[1]Shi Y. Reversible data hiding[C] Proc of IWDW 2004. Berlin: Springer, 2004:112[2]Coatrieux G, Guillou C, Cauvin J, et al. Reversible watermarking for knowledge digest embedding and reliability control in medical images[J]. IEEE Trans on Information Technology in Biomedicine, 2009, 13(2): 158165[3]Hwang K, Li D. Trusted cloud computing with secure resources and data coloring[J]. IEEE Internet Computing, 2010, 14(5): 1422[4]Chung K, Huang Y, Chang P, et al. Reversible data hidingbased approach for intraframe error concealment in H.264AVC[J]. IEEE Trans on Circuits and Systems for Video Technology, 2010, 20(11): 16431647[5]Barton J M. Method and apparatus for embedding authentication information within digital data[P]. US Patent 5, 646, 997, 1997[6]Ma K, Zhang W, Zhao X, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Trans on Information Forensics and Security, 2013, 8(3): 553562[7]Fridrich J, Goljan M, Du R. Invertible authentication[C] Proc of SPIE EI 2001. San Jose: SPIE, 2001: 197208[8]Fridrich J, Goljan M, Du R. Lossless data embedding—New paradigm in digital watermarking[J]. EURASIP Journal on Advances in Signal Processing, 2002, 2002(2): 185196[9]Xuan G, Zhu J, Chen J, et al. Distortionless data hiding based on integer wavelet transform[J]. Electronics Letters, 2002, 38(25): 16461648[10]Celik M, Sharma G, Tekalp A, et al. Lossless generalizedLSB data embedding[J]. IEEE Trans on Image Processing, 2005, 14(2): 253266[11]Celik M, Sharma G, Tekalp A. Lossless watermarking for image authentication: A new framework and an implementation[J]. IEEE Trans on Image Processing, 2006, 15(4): 10421049[12]Tian J. Reversible data embedding using a difference expansion[J]. IEEE Trans on Circuits and Systems for Video Technology, 2003, 13(8): 890896[13]Alattar A. Reversible watermark using the difference expansion of a generalized integer transform[J]. IEEE Trans on Image Processing, 2004, 13(8): 11471156[14]Coltuc D, Chassery J. Very fast watermarking by reversible contrast mapping[J]. IEEE Signal Processing Letters, 2007, 14(4): 255258[15]Weng S, Zhao Y, Pan J, et al. Reversible watermarking based on invariability and adjustment on pixel pairs[J]. IEEE Signal Processing Letters, 2008, 15: 721724[16]Wang X, Li X, Yang B, et al. Efficient generalized integer transform for reversible watermarking[J]. IEEE Signal Processing Letters, 2010, 17(6): 567570[17]Peng F, Li X, Yang B. Adaptive reversible data hiding scheme based on integer transform[J]. Signal Processing, 2012, 92(1): 5462[18]Coltuc D. Low distortion transform for reversible watermarking[J]. IEEE Trans on Image Processing, 2012, 21(1): 412417[19]Ni Z, Shi Y, Ansari N, et al. Reversible data hiding[J]. IEEE Trans on Circuits and Systems for Video Technology, 2006, 16(3): 354362[20]Lee S, Suh Y, Ho Y. Reversible image authentication based on watermarking[C] Proc of IEEE ICME 2006. Piscataway, NJ: IEEE, 2006: 13211324[21]Thodi D, Rodriguez J. Expansion embedding techniques for reversible watermarking[J]. IEEE Trans on Image Processing, 2007, 16(3): 721730[22]Xuan G, Shi Y Q, Chai P, et al. Optimum histogram pair based image lossless data embedding[C] Proc of IWDW 2007. Berlin: Springer, 2007: 264278[23]Hu Y, Lee H, Li J. DEbased reversible data hiding with improved overflow location map[J]. IEEE Trans on Circuits and Systems for Video Technology, 2009, 19(2): 250260[24]Hong W, Chen T, Shiu C. Reversible data hiding for high quality images using modification of prediction errors[J]. Journal of Systems and Software, 2009, 82(11): 18331842[25]Sachnev V, Kim H, Nam J, et al. Reversible watermarking algorithm using sorting and prediction[J]. IEEE Trans on Circuits and Systems for Video Technology, 2009, 19(7): 989999[26]Hwang H, Kim H, Sachnev V, et al. Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting[J]. KSII Trans on Internet and Information Systems, 2010, 4(4): 655670[27]Luo L, Chen Z, Chen M, et al. Reversible image watermarking using interpolation technique[J]. IEEE Trans on Information Forensics and Security, 2010, 5(1): 187193[28]Lin S J, Chung W H. The scalar scheme for reversible informationembedding in grayscale signals: Capacity evaluation and code constructions[J]. IEEE Trans on Information Forensics and Security, 2011, 7(4):11551167[29]Gao X, An L, Yuan Y, et al. Lossless data embedding using generalized statistical quantity histogram[J]. IEEE Trans on Circuits and Systems for Video Technology, 2011, 21(8): 10611070[30]Li X, Yang B, Zeng T. Efficient reversible watermarking based on adaptive predictionerror expansion and pixel selection[J]. IEEE Trans on Image Processing, 2011, 20(12): 35243533[31]Xuan G, Tong X, Teng J, et al. Optimal histogrampair and predictionerror based image reversible data hiding[C] Proc of IWDW 2012. Berlin: Springer, 2012: 368383[32]Qin C, Chang C, Huang Y, et al. An inpainting assisted reversible steganographic scheme using a histogram shifting mechanism[J]. IEEE Trans on Circuits and Systems for Video Technology, 2013, 23(7): 11091118[33]Zhang X. Reversible data hiding with optimal value transfer[J]. IEEE Trans on Multimedia, 2013, 15(2): 316325[34]Li X, Li B, Yang B, et al. General framework to histogramshiftingbased reversible data hiding[J]. IEEE Trans on Image Processing, 2013, 22(6): 21812191[35]Coatrieux G, Pan W, CuppensBoulahia N, et al. Reversible watermarking based on invariant image classification and dynamical error histogram shifting[J]. IEEE Trans on Information Forensics and Security, 2013, 8(1): 111120[36]Li X, Li J, Li B, et al. Highfidelity reversible data hiding scheme based on pixelvalueordering and predictionerror expansion[J]. Signal Processing, 2013, 93(1): 198205[37]Li X, Zhang W, Gui X, et al. A novel reversible data hiding scheme based on twodimensional difference histogram modification[J]. IEEE Trans on Information Forensics and Security, 2013, 8(7): 10911100[38]Ou B, Li X, Zhao Y, et al. Pairwise predictionerror expansion for efficient reversible data hiding[J]. IEEE Trans on Image Processing, 2013, 22(12): 50105021[39]Zhang W, Hu X, Li X, et al. Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression[J]. IEEE Trans on Image Processing, 2013, 22(7): 27752785[40]Dragoi I, Coltuc D. Localpredictionbased difference expansion reversible watermarking[J]. IEEE Trans on Image Processing, 2014, 23(4): 17791790[41]Dragoi I, Coltuc D. On local prediction based reversible watermarking[J]. IEEE Trans on Image Processing, 2015, 24(4): 12441246[42]Caciula I, Coltuc D. Improved control for low bitrate reversible watermarking[C] Proc of IEEE ICASSP 2014. Piscataway, NJ: IEEE, 2014: 74257429[43]Li X, Zhang W, Gui X, et al. Efficient reversible data hiding based on multiple histograms modification[J]. IEEE Trans on Information Forensics and Security, 2015, 10(9): 20162027[44]Wang J, Ni J, Zhang X, et al. Rate and distortion optimization for reversible data hiding using multiple histogram shifting[JOL]. IEEE Trans on Cybernetics, 2016 [20160320]. http:ieeexplore,ieee.orgxplarticle Details.jsp?armumber=[45]Kamstra L, Heijmans H. Reversible data embedding into images using wavelet techniques and sorting[J]. IEEE Trans on Image Processing, 2005, 14(12): 20822090 |