13
Views
1
CrossRef citations to date
0
Altmetric
Original Article

Reversible watermarking schemes based on expansion embedding using pixel partition strategies

&
Pages 112-124 | Accepted 29 Mar 2011, Published online: 12 Nov 2013

REFERENCES

  • Petitcolas FAP, Anderson RJ, Kuhn MG. Information hiding-a survey. Proc. IEEE, 1999, 87, 1062–1078.
  • Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T. Digital Watermarking and Steganography, 2007, 2nd edn (Morgan Kauffman, San Francisco, CA).
  • Bender W, Gruhl D, Morimoto N, Lu A. Techniques for data hiding. IBM Syst. J., 1996, 35, 313–336.
  • Mielikainen J. LSB matching revisited. IEEE Signal Process. Lett., 2006, 13, 285–287.
  • Lan TH, Tewfik AH. A novel high-capacity data-embedding system. IEEE Trans. Image Process., 2006, 15, 2431–2440.
  • Zhang XP, Wang SZ. Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett., 2006, 10, 1–3.
  • Zhou X, Yuan S, Li D, Hu J. A method for hiding information utilizing double-random phase-encoding technique. Opt. Laser Technol., 2007, 39, 1360–1363.
  • Wu YT, Frank YS. Digital watermarking based on chaotic map and reference register. Patt. Recogn., 2007, 40, 3753–3763.
  • Lee S, Yoo CD, Kalker T. Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. Forens. Secur., 2007, 2, 321–330.
  • Chang CC, Tai WL, Lin CC. A reversible data hiding scheme based on side match vector quantization. IEEE Trans. Circuits Syst. Video Technol., 2006, 16, 1301–1308.
  • Chang CC, Lin CY. Reversible steganography for VQ-compressed images using side matching and relocation. IEEE Trans. Inf. Forens. Secur., 2006, 1, 493–501.
  • Shi YQ, Ni Z, Zou D, Liang C, Xuan G. Lossless data hiding: Fundamentals, algorithms and applications. Proc. IEEE Int. Symp. on Circuits system: ISCAS 2004, Vancouver, BC, Canada, May 2004, IEEE, Vol. 2, pp. 33–36.
  • Barton JM. ‘Method and apparatus for embedding authentication information within digital data’, US Patent 5,646,997, 8July 1997.
  • Macq B. Lossless multiresolution transform for image authenticating watermarking, Proc. Xth European Signal Processing Conf.: EUSIPCO, Tampere, Finland, September 2000, EURASIP, pp. 533–536.
  • Honsinger CW, Jones PW, Rabbani M, Stoffel JC. ‘Lossless recovery of an original image containing embedded data’, US Patent 6,278,791, 21August 2001.
  • de Vleeschouwer C, Delaigle JF, Macq B. Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. Multimedia, 2003, 5, 97–105.
  • Fridrich J, Goljan M, Du R. Invertible authentication, Proc. SPIE, 2001, 4314, 197–208.
  • Tian J. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol., 2003, 13, 831–841.
  • Alattar AM. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process., 2004, 13, 1147–1156.
  • Celik MU, Sharma G, Tekalp AM, Saber E. Lossless generalized-LSB data embedding. IEEE Trans. Image Process., 2005, 14, 253–266.
  • Kamstra L, Heijmans HJAM. Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans. Image Process., 2005, 14, 2082–2090.
  • Ni Z, Shi Y, Ansari N, Su W. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol., 2006, 16, 354–362.
  • Thodi DM, Rodriguez JJ. Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process., 2007, 16, 721–730.
  • Thodi DM, Rodriguez JJ. Prediction-error-based reversible watermarking. Proc. IEEE Conf. on Image processing: ICIP 2004, Singapore, October 2004, IEEE, Vol. 3, pp. 1549–1552.
  • Weinberger MJ, Seroussi G, Sapiro G. The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS. IEEE Trans. Image Process., 2000, 9, 1309–1324.
  • Howard PG, Kossentini F, Martins B, Forchhammer S, Rucklidge WJ. The emerging JBIG2 standard. IEEE Trans. Circuits Syst. Video Technol., 1998, 8, 838–848.
  • Carpenter B. Compression via Arithmetic Coding [Online], 2002. Available at <http://www.colloquial.com/ArithmeticCoding/>
  • Patra JC, Phua JE, Bornand C. A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digital Signal Process., 2010, 20, 1597–1611.
  • Chan YK, Chen WT, Yu SS, Ho YA, Tsai CS, Chu YP. A HDWT-based reversible data hiding method. J. Syst. Software, 2009, 82, 411–421.
  • Lee CC, Wu HC, Tsai CS, Chu YP. Adaptive lossless steganographic scheme with centralized difference expansion. Patt. Recogn., 2008, 41, (6), 2097–2106.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.