-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathwmbib.bib
executable file
·1430 lines (1319 loc) · 48.8 KB
/
wmbib.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
% This file was created with JabRef 2.3.1.
% Encoding: UTF-8
@INPROCEEDINGS{Ni08ih,
author = {Jiangqun Ni and Rongyue Zhang and Chen Fang and Jiwu Huang and Chuntao
Wang and Hyoung-Joong Kim},
title = {Watermarking Security Incorporating Natural Scene Statistics.},
booktitle = {Information Hiding},
year = {2008},
editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow},
volume = {5284},
series = {Lecture Notes in Computer Science},
pages = {132-146},
publisher = {Springer},
crossref = {conf/ih/2008},
date = {2008-10-22},
ee = {http://dx.doi.org/10.1007/978-3-540-88961-8_10},
file = {:/media/Documents/Research/watermark/paper/Watermarking Security Incorporating
Natural Scene Statistics.pdf:PDF},
interhash = {d2e78e92bd52ad602b4ebda8d264c319},
intrahash = {558b872d7fab5a26be2d8fdfc483bda7},
isbn = {978-3-540-88960-1},
url = {http://dblp.uni-trier.de/db/conf/ih/ih2008.html#NiZFHWK08}
}
@ARTICLE{Akaike1974,
author = {Akaike, H.},
title = {A new look at the statistical model identification},
journal = {IEEE Transactions on Automatic Control},
year = {1974},
volume = {19},
pages = {716--723},
number = {6},
issn = {0018-9286},
keywords = {Parameter identification, Time series, maximum-likelihood (ML) estimation},
owner = {chm},
timestamp = {2009.04.12}
}
@INPROCEEDINGS{Alattar03dequad,
author = {A. M. Alattar},
title = {Reversible watermark using difference expansion of quads},
booktitle = {ICASSP 2003},
year = {2004},
volume = {3},
pages = {377--380},
address = {Montreal, Canada}
}
@ARTICLE{Alattar04deip,
author = {A. M. Alattar},
title = {Reversible watermark using the difference expansion of a generalized
integer transform},
journal = {IEEE Trans. Image Processing},
year = {2004},
volume = {3},
pages = {1147--1156},
number = {8},
file = {:/media/Documents/Research/watermark/paper/200810/Reversible watermark
using the difference expansion of a generalized integer transform.pdf:PDF}
}
@INPROCEEDINGS{Alattar02detriplet,
author = {A. M. Alattar},
title = {Reversible watermark using difference expansion of triplets},
booktitle = {ICIP 2003},
year = {2003},
volume = {1},
pages = {501--504},
address = {Barcelona, Spain}
}
@MISC{Mul,
author = {Anonymity},
title = {Wikipeida: Multiplication algorithm},
howpublished = {\url{http://en.wikipedia.org/wiki/Multiplication_algorithm}},
month = {February},
year = {2009}
}
@ARTICLE{Barton97Patent,
author = {James M. Barton},
title = {Method and apparatus for embedding authentication information within
digital data},
journal = {U.S. Patent 5 646 997},
year = {1997}
}
@ARTICLE{Celik05generalizedlsb,
author = {M. U. Celik and G. Sharma and A. M. Tekalp and E. Saber},
title = {Lossless generalized-LSB data embedding},
journal = {IEEE Trans. Image Processing},
year = {2005},
volume = {14},
pages = {253--266},
number = {2}
}
@ARTICLE{Chang08pe,
author = {C.-C. Chang and C.-C. Lin and Y.-H. Chen},
title = {Reversible Data-Embedding Scheme Using Differences Between Original
and Predicted Pixel Values},
journal = {IET Info. Secur.},
year = {2008},
volume = {2},
pages = {35--46},
number = {2},
file = {:/media/Documents/Research/watermark/paper/200812/Reversible data-embedding
scheme using differences between original and predicted pixel values.pdf:PDF}
}
@ARTICLE{Chang06de,
author = {C.-C. Chang and T.-C. Lu},
title = {A difference expansion oriented data hiding scheme for restoring
the original host images},
journal = {Journal of Systems and Software},
year = {2006},
volume = {79},
pages = {1754--1766},
number = {12}
}
@ARTICLE{Chang07letter,
author = {Z. Chang and W. Kou and J. Xu},
