[1] |
KALKER T , WILLEMS F M J . Capacity bounds and constructions for reversible data hiding[A]. Proceedings of the 14th International Confer-ence on Digital Signal Processing[C]. Santorini,Greece, 2002.71-76.
|
[2] |
ZHANG W , CHEN B , YU N . Capacity bounds and constructions for reversible data hiding[A]. Proc of the Information Hiding[C]. Springer Berlin Heidelberg, 2011.255-269.
|
[3] |
ZHANG W , CHEN B , YU N . Improving various reversible data hiding schemes via optimal codes for binary covers[J]. IEEE Transactions on Image Processing, 2012,21(6): 2991-3003.
|
[4] |
FRIDRICH J , GOLJAN M , DU R . Lossless data embedding for all image formats[A]. Proc of the Electronic Imaging,International Soci-ety for Optics and Photonics[C]. Santorini,Greece, 2002.572-583.
|
[5] |
TIAN J . Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003,13(8): 890-896.
|
[6] |
NI Z , SHI Y Q , ANSARI N , et al. Reversible data hiding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006,16(3): 354-362.
|
[7] |
LI X , YANG B , ZENG T . Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection[J]. IEEE Transactions on Image Processing, 2011,20(12): 3524-3533.
|
[8] |
TSAI P , HU Y C , YEH H L . Reversible image hiding scheme using predictive coding and histogram shifting[J]. Signal Processing, 2009,89(6): 1129-1143.
|
[9] |
LUO L , CHEN Z , CHEN M , et al. Reversible image watermarking using interpolation technique[J]. IEEE Transactions on Information Forensics and Security, 2010,5(1): 187-193.
|
[10] |
MENEZES A J , VAN OORSCHOT P C , VANSTONE S A . Handbook of Applied Cryptography[M]. Boca Raton,FL,USA:CRC, 1996.
|
[11] |
HWANG K , LI D . Trusted cloud computing with secure resources and data coloring[J]. Internet Computing,IEEE, 2010,14(5): 14-22.
|
[12] |
ZHANG X , LI D . Reversible data hiding in encrypted image[J]. Signal Processing Letters,IEEE, 2011,18(4): 255-258.
|
[13] |
HONG W , CHEN T S , WU H Y . An improved reversible data hiding in encrypted images using side match[J]. Signal Processing Letters,IEEE, 2012,19(4): 199-202.
|
[14] |
ZHANG X . Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2012,7(2): 826-832.
|
[15] |
JOHNSON M , ISHWAR P , PRABHAKARAN V , et al. On compress-ing encrypted data[J]. IEEE Transactions on Signal Processing, 2004,52(10): 2992-3006.
|
[16] |
LIU W , ZENG W , DONG L , et al. Efficient compression of encrypted grayscale images[J]. IEEE Transactions on Image Processing, 2010,19(4): 1097-1102.
|
[17] |
MA K , ZHANG W , ZHAO X . IEEE Transactions on Information Forensics and Security[J]. IEEE Transactions on Image Processing, 2013,8(3): 553-562.
|
[18] |
NRCS Photo Gallery[EB/OL]. . 2011.
|
[19] |
LUO W , HUANG J , QIU G . JPEG error analysis and its applications to digital image forensics[J]. IEEE Transactions on Information Foren-sics and Security, 2010,5(3): 480-491.
|
[20] |
LAM E Y , GOODMAN J W . A mathematical analysis of the DCT coefficient distributions for images[J]. IEEE Transactions on Image Processing, 2000,9(10): 1661-1666.
|
[21] |
FRIDRICH J , GOLJAN M , SOUKAL D . Perturbed quantization steganography[J]. Multimedia Systems, 2005,11(2): 98-107.
|
[22] |
Miscelaneous gray level images[EB/OL]. .
|