JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2018, Vol. 53 ›› Issue (1): 46-52.doi: 10.6040/j.issn.1671-9352.2.2017.377
Previous Articles Next Articles
SUN Ze-rui1, WANG Ji-jun2, LI Guo-xiang1, XIA Guo-en1
CLC Number:
[1] BENDER W R, GRUHL D, MORIMOTO N. Techniques for data hiding [C] //IS&T/SPIE's Symposium on Electronic Imaging: Science & Technology. [S.l.] :International Society for Optics and Photonics, 1995:313-336. [2] FRIDRICH J, GOLJAN M, DU R. Lossless data embedding——new paradigm in digital watermarking [J]. Eurasip Journal on Applied Signal Processing, 2002, 2002(2): 185-196. [3] FRIDRICH A J, GOLJAN M, DU R. Lossless data embedding for all image formats [J]. Proceedings of SPIE-The International Society for Optical Engineering, 2002, 4675:572-583. [4] CELIK M U, SHARMA G, TEKALP A M, et al. Lossless generalized-LSB data embedding [J]. IEEE Trans Image Process, 2005, 14(2): 253-266. [5] TIAN J. Reversible data embedding using a difference expansion [J]. IEEE Transactions on Circuits & Systems for Video Technology, 2003, 13(8):890-896. [6] ALATTAR A M. Reversible watermark using the difference expansion of a generalized integer transform [J]. IEEE Transactions on Image Processing, 2004, 13(8):1147-1156. [7] TSENG H W, CHANG C C. An extended difference expansion algorithm for reversible watermarking [J]. Image and Vision Computing, 2008, 26(8), 1148-1153. [8] LEE C C, WU H C, TSAI C S, et al. Adaptive lossless steganographic scheme with centralized difference expansion [J]. Pattern Recognition, 2008, 41(6):2097-2106. [9] LIU Y C, WU H C, YU S S. Adaptive DE-based reversible steganographic technique using bilinear interpolation and simplified location map [J]. Multimedia Tools & Applications, 2011, 52(2-3):263-276. [10] NI Z, SHI Y Q, ANSARI N, et al. Reversible data hiding [J]. IEEE Transactions on Circuits & Systems for Video Technology, 2006, 16(3):354-362. [11] FALLAHPOUR M, SEDAAGHI M H. High capacity lossless data hiding based on histogram modification [J]. Ieice Electronics Express, 2007, 4(7):205-210. [12] CHANG C C, TAI W L, CHEN K N. Lossless data hiding based on histogram modification for image authentication [C] //International Conference on Embedded and Ubiquitous Computing. [S.l.] :IEEE Computer Society, 2008:506-511. [13] TAI W L, YEH C M, CHANG C C. Reversible data hiding based on histogram modification of pixel differences [J]. IEEE Transactions on Circuits & Systems for Video Technology, 2009, 19(6):906-910. [14] 王继军. 图像插值空间大容量可逆数字水印算法[J]. 中国图象图形学报, 2014, 19(4):527-533. WANG Jijun. High capacity reversible watermarking for image interpolation space [J]. Journal of Image and Graphics, 2014, 19(4):527-533. [15] 熊祥光. 基于图像插值的大容量可逆水印算法[J]. 光电子·激光, 2016(6):646-654. XIONG Xiangguang. High capacity reversible watermarking algorithm based on image interpolation [J]. Journal of Optoelectronics·Laser, 2016, 27(6):646-654. [16] JUNG K H, YOO K Y. Data hiding method using image interpolation [J]. Computer Standards & Interfaces, 2009, 31(2):465-470. [17] LEE C F, HUANG Y L. An efficient image interpolation increasing payload in reversible data hiding [J]. Expert Systems with Applications, 2011, 38(7):6712-6719. [18] HONG W, CHEN T S. Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism [J]. Journal of Visual Communication & Image Representation, 2011, 22(2):131-140. [19] ZHANG X Q, SUN Z R, TANG Z J, et al. High capacity data hiding based on interpolated image[J]. Multimedia Tools & Applications, 2016:1-24. [20] USC-SIPI Image Database [EB/OL]. [2017-05-21]. http://sipi.usc.edu/database/. [21] LEE C F, HUANG Y L. An efficient image interpolation increasing payload in reversible data hiding[J]. Expert Systems with Applications, 2012, 39(8):6712-6719. |
[1] | QIAO Hu-sheng, ZHAO Ting-ting. On products of S-acts [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(4): 16-19. |
[2] | DING Yi-tao, YANG Hai-bin, YANG Xiao-yuan, ZHOU Tan-ping. A reversible image data hiding scheme in Homomorphic encrypted domain [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 104-110. |
[3] | . Reversible data hiding in encrypted image based on an integer transform [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 76-83. |
[4] | CHEN Quan1,2, XIANG Shi-jun2*. Reversible fragile watermarking for authentication based on integer DCT and expansion embedding [J]. J4, 2012, 47(11): 24-30. |
[5] | DONG Jun, WEI Jie. A note on α-reversible rings [J]. J4, 2010, 45(4): 54-59. |
[6] | DONG Jun, WEI Jie. On a generalization of α-reversible rings [J]. J4, 2009, 44(8): 62-67. |
|