title = {More compressible location map for reversible watermarking using
expansion embedding},
journal = {Electron. Lett.},
year = {2007},
volume = {43},
pages = {1353--1354},
file = {:/media/Documents/Research/watermark/paper/200811/More compressible
location map for reversible watermarking using expansion embedding.pdf:PDF}
}
@INPROCEEDINGS{Chang2008,
author = {Zhiguo Chang and Jian Xu and Weidong Kou},
title = {Reversible Watermarking Schemes Using Spatial Quad-Based Difference
Expansion},
booktitle = {Proc. International Conference on Convergence and Hybrid Information
Technology ICHIT '08},
year = {2008},
pages = {522--525},
month = {28--30 Aug. },
doi = {10.1109/ICHIT.2008.220},
owner = {chm},
timestamp = {2009.03.26}
}
@ARTICLE{Chen01qim,
author = {Brian Chen and Gregory W. Wornell},
title = {Quantization Index Modulation: A Class of Provably Good Methods for
Digital Watermarking and Information Embedding},
journal = {IEEE Trans. Information Theory},
year = {2001},
volume = {47},
pages = {1423--1443},
number = {4}
}
@INPROCEEDINGS{Chen2007,
author = {Chien-Chang Chen and De-Sheng Kao},
title = {DCT-Based Reversible Image Watermarking Approach},
booktitle = {Proc. Third International Conference on Intelligent Information Hiding
and Multimedia Signal Processing IIHMSP 2007},
year = {2007},
volume = {2},
pages = {489--492},
month = {26--28 Nov. },
doi = {10.1109/IIHMSP.2007.4457755},
owner = {chm},
timestamp = {2009.03.26}
}
@ARTICLE{Chen2008,
author = {Chen, C. C. and Kao, D. S.},
title = {Dct-Based Zero Replacement Reversible Image Watermarking Approach},
journal = {International Journal Of Innovative Computing Information And Control},
year = {2008},
volume = {4},
pages = {3027--3036},
number = {11},
abstract = {Reversible watermarking recovers an original image from a watermarked
image by extracting the embedded watermarks. This work presents a
reversible image watermarking approach that works on quantized DCT
coefficients, implying that the original quantized image can be recovered
perfectly after watermark extraction. The concept of zero replacement
reversible watermarking is presented. Two parameters adjustment rules,
ZRE and ZRX, are first proposed to embed and extract one bit to DCT
coefficients, respectively. Additionally, the CA rule is presented
to prevent confusion during embedding and extraction. Watermark embedding
and extracting algorithms based on these three rules are then proposed.
Experimental results indicate that the quality of watermarked image
is very good, and that the proposed approach can also identify maliciously
attacked regions efficiently. The proposed approach is also compared
with other watermarking methods, demonstrating that the proposed
approach works well. },
owner = {chm},
sn = {1349-4198},
tc = {0},
timestamp = {2009.05.13},
ut = {WOS:000260923100023}
}
@INPROCEEDINGS{Chen09add,
author = {Ming Chen and Zhenyong Chen and Xiao Zeng and Zhang Xiong},
title = {Reversible Data Hiding Using Additive Prediction-Error Expansion},
booktitle = {ACM Multimedia and Security 09},
year = {2009},
pages = {19--24},
address = {Princeton, New Jersey},
file = {:/media/Documents/Research/watermark/paper/Reversible Data Hiding Using
Additive Prediction-Error Expansion.pdf:PDF}
}
@INPROCEEDINGS{Chen09full,
author = {Ming Chen and Zhenyong Chen and Xiao Zeng and Zhang Xiong},
title = {Reversible Image Watermarking Based on Full Context Prediction},
booktitle = {ICIP 2009},
year = {2009},
pages = {4253--4256},
address = {Cairo, Egypt},
file = {:/media/Documents/Research/watermark/paper/Reversible Image Watermarking
Based on Full Context Prediction.pdf:PDF}
}
@ARTICLE{Chung08dyna,
author = {K.-L. Chung and Y.-H. Huang and W.-N. Yang and Y.-C. Hsu and C.-H.
