[1] Tian J. Reversible data embedding using a difference expansion [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13(8): 890-896.[2] Celik M U, Sharma G, Tekalp A M, et al. Lossless generalized-LSB data embedding [J]. IEEE Transactions on Image Processing, 2005, 4(2): 253-266.[3] Ni Z C, Shi Y Q, Ansari N, et al. Reversible data hiding [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(3): 354-362.[4] Goljan M, Fridrich J, Du R. Distortion-free data embedding [C]//Information Hiding. 2001: 27-41.[5] De Vleeschouwer D, Delaigle J F, Macq B. Circular interpretation of bijective transformations in lossless watermarking for media asset management [J]. IEEE Transactions onMultimedia, 2003, 5(1): 97-105.[6] Ni Z C, Shi Y Q, Ansari N, et al. Robust lossless image data hiding [C]//IEEE International Conference on Multimedia and Expo. 2004: 2199-2202.[7] Ni Z C, Shi Y Q, Ansari N, et al. Robust lossless image data hiding designed for semi-fragile image authentication [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2008, 18(4): 497-509.[8] Zou D, Shi Y Q, Ni Z C. A semi-fragile lossless digital watermarking scheme based on integer wavelet transform [C]//IEEE 6th Workshop on Multimedia Signal Processing. 2004: 195-198.[9] Zou D, Shi Y Q, Ni Z C, et al. A semi-fragile lossless digital watermarking scheme based on integer wavelet transform [J]. IEEE Transactions on Circuits Systems for Video Technology, 2006, 16(10): 1294-1300.[10] Kim K S, Lee M J, Suh Y H, et al. Robust lossless data hiding based on block gravity center for selective authentication [C]//IEEE International Conference on Multimedia and Expo. 2009: 1022-1025. |