[1]
LIN C-C, TAI W-L, CHANG C-C. Multilevel reversible data hiding based on histogram modification of difference images[J]. Pattern Recognition, 2008,41(12):3582-3591.
[2]
AWRANGJEB M. An overview of reversible data hiding[C]// International Conference on Computer and Information Technology. Bangladesh: IEEE, 2003: 75-79.
[3]
CELIK M U, SHARMA G, TEKALP A M, et al. Reversible data hiding[C]// Proceedings of the IEEE International Conference on Image Processing. New York:IEEE,2002:157-1600.
[4]
De VLEESCHOUWER C, DELAIGLE J E, MACQ B. Circular interpretation of bijective transformation in lossless watermarking for media asset management[J]. IEEE Transactions on Multimedia, 2003,5(1):97-105.
[5]
YANG QUNTING, GAO TIEGANG, LI FAN. Reversible robust data hiding scheme based on histogram shifting in multi-wavelet domain[J]. International Journal of Advancements in Computing Technology,2011,3(5):185-193.
[6]
COLTUC D. Low distortion transform for reversible watermarking[J].IEEE Transactions on Image Processing,2011,99(7):1057-7149.
[7]
PENG FEI, LEI YU-ZHOU, LONG MIN, et al. A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion[J].Computer-Aided Design,2011,43(8):1018-1024.
[8]
MEMONAB N A, KHANC A, GILANID S A M, et al.Reversible watermarking method based on adaptive thresholding and companding technique[J].International Journal of Computer Mathematics,2011,88(8):1573-1594.
[9]
THAMPI S M, JACOB A J. Securing biometric images using reversible watermarking[J].International Journal of Image Processing,2011,5(4):382-389.
[10]
LUO LI-XIN, CHEN ZHEN-YONG, CHEN MING, et al.Reversible image watermarking using interpolation technique[J]. IEEE Transactions on Information Forensics and Security, 2010,5(1):187-193.
[11]
NI ZHI-CHENG, SHI YUN-QING, NIRWAN A, et al. Reversible data hiding[J]. IEEE Transactions on Circuits and System for Video Technology, 2006, 16(3): 354-362.
[12]
顾巧论, 高铁杠. 基于直方图修改的图像可逆信息隐藏算法[J]. 计算机工程与设计, 2008, 29(15): 4082-4085.
[13]
LEE S K, SUH Y H, HO Y S. Public key watermarking for reversible image authentication[C]// International Conference on Image Processing. Atlanta: IEEE IPS, 2006:1409-1412.
[14]
李晓航,王宏霞,张文芳.认证理论及应用[M].北京:清华大学出版社,2009:25-29.
[15]
谭文,王耀南.混沌系统的模糊神经网络控制理论与方法[M].北京:科学出版社,2008:6-8. |