Chen},
title = {Capacity maximization for reversible data hiding based on dynamic
programming approach},
journal = {Applied Mathematics and Computation},
year = {2009},
volume = {208},
pages = {284--292},
number = {1},
file = {:/media/Documents/Research/watermark/paper/200903/Capacity maximization
for reversible data hiding based on dynamic programming approach.pdf:PDF}
}
@INPROCEEDINGS{Coltuc2007a,
author = {Coltuc, D.},
title = {Improved Capacity Reversible Watermarking},
booktitle = {Proc. IEEE International Conference on Image Processing ICIP 2007},
pages = {249--252},
doi = {10.1109/ICIP.2007.4379293},
owner = {chm},
timestamp = {2009.03.26}
}
@BOOK{Cox06book,
title = {Digital Watermarking and Steganography, Second Edition},
publisher = {Morgan Kaufmann},
year = {2007},
author = {I. J. Cox and M. L. Miller and J. A. Bloom and J. Fridrich and Ton
Kalker}
}
@ARTICLE{Das92auto,
author = {M. Das and N. K. Loh},
title = {New Studies on Adaptive Predictive Coding of Images using Multiplicative
Autoregressive Models},
journal = {IEEE Trans. Image Processing},
year = {1992},
volume = {1},
pages = {106--111},
number = {1}
}
@INPROCEEDINGS{Endoh86hint,
author = {T. Endoh and Y. Yamakazi},
title = {Progressive coding scheme for multilevel images},
booktitle = {Picture Coding Symp., SPIE},
year = {1986},
address = {Tokyo, Japan}
}
@ARTICLE{Fallahpour2008,
author = {Fallahpour, M.},
title = {Reversible image data hiding based on gradient adjusted prediction},
journal = {Ieice Electronics Express},
year = {2008},
volume = {5},
pages = {870--876},
number = {20},
abstract = {The present study illustrates a new lossless data hiding method for
digital images using image prediction technique. In the proposed
method which is based on gradient-adjusted prediction (GAP), first
prediction errors are computed and then the error values are slightly
modified through shifting the prediction errors. The modified errors
are used for embedding the data. Experimental results of present
research have demonstrated that the proposed method called shifted
gradient-adjusted prediction error (SGAPE) is capable of hiding more
secret data with absolutely high PSNR.},
di = {10.1587/elex.5.870},
file = {:/media/Documents/Research/watermark/paper/200901/Reversible image
data hiding based on gradient adjusted prediction.pdf:PDF},
owner = {chm},
sn = {1349-2543},
tc = {0},
timestamp = {2009.05.13},
ut = {WOS:000263988400006}
}
@ARTICLE{Fallahpour07,
author = {M. Fallahpour and M. H. Sedaaghi},
title = {High capacity lossless data hiding based on histogram modification},
journal = {IEICE Electronics Express},
year = {2007},
volume = {4},
pages = {205--210},
number = {7}
}
@ARTICLE{Feder92universal,
author = {M. Feder and N. Merhav and M. Gutman},
title = {Universal prediction of individual sequences},
journal = {IEEE Trans. Information Theory},
year = {1992},
volume = {38},
pages = {1258--1270},
number = {5}
}
@ARTICLE{Feng06overview,
author = {J.-B. Feng and I. C. Lin and C.-S. Tsai and Y.-P. Chu},
title = {Reversible Watermarking: Current Status and Key Issues},
journal = {International Journal of Network Security},
year = {2006},
volume = {2},
pages = {161--170},
number = {3},
file = {:/media/Documents/Research/watermark/paper/200810/Reversible Watermarking_Current
Status and Key Issues.pdf:PDF}
}
@ARTICLE{Fridrich02lossless,
author = {J. Fridrich and M. Goljan and R. Du},
title = {Lossless data embedding - new paradigm in digital watermarking},
journal = {EURASIP Journal on Applied Signal Processing},
year = {2002},
volume = {2002},
pages = {185--196}
}
@INPROCEEDINGS{Fridrich02invertibleauth,
author = {J. Fridrich and M. Goljan and R. Du},
title = {Invertible authentication},
booktitle = {Security and watermarking of multimedia content},
year = {2001},
pages = {197--208}
}
@INPROCEEDINGS{Gao2007,
author = {Tie-Gang Gao and Qiao-Lun Gu},
title = {Reversible watermarking algorithm based on wavelet lifting scheme},
booktitle = {Proc. International Conference on Wavelet Analysis and Pattern Recognition
ICWAPR '07},
year = {2007},
volume = {4},
pages = {1771--1775},
month = {2--4 Nov. },
doi = {10.1109/ICWAPR.2007.4421740},
owner = {chm},
timestamp = {2009.03.26}
}
@INPROCEEDINGS{Goljan01ih,
author = {M. Goljan and J. J. Fridrich and R. Du},
title = {Distortion-Free Data Embedding for Images},
booktitle = {IH 2001, LNCS 2137},
year = {2001},
pages = {27--41},
address = {Pittsburgh, USA}
}
@BOOK{Gonzalez02dip,
title = {Digital Image Processing},
publisher = {Prentice-Hall},
year = {2002},
author = {R. C. Gonzalez and R. E. Woods},
pages = {415},
edition = {2}
}
@INPROCEEDINGS{Gu2008,
author = {Qiaolun Gu and Tiegang Gao},
title = {A new image authentication based on reversible watermarking algorithm},
