Author:
Li Dong,Zhan YingNan,Niu Ke,Yang XiaoYuan
Publisher
Springer International Publishing
Reference19 articles.
1. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3, 4), 313–336 (1996)
2. Al-Qershi, O.M., Khoo, B.E.: Two-dimensional difference encryption (2D-DE) scheme with a characteristics-based threshold. Signal Process. 93(1), 154–162 (2013)
3. Alattar, A.M.: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process. 13(8), 1147–1156 (2004)
4. Barton, J.M.: Method and apparatus for embedding authentication information within digital data. US Patent US5646997 (1997)
5. Honsinger, C.W., Jones, P.W., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data. US Patent US6278791 (2001)