References: [1] Ni, Z., Shi, Y. -Q., Ansari, N., Su, W. (2006). Reversible Data Hid-ing, IEEE Transactions on Circuits and Systems for Video Technology, 16 (3) 354-362. [2] Tai, W. -L., Yeh, C. -M., Chang, C. -C. (2009). Reversible data hiding based on histogram modification of pixel differences, IEEE Transactions on Circuits and Systems for Video Technology, 19 (6) 906–910. [3] Zhang, X. (2011). Reversible data hiding in encrypted images, IEEE Signal Processing Letters, 18 (4) 255–258. [4] Hong, W., Chen, T., Wu, H. (2012). An improved reversible data hiding in encrypted images using side match, IEEE Signal Processing Letters, 19 (4) 199–202, 2012. [5] Liao, X., Shu, C. (2015). Reversible data hiding in encrypted im-ages based on absolute mean difference of multiple neighboring pixels, Journal of Visual Communication and Image Representation, 28, 21–27. [6] Qian, Z., Dai, S., Jiang, F., Zhang, X. (2016). Improved joint re-versible data hiding in encrypted images, Journal of Visual Communication and Image Representation, 40, p 732-738. [7] Zhou, J., Sun, W., Dong, L., et al. (2016). Secure reversible image data hiding over encrypted domain via key modulation, IEEE Transactions on Circuits and Systems for Video Technology, 26 (3) 441- 452. [8] Zhang, X. (2012). Separable reversible data hiding in encrypted image, IEEE Transactions on Information Forensics Security, 7 (2) 826–832. [9] Wu, X., Sun, W. (2014). High-capacity reversible data hiding in encrypted images by prediction error, Signal Processing, 104, 387-400. [10] Qian, Z., Zhang, X. (2016). Reversible data hiding in encrypted image with distributed source encoding, IEEE Transactions on Circuits and Systems for Video Technology, 26 (4) 636-646. [11] Qian, Z., Zhang, X., Feng, G. (2016). Reversible data hiding in encrypted images based on progressive recovery, IEEE Signal Processing Letters, 23 (11) 1672-1676. [12] Huang, F., Huang, J., Shi, Y. Q. (2016). New framework for re-versible data hiding in encrypted domain. IEEE Transactions on Information Forensics and Security, 11 (12) 2777-2789. [13] Ma, K., Zhang, W., Zhao, X. (2013). Reversible data hiding in encrypted images by reserving room before encryption, IEEE Transactions on Information Forensics Security, 8 (3) 553-562. [14] Zhang, W., Ma, K., Yu, N. (2014). Reversibility improved data hiding in encrypted images, Signal Processing, 94, 118–127, 2014. [15] Cao, X., Du, L., Wei, X. (2016). High capacity reversible data hiding in encrypted images by patch-level sparse representation, IEEE Transactions on Cybernetics, 46 (5) 1132-1143. [16] Harshvardhan et al. A Survey on Various Data Hiding Techniques and their Comparative Analysis, p.1-9 [17] Naseem, M., Ibrahim M. Hussain., Kamran Khan, M., Aisha Ajmal. (2011). An Optimum Modified Bit Plane Splicing LSB Algorithm for Secret Data Hiding, International Journal of Computer Applications, 29 (12), 2011. Foundation of Computer Science, New York, USA, p 36-38. [18] Nosrati, Masoud., Karimi,Ronak., Hariri, Mehdi. (2011). An introduction to steganography methods, World Applied Programming, 1 (3) August 2011. 191-195. WAP journal. [19] Thampi, Sabu M (2004). Information Hiding Techniques: A Tutorial Review, ISTE-STTP on Network Security and Cryptography, LBSCE 2004, p 1-19. [20] Bender, W., Gruh, D., Morimoto, N., Lu, A. (1996). Techniques for data Hiding, IBM SYSTEMS JOURNAL, 35 (3, 4) 1996, p 313-336. |