booktitle = {Proc. 7th World Congress on Intelligent Control and Automation WCICA
2008},
year = {2008},
pages = {2727--2731},
month = {25--27 June },
doi = {10.1109/WCICA.2008.4593355},
owner = {chm},
timestamp = {2009.03.26}
}
@ARTICLE{Hong2008,
author = {Hong, W. and Chen, T. S. and Shiu, C. W.},
title = {Reversible Data Hiding Based on Histogram Shifting of Prediction
Errors},
journal = {2008 International Symposium On Intelligent Information Technology
Application Workshop: Iita 2008 Workshops, Proceedings},
year = {2008},
pages = {292--295},
abstract = {In this paper, a reversible data hiding scheme based on histogram-shifting
of prediction errors (HSPE) is proposed Two-stage structures, the
prediction stage and the error modification stage, are employed in
our scheme. In the prediction stage, value of each pixel is predicted,
and the error of the predicted value is obtained. In the error modification
stage, histogram-shifting technique is used to prepare vacant positions
for embedding data. The peak signal-to-noise ratio (PSNR) of the
stego image produced by HSPE is guaranteed to be above 48 dB, while
the embedding capacity is, in average, 4.74 times higher than that
of the well known Ni et al.'s technique with the same PSNR. Besides,
the stego image quality produced by HSPE gains 7.99 dB higher than
that of Ni et al.'s method under the same embedding capacity. Experimental
results indicate that the proposed data hiding scheme outperforms
the prior works not only in terms of larger payload, but also in
terms of stego image quality },
cl = {Shanghai, PEOPLES R CHINA},
ct = {2nd International Symposium on Intelligent Information TechnologyEOLEOLApplication},
cy = {DEC 21-22, 2008},
ed = {Luo, J},
owner = {chm},
tc = {0},
timestamp = {2009.05.13},
ut = {WOS:000263690400070}
}
@INPROCEEDINGS{Honsinger00,
author = {C. W. Honsinger},
title = {A robust data hiding techniques based on convolution with a randomized
phase carrier},
booktitle = {PICS'00},
year = {2000},
address = {Portland, USA}
}
@ARTICLE{Howard91mlp,
author = {P. Howard and J. Vitter},
title = {New Methods for Lossless Image Compression Using Arithmetic Coding},
journal = {Information processing \& management},
year = {1991},
volume = {28},
pages = {765--779},
number = {5}
}
@INPROCEEDINGS{Howard93felics,
author = {Paul G. Howard and Paul G. Howard and Jeffrey Scott Vitter and Jeffrey
Scott Vitter},
title = {Fast and efficient lossless image compression},
booktitle = {in Proc. 1993 Data Compression Conference, (Snowbird)},
year = {1993},
pages = {351--360}
}
@ARTICLE{Hsiao09block,
author = {J.-Y. Hsiao and K.-F. Chan and J. M. Chang},
title = {Block-based reversible data embedding},
journal = {Signal Processing},
year = {2009},
volume = {89},
pages = {556–569},
file = {:/media/Documents/Research/watermark/paper/200903/Block-based reversible
data embedding.pdf:PDF},
owner = {chm},
timestamp = {2009.03.26}
}
@ARTICLE{Hu2009,
author = {Yongjian Hu and Heung-Kyu Lee and Jianwei Li},
title = {\uppercase{DE}-Based Reversible Data Hiding With Improved Overflow
Location Map},
journal = {IEEE Trans. Circuits and Systems for Video Technology},
year = {2009},
volume = {19},
pages = {250--260},
number = {2},
month = {Feb. },
doi = {10.1109/TCSVT.2008.2009252},
file = {:/media/Documents/Research/watermark/paper/200903/DE-Based Reversible
Data Hiding With Improved Overflow Location Map.pdf:PDF},
owner = {chm},
timestamp = {2009.03.26}
}
@INPROCEEDINGS{Hu07iwdw,
author = {Y. Hu and H.-K. Lee and J. Li and K. Chen},
title = {Reversible Data Hiding Using Prediction Error Values Embedding},
booktitle = {IWDW 2007, LNCS 5041},
year = {2008},
pages = {244--253},
address = {Guangzhou, China}
}
@ARTICLE{Hu2008de,
author = {Hu, Y. J. and Lee, H. K. and Chen, K. Y. and Li, J. W.},
title = {Difference Expansion Based Reversible Data Hiding Using Two Embedding
Directions},
journal = {IEEE Transactions On Multimedia},
year = {2008},
volume = {10},
pages = {1500--1512},
number = {8},
abstract = {Current difference-expansion (DE) embedding techniques perform one
layer embedding in a difference image. They do not turn to the next
difference image for another layer embedding unless the current difference
image has no expandable differences left. The obvious disadvantage
of these techniques is that image quality may have been severely
degraded even before the later layer embedding begins because the
previous layer embedding has used up all expandable differences,
including those with large magnitude. Based on integer Haar wavelet
transform, we propose a new DE embedding algorithm, which utilizes
the horizontal as well as vertical difference images for data hiding.
