REFERENCES
- [1] Alattar, A. M., “Reversible Watermark Using Difference Expansion Ofquads,” IEEE Int’l Conf. on Acoustics, Speech and Signal Processing, Vol. 3, pp. 377 380 (2004). doi: 10.1109/ICASSP.2004.1326560
- [2] Alattar, A. M., “Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform,” IEEE Trans. Image Process., Vol. 13, No. 8, pp. 11471156 (2004). doi: 10.1109/TIP.2004.828418
- [3] Thodi, D. M. and Rodriguez, J. J., “Expansion Embedding Techniques for Reversible Watermarking,” IEEE Trans. Image Process., Vol. 16, No.3, pp. 721730 (2007). doi: 10.1109/TIP.2006.891046
- [4] Tian, J., “Reversible Data Embedding Using a Difference Expansion,” IEEE Trans. Circuits Syst, Video Technol., Vol. 13, No. 8, pp. 890896 (2003). doi: 10. 1109/TCSVT.2003.815962
- [5] Coltuc, D. and Chassery, J. M., “Very Fast Watermarking by Reversible Contrast Mapping,” IEEE Signal Process. Lett., Vol. 14, No. 4, pp. 255258 (2007). doi: 10.1109/LSP.2006.884895
- [6] Kim, H. J., Sachnev, V., Shi, Y. Q., Nam, J. and Choo, H. G., “A Novel Difference Expansion Transform for Reversible Data Embedding,” IEEE Trans. Information Forensics and Security, Vol. 3, No. 3, pp. 456465 (2008). doi: 10.1109/TIFS.2008.924600
- [7] Ni, Z., Shi, Y. Q., Ansari, N. and Su, W., “Reversible Data Hiding,” IEEE Trans. Circuits Syst, Video Technol., Vol. 16, No. 3, pp. 354362 (2006). doi: 10.1109/ TCSVT.2006.869964
- [8] Ni, Z., Shi, Y. Q., Ansari, N. and Su, W., “Reversible Data Hiding,” IEEE Proceedings of ISCAS’03, Vol. 2, pp. II-912915 (2003). doi: 10.1109/ISCAS.2003.1206 123
- [9] Fallahpour, M. and Sedaaghi, M. H., “High Capacity Lossless Data Hiding Based on Histogram Modification,” IEICE Electron. Exp., Vol. 4, No. 7, pp. 205 210 (2007). doi: 10.1587/elex.4.205
- [10] Lee, S. K., Suh, Y. H. and Ho, Y. S., “Reversible Image Authentication Based on Watermarking,” Proc. IEEE Int. Conf. Multimedia Expo, Toronto, on Canada, pp. 13211324 (2006). doi: 10.1109/ICME.2006.262782
- [11] Tai, W. L., Yeh, C. M. and Chang, C. C., Reversible Data Hiding Based on Histogram Modification of Pixel Differences, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 19, No. 6, pp. 906 910 (2009). doi: 10.1109/TCSVT.2009.2017409
- [12] Zhao, Z. F., Luo, H., Lu, Z. M. and Pan, J. S., “Reversible Data Hiding Based on Multilevel Histogram Modification and Sequential Recovery,” International Journal of Electronics and Communications (AEU), In Press, Corrected Proof, March (2011). doi: 10.1016/j. aeue.2011.01.014
- [13] Zhang, X. P., “Reversible Data Hiding with Optimal Value Transfer,” IEEE Transactions on Multimedia, Vol. 15, No. 2, pp. 316326 (2013). doi: 10.1109/TMM. 2012.2229262
- [14] Qian, Z. X., Zhang, X. P. and Wang, S. Z., “Reversible Data Hiding in Encrypted JPEG Bitstream,” IEEE Transactions on Multimedia, Vol. 16, No. 5, pp. 1486 1491 (2014). doi: 10.1109/TMM.2014.2316154
- [15] Hu, X. C., Zhang, W. M., Li, X. L. and Yu, N. H., “Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding,” IEEE Transactions on Information Forensics and Security, Vol. 10, No. 3, pp. 653664 (2015). doi: 10.1109/TIFS.2015. 2392556