13
Views
5
CrossRef citations to date
0
Altmetric
Articles

An adaptive reversible information hiding method based on search-order coding for VQ-compressed images

Pages 37-45 | Published online: 18 Jul 2013

REFERENCES

  • Pennebaker, W. B. and Mitchell, J. L. JPEG: still image compression standard. Comput. Stand. Interf., 1993, 15, (4), 365–366.
  • Rao, K. R. and Huh, Y. JPEG 2000, Proc. 2001 Int. Symp. on Intelligent multimedia, video and speech processing, Hong Kong, China, May 2001, IEEE Hong Kong Chapter of Signal Processing and the Centre for Multimedia Signal Processing of the Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, pp. 20–23.
  • Linde, Y., Buzo, A. and Grey, R. M. An algorithm for vector quantizer design. IEEE Trans. Commun., 1980, 28, (1), 84–95.
  • Artz, D. Digital steganography: hiding data within data. IEEE Internet Comput., 2001, 5, (3), 75–80.
  • Derrick, G. Data watermarking: steganography and watermarking of digital data. Comput. Law Secur. Rep., 2001, 17, (2), 101–104.
  • Wang, S. J. Steganography of capacity required using modulo operator for embedding secret image. Math. Comput., 2005, 164, (1), 99–116.
  • Chang, C. C. and Wu, W. C. A steganographic method for hiding secret data using side match vector quantization. IEICE Trans. Inform. Syst., 2005, 88-D, 2159–2167.
  • Chang, C. C. and Tseng, H. W. A steganographic method for digital images using side match. Patt. Recogn. Lett., 2004, 25, (12), 1431–1437.
  • Jo, M. and Kim, H. D. A digital image watermarking scheme based on vector quantisation. ICICE Trans. Inform. Syst., 2002, E85-D, 1054–1056.
  • Chang, C. C., Tai, W. L. and Lin, M. H. Information hiding based on search-order coding for VQ indices. Patt. Recogn. Lett., 2004, 25, (11), 1253–1261.
  • Chang, C. C., Tai, W. L. and Lin, M. H. A reversible data hiding scheme with modified side match vector quantization, Proc. 19th Int. Cong. on Advanced information networking and applications, Taipei, Taiwan, March 2005, IEEE, Vol. 1, 947–952.
  • Chang, C. C. and Lu, T. C. Reversible index-domain information hiding scheme based on side-match vector quantization. J. Syst. Software, 2006, 79, (8), 1120–1129.
  • Chang, C. C., Tai, W. L. and Lin, C. C. A reversible data hiding scheme based on side match vector quantization. IEEE Trans. Circ. Syst. Video Technol., 2006, 16, (10), 1301–1308.
  • Chang, C. C. and Lin, C. Y. Reversible steganographic method using SMVQ approach based on declustering. Inform. Sci., 2007, 177, (8), 1796–1805.
  • Chang, C. C. and Lin, C. Y. Reversible steganography for VQ-compressed images using side matching and relocation. IEEE Trans. Inform. Forens. Secur., 2006, 1, (4), 493–501.
  • Chang, C. C., Hsieh, Y. P. and Lin, C. Y. Lossless data embedding with high embedding capacity based on declustering for VQ-compressed codes. IEEE Trans. Inform. Forens. Secur., 2007, 2, (3), 341–349.
  • Chang, C. C., Wu, W. C. and Hu, Y. C. Lossless recovery of a VQ index table with embedded secret data. J. Visual Commun. Image Represent., 2007, 18, (3), 207–216.
  • Hsieh, C. H. and Tsai, J. C. Lossless compression of VQ index with search-order coding. IEEE Trans. Image Process., 1996, 5, (11), 1579–1582.
  • Davis, R. M. The data encryption standard in perspective. IEEE Commun. Mag., 1978, 16, (6), 5–9.
  • Rivest, R. Shamir A. and Adleman L.: ‘A method for obtaining digital signatures and public-key cryptosystems’, Commun. ACM, 1978, 21, 120–126.
  • Linde, Y., Buzo, A. and Grey, R. M. An algorithm for vector quantizer design. IEEE Trans. Commun., 1980, 28, 84–95.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.