We introduce a dynamical expandable difference search and selection
mechanism. This mechanism gives even chances to small differences
in two difference images and effectively avoids the situation that
the largest differences in the first difference image are used up
while there is almost no chance to embed in small differences of
the second difference image. We also present an improved histogram-based
difference selection and shifting scheme, which refines our algorithm
and makes it resilient to different types of images. Compared with
current algorithms, the proposed algorithm often has better embedding
capacity versus image quality performance. The advantage of our algorithm
is more obvious near the embedding rate of 0.5 bpp. },
di = {10.1109/TMM.2008.2007341},
owner = {chm},
sn = {1520-9210},
tc = {0},
timestamp = {2009.05.13},
ut = {WOS:000262163600007}
}
@ARTICLE{Hu2008,
author = {Hu, Y. J. and Lee, H. K. and Li, J. W. and Che, K. Y.},
title = {Reversible Data Hiding Using Prediction Error Values Embedding},
journal = {Digital Watermarking, Proceedings},
year = {2008},
volume = {5041},
pages = {244--253},
abstract = {In this paper, we propose a new embedding method for reversible data
hiding. Unlike traditional methods using difference-expansion or
feature modifications, we propose an even- and odd-number-based embedding
method. This method is implemented in a prediction error image. The
experimental results show that our embedding method can achieve satisfactory
embedding capacity and image quality. },
cl = {Sun Yat sen Univ, Guangzhou, PEOPLES R CHINA},
ct = {6th International Workshop on Digital Watermarking},
cy = {DEC 03-05, 2007},
ed = {Shi, YQEOLEOLKim, HJEOLEOLKatzenbeisser, S},
owner = {chm},
sn = {0302-9743},
tc = {0},
timestamp = {2009.05.13},
ut = {WOS:000263827600018}
}
@INPROCEEDINGS{Hwang06hist,
author = {JinHa Hwang and JongWeon Kim and JongUk Choi},
title = {Reversible Image Watermarking Based on Histogram Modification},
booktitle = {IWDW 2006, LNCS 4283},
year = {2006},
pages = {348--361},
address = {Jeju Island, Korea}
}
@ARTICLE{ic81review,
author = {A. K. Jain},
title = {Image Data Compression: A Review},
journal = {Proceedings of the IEEE},
year = {1981},
volume = {69},
pages = {349--389},
number = {3}
}
@ARTICLE{Jbig2enc,
author = {JBIG 2 encoder, jbig2enc},
title = {http://www.imperialviolet.org/jbig2.html}
}
@INPROCEEDINGS{Enhancedjpegls,
author = {J. Jiang and B. Guo and S. Y. Yang},
title = {Revisiting the \uppercase{JPEG-LS} prediction scheme},
booktitle = {Vision, Image and Signal Processing},
year = {2000},
pages = {575--580},
journal = {Vision, Image and Signal Processing}
}
@ARTICLE{Kamstra2005,
author = {Kamstra, L. and Heijmans, H.J.A.M.},
title = {Reversible data embedding into images using wavelet techniques and
sorting},
journal = {IEEE Transactions On Image Processing},
year = {2005},
volume = {14},
pages = {2082--2090},
number = {12},
doi = {10.1109/TIP.2005.859373},
file = {:/media/Documents/Research/watermark/paper/200810/Reversible data embedding
into images using wavelet techniques and sorting.pdf:PDF},
issn = {1057-7149},
keywords = {image coding, image reconstruction, sorting, watermarking, wavelet
transforms, Swelden lifting scheme, Tian technique, difference expansion,
digital content, digital images, image reconstruction, image watermarking,
least significant bit prediction, reversible data embedding, sorting,
wavelet techniques, Difference expansion, Haar wavelet, digital watermarking,
lifting scheme, reversible data embedding},
owner = {chm},
timestamp = {2009.06.23}
}
@INCOLLECTION{Diphandbook,
author = {Lina J. Karam},
title = {Lossless Coding},
booktitle = {Handbook of Image and Video Processing},
publisher = {Elsevier},
year = {2006},
editor = {Alan Bovik}
}
@ARTICLE{Kau05lsap,
author = {L.-J. Kau and Y.-P. Lin},
