[1] Fridrich J, Goljan M, Du R. Invertible Authentication Watermark for JPEG Images[C]//Proceedings of International Conference on Information Technology: Coding and Computer. Los Alamitos: IEEE Computer Society, 2001: 223-227.
[2] Du R, Fridrich J. Lossless Authentication of MPEG-2 Video[C]//Proceedings of IEEE International Conference on Image Processing. Piscataway: IEEE, 2002: Ⅱ1893-Ⅱ1896.
[3] Celik M U, Sharma G, Tekalp A M, et al. Lossless Generalized-LSB Data Embedding[J]. IEEE Transactions on Image Processing, 2005, 14(2): 253-266.
[4] Alattar A M. Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform[J]. IEEE Transactions on Image Processing, 2004, 13(8): 1147-1156.
[5] Wang X, Li X, Yang B, et al. Efficient Generalized Integer Transform for Reversible Watermarking[J]. IEEE Signal Processing Letters, 2010, 17(6): 567-570.
[6] Thodi D M, Rodriguez J J. Expansion Embedding Techniques for Reversible Watermarking[J]. IEEE Transactions on Image Processing, 2007, 16(3): 721-730.
[7] Hong W, Chen T S, Shiu C W. Reversible Data Hiding for High Quality Images Using Modification of Prediction Errors[J]. Journal of Systems and Software, 2009, 82(11): 1833 - 1842.
[8] Tian J. Reversible Data Embedding Using a Difference Expansion[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13(8): 890-896.
[9] Wang X, Guo Z. A Novel Reversible Watermarking Method Using Pre-selection Strategy[J]. International Journal of Innovative Computing, Information and Control, 2011, 7(11): 6187-6201. |