2008)
Pattern Recognit.
, vol.41
, Issue.12
, pp. 3582-3591
-
-
Lin, C.C.1
Tai, W.L.2
Chang, C.C.3
-
10
-
-
60749112009
-
Reversible image hiding scheme using predictive coding and histogram shifting
-
Jun.
-
P. Tsai, Y. C. Hu, H. L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Process., vol. 89, no. 6, pp. 1129-1143, Jun. 2009.
-
(2009)
Signal Process.
, vol.89
, Issue.6
, pp. 1129-1143
-
-
Tsai, P.1
Hu, Y.C.2
Yeh, H.L.3
-
11
-
-
84871342023
-
Improving histogram-based reversible information hiding by an optimal weightbased prediction scheme
-
Jan.
-
S. L. Lin, C. F. Huang, M. H. Liou, C. Y. Chen, "Improving histogram-based reversible information hiding by an optimal weightbased prediction scheme," J. Inf. Hiding Multimedia Signal Process., vol. 4, no. 1, pp. 19-33, Jan. 2013.
-
(2013)
J. Inf. Hiding Multimedia Signal Process.
, vol.4
, Issue.1
, pp. 19-33
-
-
Lin, S.L.1
Huang, C.F.2
Liou, M.H.3
Chen, C.Y.4
-
12
-
-
70349501741
-
Parity-invariabilitybased reversible watermarking
-
Sep.
-
S. W. Weng, Y. Zhao, R. R. Ni, J. S. Pan, "Parity-invariabilitybased reversible watermarking," Electron. Lett., vol. 45, no. 20, pp. 1022-1023, Sep. 2009.
-
(2009)
Electron. Lett.
, vol.45
, Issue.20
, pp. 1022-1023
-
-
Weng, S.W.1
Zhao, Y.2
Ni, R.R.3
Pan, J.S.4
-
13
-
-
67650157209
-
Reversible watermarking based on invariability and adjustment on pixel pairs
-
Dec.
-
S. Weng, Y. Zhao, J. S. Pan, R. Ni, "Reversible watermarking based on invariability and adjustment on pixel pairs," IEEE Signal Process. Lett., vol. 15, no. 20, pp. 721-724, Dec. 2008.
-
(2008)
IEEE Signal Process. Lett.
, vol.15
, Issue.20
, pp. 721-724
-
-
Weng, S.1
Zhao, Y.2
Pan, J.S.3
Ni, R.4
-
14
-
-
84879977620
-
Reversible data hiding scheme based on dual stegano-images using orientation combinations
-
C. F. Lee and Y. L. Huang, "Reversible data hiding scheme based on dual stegano-images using orientation combinations," J. Telecommun. Syst., vol. 52, no. 4, pp. 2237-2247, 2013.
-
(2013)
J. Telecommun. Syst.
, vol.52
, Issue.4
, pp. 2237-2247
-
-
Lee, C.F.1
Huang, Y.L.2
-
15
-
-
84896036003
-
(k, n)-image reversible data hiding
-
Apr.
-
G. Horng, Y. H. Huang, C. C. Chang, Y. Liu, "(k, n)-image reversible data hiding," J. Inf. Hiding Multimedia Signal Process., vol. 5, no. 2, pp. 152-164, Apr. 2014.
-
(2014)
J. Inf. Hiding Multimedia Signal Process.
, vol.5
, Issue.2
, pp. 152-164
-
-
Horng, G.1
Huang, Y.H.2
Chang, C.C.3
Liu, Y.4
-
16
-
-
77956684084
-
An analysis of random projection for changeable and privacy-preserving biometric verification
-
Oct.
-
Y. Wang and K. N. Plataniotis, "An analysis of random projection for changeable and privacy-preserving biometric verification," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 40, no. 5, pp. 1280-1293, Oct. 2010.
-
(2010)
IEEE Trans. Syst., Man, Cybern. B, Cybern.
, vol.40
, Issue.5
, pp. 1280-1293
-
-
Wang, Y.1
Plataniotis, K.N.2
-
17
-
-
84893621796
-
Framework based on privacy policy hiding for preventing unauthorized face image processing
-
Manchester, U.K., Oct.