title = {Adaptive Lossless Image Coding Using Least Squares Optimization With
Edge-Look-Ahead},
journal = {IEEE Trans. Circuits and Systems},
year = {2005},
volume = {52},
pages = {751--755},
number = {11},
file = {:/media/Documents/Research/watermark/paper/200812/Adaptive Lossless
Image Coding Using Least Squares Optimization With Edge-Look-Ahead.pdf:PDF}
}
@ARTICLE{Kim08ifs,
author = {H.-J. Kim and Vasiliy Sachnev and Yun Qing Shi and Jeho Nam and Hyon-Gon
Choo},
title = {A Novel Difference Expansion Transform for Reversible Data Embedding},
journal = {IEEE Trans. Information Forensic and Security},
year = {2008},
volume = {3},
pages = {456--465},
number = {3},
file = {:/media/Documents/Research/watermark/paper/200903/A Novel Difference
Expansion Transform for Reversible Data Embedding.pdf:PDF},
owner = {chm},
timestamp = {2009.03.26}
}
@INPROCEEDINGS{Kim08hist,
author = {K.-S. Kim and M.-J. Lee and H.-K. Lee and Y.-H. Suh},
title = {Histogram-Based Reversible Data Hiding Technique Using Subsampling},
booktitle = {ACM Multimedia and Security 08},
year = {2008},
pages = {69--75},
address = {Oxford, UK},
file = {:/media/Documents/Research/watermark/paper/200812/Histogram-Based Reversible
Data Hiding Technique Using Subsampling.pdf:PDF}
}
@ARTICLE{Kuribayashi08,
author = {M. Kuribayashi and M. Morii and H. Tanaka},
title = {Reversible watermark with large capacity based on the prediction
error expansion},
journal = {IEICE Trans. Fundamentals},
year = {2008},
volume = {E91},
pages = {1780--1790},
number = {7},
file = {:/media/Documents/Research/watermark/paper/200903/Reversible Watermark
with Large Capacity Based on the Prediction Error Expansion2.pdf:PDF}
}
@INPROCEEDINGS{Kuribayashi05,
author = {M. Kuribayashi and M. Morii and H. Tanaka},
title = {Reversible watermark with large capacity using the predictive coding},
booktitle = {5th ICICS, LNCS 3783},
year = {2005},
pages = {441--453}
}
@ARTICLE{Lee08demedian,
author = {C.-C. Lee and H.-C. Wu and C.-S. T. and Y.-P. Chu},
title = {Adaptive lossless steganographic scheme with centralized difference
expansion},
journal = {Pattern Recognition},
year = {2008},
volume = {41},
pages = {2097--2106},
number = {6},
file = {:/media/Documents/Research/watermark/paper/200810/Adaptive lossless
steganographic scheme with centralized difference expansion.pdf:PDF}
}
@INPROCEEDINGS{Lee04hist,
author = {S.-K. Lee and Y.-H. Suh and Y.-S. Ho},
title = {Lossless Data Hiding Based on Histogram Modification of Difference
Images},
booktitle = {PCM 2004, LNCS 3333},
year = {2004},
pages = {340--347},
address = {Tokyo, Japan},
month = {November},
file = {:/media/Documents/Research/watermark/paper/200812/Lossless Data Hiding
Based on Histogram Modification of Difference Images.pdf:PDF}
}
@ARTICLE{Lee07wavelet,
author = {Sunil Lee and Chang D. Yoo and Ton Kalker},
title = {Reversible image watermarking based on integer-to-integer wavelet
transform},
journal = {IEEE Trans. Information Forensics and Security},
year = {2007},
volume = {2},
pages = {321--330},
number = {3}
}
@INPROCEEDINGS{Leest03icip,
author = {A. v. Leest and M. v. d. Veen and F. Bruekers},
title = {Reversible image watermarking},
booktitle = {ICIP 2003},
year = {2003},
volume = {2},
pages = {731--734},
address = {Barcelona, Spain}
}
@ARTICLE{Li01edp,
author = {X. Li and M. T. Orchard},
title = {Edge-Directed Prediction for Lossless Compression of Natural Images},
journal = {IEEE Trans. Image Processing},
year = {2001},
volume = {10},
pages = {813--817},
number = {6}
}
@ARTICLE{Li2009,
author = {Li, Z. and Chen, X. P. and Pan, X. Z. and Zeng, X. T.},
title = {Lossless Data Hiding Scheme Based on Adjacent Pixel Difference},
journal = {2009 International Conference On Computer Engineering And Technology,
Vol I, Proceedings},
year = {2009},
pages = {588--592},
abstract = {This paper proposes a lossless data hiding scheme with high embedding
