References
- Chang CC and Hsieh YP. A chaotic mapbased adaptive variable-size LSB method with pixel-value differencing and modulus function. Imaging Sci. J., 2010, 58, 49–60.
- Hong W, Chen TS and Shiu CW. Reversible data hiding for high quality images using modification of prediction errors. J. Syst. Software, 2009, 82, 1833–1842.
- Jain AK and Uludag U. Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell., 2003, 25, 1494–1498.
- Lee S, Yoo CD and Kalker T. Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. Forens. Secur., 2007, 2, 321–330.
- Lin PL, Hsieh CK and Huang PW. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn., 2005, 38, 2519–2529.
- Mielikainen J. LSB matching revisited. IEEE Signal Process. Lett., 2006, 13, 285–287.
- Ni Z, Shi YQ, Ansari N and Su W. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol., 2006, 16, 354–362.
- Pan CL, Hong W, Chen TS, Chen J and Shiu CW. Multilevel reversible data hiding using modification of prediction errors. Int. J. Innov. Comput. Inf. Control, 2011, 7, 5107–5118.
- Provos N and Honeyman P. Hide and seek: an introduction to steganography. IEEE Secur. Privacy Mag., 2003, 1, 32–44.
- Shen JJ and Wang CC. A robust information hiding scheme for tampered cover images. Imaging Sci. J., 2014, 62, 395–401.
- Zhang X and Wang S. Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett., 2006, 10, 781–783.
- Zhang X and Wang S. Steganography combining data decomposition mechanism and stego-coding method. Informatica, 2009, 33, 41–48.