-
A. Dabrowski, E. R. Weippl, I. Echizen, "Framework based on privacy policy hiding for preventing unauthorized face image processing," in Proc. IEEE Int. Conf. Syst. Man Cybern. (SMC), Manchester, U.K., Oct. 2013, pp. 455-461.
-
(2013)
Proc IEEE Int. Conf. Syst. Man Cybern. (SMC)
, pp. 455-461
-
-
Dabrowski, A.1
Weippl, E.R.2
Echizen, I.3
-
18
-
-
31744433507
-
Genetic algorithm based methodology for breaking the steganalytic systems
-
Feb.
-
Y. T. Wu and F. Y. Shih, "Genetic algorithm based methodology for breaking the steganalytic systems," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 36, no. 1, pp. 24-31, Feb. 2006.
-
(2006)
IEEE Trans. Syst., Man, Cybern. B, Cybern.
, vol.36
, Issue.1
, pp. 24-31
-
-
Wu, Y.T.1
Shih, F.Y.2
-
19
-
-
77951206069
-
Geometric distortion insensitive image watermarking in affine covariant regions
-
May
-
X. Gao, C. Deng, X. Li, D. Tao, "Geometric distortion insensitive image watermarking in affine covariant regions," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 40, no. 3, pp. 278-286, May 2010.
-
(2010)
IEEE Trans. Syst., Man, Cybern. C, Appl. Rev.
, vol.40
, Issue.3
, pp. 278-286
-
-
Gao, X.1
Deng, C.2
Li, X.3
Tao, D.4
-
20
-
-
0038321303
-
Image subband coding using fuzzy inference and adaptive quantization
-
Jun.
-
M. S. Hsieh and D. C. Tseng, "Image subband coding using fuzzy inference and adaptive quantization," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 33, no. 3, pp. 509-513, Jun. 2003.
-
(2003)
IEEE Trans. Syst., Man, Cybern. B, Cybern.
, vol.33
, Issue.3
, pp. 509-513
-
-
Hsieh, M.S.1
Tseng, D.C.2
-
21
-
-
34250017964
-
Commutative encryption and watermarking in video compression
-
Jun.
-
S. Lian, Z. Liu, Z. Ren, H. Wang, "Commutative encryption and watermarking in video compression," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774-778, Jun. 2007.
-
(2007)
IEEE Trans. Circuits Syst. Video Technol.
, vol.17
, Issue.6
, pp. 774-778
-
-
Lian, S.1
Liu, Z.2
Ren, Z.3
Wang, H.4
-
22
-
-
78651086488
-
A commutative digital image watermarking and encryption method in the tree structured Haar transform domain
-
Jan.
-
M. Cancellaro et al., "A commutative digital image watermarking and encryption method in the tree structured Haar transform domain," Signal Process. Image Commun., vol. 26, no. 1, pp. 1-12, Jan. 2011.
-
(2011)
Signal Process. Image Commun.
, vol.26
, Issue.1
, pp. 1-12
-
-
Cancellaro, M.1
-
23
-
-
79952179059
-
Reversible data hiding in encrypted image
-
Apr.
-
X. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011.
-
(2011)
IEEE Signal Process. Lett.
, vol.18
, Issue.4
, pp. 255-258
-
-
Zhang, X.1
-
24
-
-
84863169800
-
An improved reversible data hiding in encrypted images using side match
-
Apr.
-
W. Hong, T. S. Chen, H. Wu, "An improved reversible data hiding in encrypted images using side match," IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199-202, Apr. 2012.
-
(2012)
IEEE Signal Process. Lett.
, vol.19
, Issue.4
, pp. 199-202
-
-
Hong, W.1
Chen, T.S.2
Wu, H.3
-
25
-
-
84863379693
-
Separable reversible data hiding in encrypted image
-
Apr.
-
X. Zhang, "Separable reversible data hiding in encrypted image," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826-832, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 826-832
-
-
Zhang, X.1
-
26
-
-
84891293531
-
Efficient reversible data hiding in encrypted images
-
Feb.
