- J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.
- Z. Ni, Y. Q. Shi, N. Ansari, and S.Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362,Mar. 2006.
- G.Xuan,Y.Q.Shi,C.Y.Yang,Y. Z. Zheng, D. K.Zou, and P. Q. Chai, “Lossless data hiding using integer wavelet transform and thresholdembedding technique,” in Proc. Int. Conf.Multimedia and Expo, 2005, pp. 1520–1523.
- D.M. Thodi and J. J. Rodriquez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16,no. 3, pp. 721–730, Mar. 2007.
- Y. Hu, H.-K. Lee, and J. Li, “DE-based reversible data hiding with improved overflow location map,” IEEE Trans. Circuits Syst. VideoTechnol., vol. 19, no. 2, pp. 250–260, Feb. 2009.
- G. Coatrieux, C. Le Guillou, J.-M. Cauvin, and C. Roux, “Reversible watermarking for knowledge digest embedding and reliabilitycontrol in medical images,” IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 2, pp. 158–165, Mar. 2009.
- F. Bao, R. H. Deng,B.C.Ooi, andY. Yang, “Tailored reversible watermarking schemes for authentication of electronic clinical atlas,”IEEE Trans. Inf. Technol. Biomed., vol. 9, no. 4, pp. 554–563, Dec. 2005.
- H. M. Chao, C. M. Hsu, and S. G. Miaou, “A data-hidding technique with authentication, integration, and confidentiality for electronicpatient records,” IEEE Trans. Inf. Technol. Biomed., vol. 6, no. 1, pp. 46–53, Mar. 2002.
- L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, “Reversible image watermarking using interpolation technique,” IEEE Trans. Inf.Forensics Security, vol. 5, no. 1, pp. 187–193, Mar. 2010.
- D. Coltuc, “Improved embedding for prediction-based reversible watermarking,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp.873–882, Sep. 2011.
- C. C. Lin, W. L. Tai, and C. C. Chang, “Multilevel reversible data hiding based on histogram modification of difference images,” PatternRecognit., vol. 41, pp. 3582–3591, 2008.
- C. H.YangandM.H. Tsai, “Improving histogram-based reversible data hiding by interleaving predictions,” IET Image Process., vol. 4, no.4, pp. 223–234, Aug. 2010.
- C. De Vleeschouwer, J.-F. Delaigle, and B. Macq, “Circular interpretation of bijective transformations in lossless watermarking for mediaasset management,” IEEE Trans.Multimedia, vol. 5, no. 1, pp. 97–105, Mar. 2003.
- D. Coltuc and J.-M. Chassery, “Distortion-free robust watermarking: A case study,” in Proc. Security, Steganography, and Watermarkingof Multimedia Contents IX, San Jose, CA, 2007, p. 65051N-8.
- V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.-Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans.Circuit Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul. 2009.
- H. J. Hwang, H. J. Kim, V. Sachnev, and S. H. Joo, “Reversible watermarking method using optimal histogram pair shifting based onprediction and sorting,” KSII, Trans. Internet Inform. Syst., vol. 4, no. 4, pp. 655–670, Aug. 2010.
|