capacity, which can recover the original image without any distortion
after the hidden data have been extracted. In this scheme, difference
value of the adjacent pixels is calculated first. After adjusting
the difference slightly, we can increase (decrease) it by I or maintain
it intact to embed information into the cover image. Experimental
results show that the average embedding capacity can be up to 0.91bpp
(bit per pixel) while the PSNR stays larger than 30dB. Compared with
some existing known lossless data hiding schemes, the proposed method
provides higher embedding capacity and lower image degradation. Moreover,
the presented algorithm is quite simple and the execution time is
rather short. },
cl = {Singapore, SINGAPORE},
ct = {International Conference on Computer Engineering and Technology},
cy = {JAN 22-24, 2009},
ed = {Zhou, JHEOLEOLZhou, XX},
file = {:/media/Documents/Research/watermark/paper/Lossless Data Hiding Scheme
Based on Adjacent Pixel Difference.pdf:PDF},
owner = {chm},
tc = {0},
timestamp = {2009.05.13},
ut = {WOS:000265085500120}
}
@ARTICLE{Lin08tp,
author = {Ching-Chiuan Lin and Nien-Lin Hsueh},
title = {A lossless data hiding scheme based on three-pixel block differences},
journal = {Pattern Recognition},
year = {2008},
volume = {41},
pages = {1415--1425},
number = {4},
file = {:/media/Documents/Research/watermark/paper/200809/A lossless data hiding
scheme based on three-pixel block differences.pdf:PDF}
}
@ARTICLE{Lin08multi,
author = {Chia-Chen Lin and Wei-Liang Tai and Chin-Chen Chang},
title = {Multilevel reversible data hiding based on histogram modification
of difference images},
journal = {Pattern Recognition},
year = {2008},
volume = {41},
pages = {3582--3591},
file = {:/media/Documents/Research/watermark/paper/200902/Multilevel reversible
data hiding based on histogram modification of difference images
.pdf:PDF},
owner = {chm},
timestamp = {2009.03.26}
}
@INPROCEEDINGS{Lin08,
author = {C. C. Lin and S. P. Yang and N. L. Hsueh},
title = {Lossless data hiding based on difference expansion without a location
map},
booktitle = {2008 Congress on Image and Signal Processing},
year = {2008},
pages = {8--12},
file = {:/media/Documents/Research/watermark/paper/200810/Lossless Data Hiding
Based on Difference Expansion without a Location Map.pdf:PDF}
}
@ARTICLE{Maragos84auto,
author = {P. Maragos and R. Schafer and R. Mersereau},
title = {Two-dimensional linear prediction and its application to adaptive
predictive coding of images},
journal = {IEEE Trans. Acoustics, Speech and Signal Processing},
year = {1984},
volume = {32},
pages = {1213--1229},
number = {6}
}
@INPROCEEDINGS{Marcinak05,
author = {M. P. Marcinak and B. G. Mobasseri},
title = {Digital video watermarking for metadata embedding in \uppercase{UAV}
video},
booktitle = {IEEE MILCOM 2005},
year = {2005},
pages = {1637--1641},
address = {Atlantic City, USA}
}
@ARTICLE{Memon97predictors,
author = {Nasir Memon and Xiaolin Wu},
title = {Recent Developments in Context-Based Predictive Techniques for Lossless
Image Compression},
journal = {The Computer Journal},
year = {1997},
volume = {40},
pages = {127--136},
number = {2},
file = {:/media/Documents/Research/watermark/paper/200812/Recent developments
in context-based predictive techniques for lossless image compression.pdf:PDF}
}
@ARTICLE{Moulin2005,
author = {Moulin, P. and Koetter, R.},
title = {Data-Hiding Codes},
journal = IEEE_J_PROC,
year = {2005},
volume = {93},
pages = {2083--2126},
number = {12},
doi = {10.1109/JPROC.2005.859599},
file = {:/media/Documents/Research/watermark/paper/Data Hiding Codes.pdf:PDF},
issn = {0018-9219},
keywords = {codes, data encapsulation, game theory, message authentication, watermarking,
code design techniques, coding theory, communication channel, content
authentication, covert communications, data binding, data-hiding