-
X. Zhang, Z. Qian, G. Feng, Y. Ren, "Efficient reversible data hiding in encrypted images," J. Vis. Commun. Image Represent., vol. 25, no. 2, pp. 322-328, Feb. 2014.
-
(2014)
J. Vis. Commun. Image Represent.
, vol.25
, Issue.2
, pp. 322-328
-
-
Zhang, X.1
Qian, Z.2
Feng, G.3
Ren, Y.4
-
27
-
-
84899996558
-
Separable and error-free reversible data hiding in encrypted image with high payload
-
Mar. 2014
-
Z. Yin, B. Luo, W. Hong, "Separable and error-free reversible data hiding in encrypted image with high payload," Sci. World J., vol. 2014, Mar. 2014, Art. ID 604876.
-
(2014)
Sci. World J.
-
-
Yin, Z.1
Luo, B.2
Hong, W.3
-
28
-
-
84880868167
-
Reversibility improved data hiding in encrypted images
-
Jan.
-
W. Zhang, K. Ma, N. Yu, "Reversibility improved data hiding in encrypted images," Signal Process., vol. 94, pp. 118-127, Jan. 2014.
-
(2014)
Signal Process.
, vol.94
, pp. 118-127
-
-
Zhang, W.1
Ma, K.2
Yu, N.3
-
29
-
-
84875018020
-
Reversible data hiding in encrypted images by reserving room before encryption
-
Mar.
-
K. Ma, W. Zhang, X. Zhao, N. Yu, F. Li, "Reversible data hiding in encrypted images by reserving room before encryption," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553-562, Mar. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.3
, pp. 553-562
-
-
Ma, K.1
Zhang, W.2
Zhao, X.3
Yu, N.4
Li, F.5
-
30
-
-
22244452348
-
Fast block-based image restoration employing the improved best neighborhood matching approach
-
Jul.
-
W. Li, D. Zhang, Z. Liu, X. Qiao, "Fast block-based image restoration employing the improved best neighborhood matching approach," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 35, no. 4, pp. 546-555, Jul. 2005.
-
(2005)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.35
, Issue.4
, pp. 546-555
-
-
Li, W.1
Zhang, D.2
Liu, Z.3
Qiao, X.4
-
31
-
-
4744354027
-
On compressing encrypted data
-
Oct.
-
M. Johnson, P. Ishwar, V. Prabhakaran, D. Schonberg, K. Ramchandran, "On compressing encrypted data," IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992-3006, Oct. 2004.
-
(2004)
IEEE Trans. Signal Process.
, vol.52
, Issue.10
, pp. 2992-3006
-
-
Johnson, M.1
Ishwar, P.2
Prabhakaran, V.3
Schonberg, D.4
Ramchandran, K.5
-
32
-
-
77949668515
-
Efficient compression of encrypted grayscale images
-
Apr.
-
W. Liu, W. Zeng, L. Dong, Q. Yao, "Efficient compression of encrypted grayscale images," IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097-1102, Apr. 2010.
-
(2010)
IEEE Trans. Image Process.
, vol.19
, Issue.4
, pp. 1097-1102
-
-
Liu, W.1
Zeng, W.2
Dong, L.3
Yao, Q.4
-
33
-
-
33750383209
-
K-SVD: An algorithm for designing overcomplete dictionaries for sparse representation
-
Nov.
-
M. Aharon, M. Elad, A. Bruckstein, "K-SVD: An algorithm for designing overcomplete dictionaries for sparse representation," IEEE Trans. Signal Process., vol. 54, no. 11, pp. 4311-4322, Nov. 2006.
-
(2006)
IEEE Trans. Signal Process.
, vol.54
, Issue.11
, pp. 4311-4322
-
-
Aharon, M.1
Elad, M.2
Bruckstein, A.3
-
34
-
-
84897584301
-
Analysis K-SVD: A dictionarylearning algorithm for the analysis sparse model
-
Feb.
