Computer Science ›› 2018, Vol. 45 ›› Issue (8): 151-155.doi: 10.11896/j.issn.1002-137X.2018.08.027
• Information Security • Previous Articles Next Articles
LIU Yu, YANG Bai-long, ZHAO Wen-qiang, YUAN Zhi-hua
CLC Number:
[1]TIAN J.Reversible data embedding using a difference expansion [J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896. [2]CHANG Z,KOU W,XU J.More compressible location map for reversible watermarking using expansion embedding[J].Electronics Letters,2007,43(24):1353-1354. [3]XIANG H Y,HOU S Z.Information Hiding Optimization Algorithm Based on Difference Location Map Adjustment[J].Computer Engineering,2016,42(3):249-253.(in Chinese)项洪印,侯思祖.基于差值位置图调整的信息隐藏优化算法[J].计算机工程,2016,42(3):249-253. [4]NI Z,SHI Y Q,ANSARI N,et al.Reversible data hiding[J]. IEEE Transactions on Circuits and Systems for Video Technology,2006,16(3):354-362. [5]WANG X,LI K,FU K Y,et al.Histogram shifting based adaptive reversible watermarking algorithm with a high capacity[J].Journal of XiDian University,2014,41(1):124-129.(in Chinese)王祥,李可,付凯元,等.直方图平移的自适应大容量可逆水印算法[J].西安电子科技大学学报(自然科学版),2014,41(1):124-129. [6]THODI D M,RODRÍGUEZ J J.Expansion embedding tech-niques for reversible watermarking[J].IEEE Transactions on Image Processing,2007,16(3):721-730. [7]THODI D M,RODRIGUEZ J J.Prediction-error based reversible watermarking[C]∥International Conference on Image Processing.IEEE,2004:1549-1552. [8]QU X,KIM H J.Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding[J].Signal Processing,2015,111(C):249-260. [9]KUMAR M,AGRAWAL S.Reversible data hiding based onprediction error expansion using adjacent pixels[J].Security & Communication Networks,2016,9(16):3703-3712. [10]AN L,GAO X,LI X,et al.Robust reversible watermarking via clustering and enhanced pixel-wise masking[J].IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society,2012,21(8):3598-3611. [11]AN L,GAO X,YUAN Y,et al.Content-adaptive reliable robust lossless data embedding[J].Neurocomputing,2012,79(3):1-11. [12]ZHANG X.Reversible Data Hiding in Encrypted Image[J].Signal Processing Letters IEEE,2012,18(4):255-258. [13]HONG W,CHEN T S,WU H Y.An improved rev-ersible data hiding in encrypted images using side match[J].IEEE Signal Processing Letters,2012,19(4):199-202. [14]ZHANG X.Separable Reversible Data Hiding in Encrypted Ima-ge[J].IEEE Transactions on Information Forensics & Security,2012,7(2):826-832. [15]MA K,ZHANG W,ZHAO X,et al.Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption[J].IEEE Transactions on Information Forensics & Security,2013,8(3):553-562. [16]AGRAWAL S,KUMAR M.Mean value based reversible data hiding in encrypted images[J].Optik-International Journal for Light and Electron Optics,2016,130(16):922-934. [17]FISHER Y.Fractal image compression.Theory and application[M].New York:Springer,1995:1042-1045. [18]ZHAO Y J,DI L Z.An Adaptive Watermarking Scheme Based on Quadtree-Split in the Wavelet Domain[J].Microelectronics &Computer,2005,22(12):122-125.(in Chinese)赵友军,邸兰振.一种基于四又树分割的小波域自适应水印方案[J].微电子学与计算机,2005,22(12):122-125. [19]NIE D C,ZHENG H Y.A Fractal Information Hiding Algorithm Based on Quad-Tree Partition[J].Computer Applications and Software,2015(2):307-310.(in Chinese)聂道聪,郑洪源.一种使用四叉树分割的分形信息隐藏算法[J].计算机应用与软件,2015(2):307-310. [20]ZHANG X,FENG G,REN Y,et al.Scalable Coding of Encryp-ted Images[J].IEEE Transactions on Image Processing,2012,21(6):3108-3114. |
[1] | HAO Jie, PING Ping, FU De-yin, ZHAO Hong-ze. Bi-histogram Shifting Reversible Data Hiding Method After Compressed Differences [J]. Computer Science, 2022, 49(9): 340-346. |
[2] | MA Bin, HOU Jin-cheng, WANG Chun-peng, LI Jian, SHI Yun-qing. High Capacity Reversible Data Hiding Algorithm for Audio Files Based on Code Division Multiplexing [J]. Computer Science, 2021, 48(9): 298-305. |
[3] | WANG Yin-di, ZHANG Zhe-qing, YAN Li. Indexing Bi-temporal RDF Model [J]. Computer Science, 2021, 48(4): 63-69. |
[4] | ZHANG Zhen-zhen ,WANG Jian-lin. Dictionary Learning Image Denoising Algorithm Combining Second Generation Bandelet Transform Block [J]. Computer Science, 2018, 45(7): 264-270. |
[5] | WANG Zhen-wu, LV Xiao-hua and HAN Xiao-hui. Survey of Terrain LOD Technology Based on Quadtree Segmentation [J]. Computer Science, 2018, 45(4): 34-45. |
[6] | XIANG Yu-dong and WU Gui-xing. Pixel Prediction Based Reversible Data Hiding Scheme for Image [J]. Computer Science, 2018, 45(2): 189-196. |
[7] | YU Xin-yi, ZHAN Yi-an, ZHU Feng, OU Lin-lin. Improved ORB Feature Extraction Algorithm Based on Quadtree Encoding [J]. Computer Science, 2018, 45(11A): 222-225. |
[8] | ZHANG Si-si, LIU Yu and ZHAO Zhi-bin. Fractal Image Retrieval Algorithm Based on Contiguous-matches [J]. Computer Science, 2015, 42(12): 292-296. |
[9] | LUO Jian-gao and HAN Guo-qiang. Reversible Data Hiding Based on Full Context Prediction [J]. Computer Science, 2013, 40(Z11): 219-223. |
[10] | . Layered Near-lossless Compression Scheme of Hyper-spectral Image in Airborne Remote Sensing System [J]. Computer Science, 2012, 39(7): 293-296. |
[11] | . Reversible Data Hiding Based on Reference Pixel of Block [J]. Computer Science, 2012, 39(2): 47-51. |
[12] | . Content-based Reversible Steganographic Method for Multimodal Biometrics [J]. Computer Science, 2012, 39(11): 70-74. |
[13] | FANG Shao-bong,ZHENG Yun-ping,CHEN Chuan-bo. Binary Image Representation Method Using Improved TNAM [J]. Computer Science, 2010, 37(4): 261-. |
[14] | . [J]. Computer Science, 2008, 35(8): 213-217. |
[15] | . [J]. Computer Science, 2008, 35(11): 220-224. |
|