54
Views
2
CrossRef citations to date
0
Altmetric
Articles

A New Lossless Embedding Techniques Based on HDWT

, &

REFERENCES

  • L. C. Huang, L. Y. Tseng, and M. S. Hwang, “The study of data hiding in medical image,” Int. J. Netw. Security, vol. 14(5), pp. 243–251, Sept. 2012.
  • B. Surekha and G. N. Swamy, “Sensitive digital image watermarking for copyright protection," Int. J. Netw. Security,” vol. 15(2), pp. 113–121, Mar. 2013.
  • C. C. Wu, S. J. Kao, and M. S. Hwang, “A high quality image sharing with steganography and adaptive authentication scheme,” J. Syst. Softw., vol. 84, pp. 2196–2207, Dec. 2011.
  • S. Weng, J. S. Pan, and X. Gao, "Reversible watermark combining pre-processing operation and histogram shifting", J. Inform. Hiding Multimedia Signal. Process., vol. 3(4), pp. 320–326, Oct. 2012.
  • C. C. Chang, C. Y. Lin, and Y. P. Hsieh, “Data hiding for vector quantization images using mixed-base notation and dissimilar patterns without loss of fidelity,” Inform. Sci., vol. 201, pp. 70–79, Oct. 2012.
  • L. C. Huang, L. Y. Tseng, and M. S. Hwang, “A reversible data hiding method by histogram shifting in high quality medical images,” J. Syst. Softw., vol. 86(3), pp. 716–727, Mar. 2013.
  • L. C. Huang, M. S. Hwang, and L. Y. Tseng, “Reversible and high-capacity data hiding in high quality medical images,” KSII Transact. Internet Inform. Syst., vol. 7(1), pp. 132–148, Jan. 2013.
  • X. T. Wang, C. C. Chang, T. S. Nguyen, M. C. Li, “Reversible data hiding for high quality images exploiting interpolation and direction order mechanism,” Digit. Signal. Process., vol. 23(2), pp. 569–577, Mar. 2013.
  • S. S. Sujatha and M. M. Sathik, “A novel DWT based blind watermarking for image authentication,” Int. J. Netw. Security, vol. 14(4), pp. 223–228, Jul. 2012.
  • C. Guo, C. C. Chang, and C. Qin, “A hierarchical threshold secret image sharing,” Pattern Recogn. Lett., vol. 33(1), pp. 83–91, Jan. 2012.
  • C. C. Chang, T. S. Nguyen, C. C. Lin, “A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies,” J. Syst. Softw., vol. 86(2), pp. 389–402, Feb. 2013.
  • C. C. Chang, Y. H. Huang, H. Y. Tsai, and C. Qin, “Prediction-based reversible data hiding using the difference of neighboring pixels,” Int. J. Electron. Commun., vol. 66(9), pp. 758–766, Sept. 2012.
  • S. L. Lin, C. F. Huang, M. H. Liou, and C. Y. Chen, “Improving histogram-based reversible information hiding by an optimal weight-based prediction scheme,” J. Inform. Hiding Multimedia Signal. Process., vol. 4(1), pp. 19–33, Jan. 2013.
  • D. C. Lou, M. C. Hu, and J. L. Liu, “Multiple layer data hiding scheme for medical images,” Comput. Standards Interfaces, vol. 31(2), pp. 329–335, Feb. 2009.
  • M. Fallahpour, D. Megias, and M. Ghanbari, “Reversible and high-capacity data hiding in medical images,” IET Image Process., vol. 5(2), pp. 190–197, Jun. 2011.
  • C. Y. Weng, S. J. Wang, J. Liu, and D. Goyal, “Prediction-based reversible data hiding using empirical histograms in images,” KSII Transact. Internet Inform. Syst., vol. 6(4), pp. 1248–1266, Apr. 2012.
  • C. C. Lin, “High capacity data hiding scheme for DCT-based images,” J. Inform. Hiding Multimedia Signal. Process., vol. 1(3), pp. 220–240, Jul. 2010.
  • Z. M. Lu., J. X. Wang, and B. B. Liu, “An improved lossless data hiding scheme based on image VQ-index residual value coding,” J. Syst. Softw., vol. 82(6), pp. 1016–1024, Jun. 2009.
  • K. Wang, Y. Hu, and Z. M. Lu, “Reversible data hiding for block truncation coding compressed images based on prediction-error expansion,” in 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Piraeus, Jul. 18–20, 2012, pp. 317–320.
  • C. C. Chen and C. C. Chang, “High-Capacity reversible data hiding for LZW codes,” Proc. Comput. Model. Simulat., vol. 1, pp. 3—8, Jan. 2010.
  • L. C. Huang and M. S. Hwang, “Two-party authenticated multiple-key agreement based on elliptic curve discrete logarithm problem,” Int. J. Smart Home, vol. 7(1), pp. 9–18, Jan. 2013.
  • S. M. C. Vigila and K. Muneeswaran, “Nonce based elliptic curve cryptosystem for text and image applications,” Int. J. Netw. Security, vol. 14(4), pp. 236–242, Jul. 2012.
  • L. Y. Tseng and L. C. Huang, “Automatic fissure detection in CT images based on the genetic algorithm,” Proc. Mach. Learn. Cybernetics, vol. 5, pp. 2583–2588, Jul. 2010.
  • L. Y. Tseng and L. C. Huang, “An adaptive thresholding method for automatic lung segmentation in CT images,” in IEEE AFRICON, Nairobi, Sept. 23–25, 2009, pp. 1–5.
  • T. Shanableh, “Data hiding in MPEG video files using multivariate regression and flexible macroblock ordering,” IEEE Transact. Inform. Forensics Security, vol. 7(2), pp. 455–464, Apr. 2012.
  • C. C. Chang, P.Y. Pai, C. M. Yeh, and Y. K. Chan, “A high payload frequency-based reversible image hiding method,” Inform. Sci., vol. 180(11), pp. 2286–2298, Jun. 2010.
  • C. Y. Yang, C. H. Lin, and W. C. Hu, “Reversible data hiding for high-quality images based on integer wavelet transform,” J. Inform. Hiding Multimedia Signal. Process., vol. 3(2), pp. 142–150, Apr. 2012.
  • National Cancer Institute, “National Biomedical Imaging Archive (NBIA),”. May 2016. Available: https://imaging.nci.nih.gov/.
  • H. Luo, F. X. Yu, H. Chen, Z. L. Huang, H. Li, and P. H. Wang, “Reversible data hiding based on block median preservation,” Inform. Sci., vol. 181, pp. 308–328, Jan. 2011.
  • C. C. Chang, Y. H. Huang, H. Y. Tsai, and C. Qin, “Prediction-based reversible data hiding using the difference of neighboring pixels,” Int. J. Electron. Commun., vol. 66, pp. 758–766, Sept. 2012.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.