-
R. Rubinstein, T. Peleg, M. Elad, "Analysis K-SVD: A dictionarylearning algorithm for the analysis sparse model," IEEE Trans. Signal Process., vol. 61, no. 3, pp. 661-677, Feb. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.3
, pp. 661-677
-
-
Rubinstein, R.1
Peleg, T.2
Elad, M.3
-
35
-
-
0042631515
-
Overview of the H.264/AVC video coding standard
-
Jul.
-
T. Wiegand, G. Sullivan, G. Bjontegaard, A. Luthra, "Overview of the H.264/AVC video coding standard," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 7, pp. 560-576, Jul. 2003.
-
(2003)
IEEE Trans. Circuits Syst. Video Technol.
, vol.13
, Issue.7
, pp. 560-576
-
-
Wiegand, T.1
Sullivan, G.2
Bjontegaard, G.3
Luthra, A.4
-
36
-
-
20744456892
-
Video compression-From concepts to the H.264/AVC standard
-
Jan.
-
G. Sullivan and T. Wiegand, "Video compression-From concepts to the H.264/AVC standard," Proc. IEEE, vol. 93, no. 1, pp. 18-31, Jan. 2005.
-
(2005)
Proc IEEE
, vol.93
, Issue.1
, pp. 18-31
-
-
Sullivan, G.1
Wiegand, T.2
-
37
-
-
77249169798
-
Reversible image watermarking using interpolation technique
-
Mar.
-
L. Luo, Z. Chen, M. Chen, X. Zeng, Z. Xiong, "Reversible image watermarking using interpolation technique," IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187-193, Mar. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.1
, pp. 187-193
-
-
Luo, L.1
Chen, Z.2
Chen, M.3
Zeng, X.4
Xiong, Z.5
-
38
-
-
0003902428
-
-
Upper Saddle River, NJ, USA: Prentice-Hall
-
W. Stallings, Cryptography and Network Security: Principles and Practice, 3rd ed. Upper Saddle River, NJ, USA: Prentice-Hall, 2003.
-
(2003)
Cryptography, Network Security: Principles and Practice, 3rd Ed
-
-
Stallings, W.1
-
39
-
-
80053005547
-
Break our steganographic system': The ins and outs of organizing BOSS
-
Czech Republic, May
-
P. Bas, T. Filler, T. Pevny, "'Break our steganographic system': The ins and outs of organizing BOSS," in Proc. 13th Int. Conf. Inf. Hiding Conf., Prague, Czech Republic, May 2011, pp. 59-70.
-
(2011)
Proc. 13th Int. Conf. Inf. Hiding Conf., Prague
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevny, T.3
-
40
-
-
77951298115
-
The PASCAL visual object classes (VOC) challenge
-
Jun.
-
M. Everingham, L. Van Gool, C. K. I. Williams, J. Winn, A. Zisserman, "The PASCAL visual object classes (VOC) challenge," Int. J. Comput. Vis., vol. 88, no. 2, pp. 303-338, Jun. 2010.
-
(2010)
Int. J. Comput. Vis.
, vol.88
, Issue.2
, pp. 303-338
-
-
Everingham, M.1
Van Gool, L.2
Williams, C.K.I.3
Winn, J.4
Zisserman, A.5
-
41
-
-
56749104169
-
Hamming embedding and weak geometric consistency for large scale image search
-
(ECCV), Marseille, France, Oct.
-
H. Jegou, M. Douze, C. Schmid, "Hamming embedding and weak geometric consistency for large scale image search," in Proc. 10th Eur. Conf. Comput. Vis. I (ECCV), Marseille, France, Oct. 2008, pp. 304-317.
-
(2008)
Proc. 10th Eur. Conf. Comput. Vis.
, vol.1
, pp. 304-317
-
-
Jegou, H.1
Douze, M.2
Schmid, C.3
-
42
-
-
42649102287
-
Compression of facial images using the K-SVD algorithm
-
May
-
O. Bryt and M. Elad, "Compression of facial images using the K-SVD algorithm," J. Vis. Commun. Image Represent., vol. 19, no. 4, pp. 270-282, May 2008.
-
(2008)
J. Vis. Commun. Image Represent.
, vol.19
, Issue.4
, pp. 270-282
-
-
Bryt, O.1
Elad, M.2
|