codes, digital media copyright protection, game theory, information
hiding, information theory, media forensics, signal processing, watermarking
codes, Coding theory, data hiding, game theory, image processing,
information theory, security, signal processing, watermarking},
owner = {chm},
timestamp = {2009.06.24}
}
@ARTICLE{pc80review,
author = {A. N. Netravali and J. O. Limb},
title = {Picture Coding: A Review},
journal = {Proceedings of the IEEE},
year = {1980},
volume = {68},
pages = {366--406},
number = {3}
}
@ARTICLE{Ni06hist,
author = {Zhicheng Ni and Yun-Qing Shi and Nirwan Ansari and Wei Su},
title = {Reversible data hiding},
journal = {IEEE Trans. Circuits and Systems for Video Technology},
year = {2006},
volume = {16},
pages = {354--362},
number = {3}
}
@BOOK{Jpeg93old,
title = {JPEG Still Image Data Compression Standard},
publisher = {Van Nostrand Reinhold},
year = {1993},
author = {W. B. Pennebaker and J. L. Mitchell}
}
@ARTICLE{Petitcolas99ih,
author = {F. A. P. Petitcolas and R. J. Anderson and M. G. Kuhn},
title = {Information Hiding --- A Survey},
journal = {Proceedings of the IEEE, Special issue on protection of multimedia
content},
year = {1999},
volume = {87},
pages = {1062--1078},
number = {7},
file = {:/media/Documents/Research/watermark/paper/200901/Information Hiding
A Survey.pdf:PDF}
}
@INPROCEEDINGS{Birgit96term,
author = {B. Pfitzmann},
title = {Information Hiding Terminology},
booktitle = {IH 2001, LNCS 1174},
year = {1996},
pages = {347--350},
address = {Cambriage, UK}
}
@ARTICLE{Rissanen1984,
author = {Rissanen, J.},
title = {Universal coding, information, prediction, and estimation},
journal = {IEEE Trans on Information Theory},
year = {1984},
volume = {30},
pages = {629--636},
number = {4},
issn = {0018-9448},
keywords = {Information theory, Parameter estimation, Prediction methods, Source
coding},
owner = {chm},
timestamp = {2009.04.12}
}
@INPROCEEDINGS{Shanmugam2008,
author = {Shanmugam, P. and Rajesh, R.S. and Perumal, E.},
title = {A reversible watermarking with low warping: An application to digital
fundus image},
booktitle = {Proc. International Conference on Computer and Communication Engineering
ICCCE 2008},
year = {2008},
pages = {472--477},
month = {13--15 May },
doi = {10.1109/ICCCE.2008.4580649},
owner = {chm},
timestamp = {2009.03.26}
}
@INPROCEEDINGS{Shi04iwdw,
author = {Y. Q. Shi},
title = {Reversible Data Hiding},
booktitle = {IWDW 2004, LNCS 3304},
year = {2005},
pages = {1--12},
address = {Seoul, South Korea}
}
@INPROCEEDINGS{Swanson98overview,
author = {M. D. Swanson and M. Kobayashi and A. H. Tewfik},
title = {Multimedia Data-Embedding and Watermarking Technologies},
booktitle = {Proceedings of the IEEE},
year = {1998},
volume = {86},
number = {6},
pages = {1064--1087}
}
@INPROCEEDINGS{Swanson97vv,
author = {M. D. Swanson and B. Zhu and A. H. Tewfik},
title = {Data hiding for video-in-video},
booktitle = {ICIP 1997},
year = {1997},
pages = {676--679},
address = {Santa Barbara, USA}
}
@INPROCEEDINGS{Thanuja2008,
author = {Thanuja, T.C and Nagaraj, R and Uttara kumari, M.},
title = {Reversible Data Hiding using Increased Peak Histogram},
booktitle = {Proc. 11th International Conference on Computer and Information Technology
ICCIT 2008},
year = {2008},
pages = {44--47},
month = {24--27 Dec. },
doi = {10.1109/ICCITECHN.2008.4803108},
owner = {chm},
timestamp = {2009.03.26}
}
@ARTICLE{Thodi07,
author = {D. M. Thodi and J. J. Rodriguez},
title = {Expansion embedding techniques for reversible watermarking},
journal = {IEEE Trans. Image Processing},
year = {2007},
volume = {16},
pages = {721--730},
number = {3},
file = {:/media/Documents/Research/watermark/paper/200811/Expansion Embedding
Techniques for Reversible Watermarking.pdf:PDF}
}
@ARTICLE{Thodi07pee,
author = {D. M. Thodi and J. J. Rodriguez},
title = {Expansion embedding techniques for reversible watermarking},