publication . Preprint . Other literature type . Conference object . 2016

PPE-Based Reversible Data Hiding

Han-Zhou Wu; Hong-Xia Wang; Yun-Qing Shi;
Open Access English
  • Published: 18 Apr 2016
Abstract
Comment: There has no technical difference to previous versions, but rather some minor word corrections. A 2-page summary of this paper was accepted by ACM IH&MMSec'16 "Ongoing work session". My homepage: hzwu.github.io
Subjects
ACM Computing Classification System: ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION
free text keywords: Computer Science - Multimedia, Mean squared prediction error, Digital watermarking, Pixel, Theoretical computer science, Computer science, Histogram, Embedding, Information hiding, Sorting
Related Organizations
20 references, page 1 of 2

[1] A. M. Alattar. Reversible watermarking using the di erence expansion of a generalized integer transform. IEEE Trans. Image Process., 13(8):1147{1156, Aug. 2004. [OpenAIRE]

[2] M. U. Celik, G. Sharma, and A. M. Tekalp. Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans. Image Process., 15(4):1042{1049, Apr. 2006.

[3] M. Chen, Z. Chen, X. Zeng, and Z. Xiong. Reversible data hiding using additive prediction-error expansion. In ACM Wrokshop Multimedia Security, pages 19{24. New York, NY, Sept. 2009.

[4] I. Dragoi and D. Coltuc. Local-prediction-based di erence expansion reversible watermarking. IEEE Trans. Image Process., 23(4):1779{1790, Apr. 2014. [OpenAIRE]

[5] J. Fridrich, M. Goljan, and R. Du. Invertible authentication. In Proc. SPIE, pages 197{208. San Jose, CA, Aug. 2001. [OpenAIRE]

[6] W. Hong, T. S. Chen, and C. W. Shiu. Reversible data hiding for high quality images using modi cation of prediction errors. J. Syst. Softw., 82(11):1833{1842, Nov. 2009.

[7] F. Hsu, M. Wu, and S. Wang. Reversible data hiding using side-match predictions on steganographic images. Multimedia Tools Appl., 67(3):571{591, Dec. 2013.

[8] S. Lee, C. D. Yoo, and T. Kalker. Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. Forensics Security, 2(3):321{330, Sept. 2007.

[9] X. Li, B. Yang, and T. Zeng. E cient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans. Image Process., 20(12):3524{3533, Dec. 2011.

[10] X. Li, W. Zhang, X. Gui, and B. Yang. A novel reversible data hiding scheme based on two-dimensional di erence-histogram modi cation. IEEE Trans. Inf. Forensics Security, 8(7):1091{1100, Jul. 2013.

[11] S. Lin and W. Chung. The scalar scheme for reversible information embedding in gray-scale signals: capacity evaluation and code construction. IEEE Trans. Inf. Forensics Security, 7(4):1155{1167, Aug. 2012.

[12] L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong. Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Security, 5(1):187{193, Mar. 2010.

[13] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol., 16(3):354{362, Mar. 2006.

[14] B. Ou, X. Li, Y. Zhao, R. Ni, and Y. Q. Shi. Pairwise prediction-error expansion for e cient reversible data hiding. IEEE Trans. Image Process., 22(12):5010{5021, Dec. 2013.

[15] T. PevnA~ <, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Security, 5(2):215{224, Jun. 2010.

20 references, page 1 of 2
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Preprint . Other literature type . Conference object . 2016

PPE-Based Reversible Data Hiding

Han-Zhou Wu; Hong-Xia Wang; Yun-Qing Shi;