- [1] P. Bas, T. Filler, and T. Pevny´, Break Our Steganographic System”: The Ins and Outs of Organizing BOSS, Information Hiding, 6958 (2011), 59–70.
- [2] P. Bas and T. Furon, Image database of BOWS-2, Available: http://bows2.eclille.fr.
- [3] X. Cao, L. Du, X. Wei, D. Meng, and X. Guo, High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation, IEEE Transactions on Cybernetics, 46(5) (2016), 1132–1143.
- [4] K. Chen and C. C. Chang, High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement, Journal of Visual Communication and Image Representation, 58 (2019), 334–344.
- [5] Y. Hu, H. -K. Lee, and J. Li, DE-Based Reversible Data Hiding With Improved Overflow Location Map, IEEE Transactions on Circuits and Systems for Video Technology, 19(2) (2009), 250–260.
- [6] Jun Tian, Reversible data embedding using a difference expansion, IEEE Transactions on Circuits and Systems for Video Technology, 13(8) (2003), 890–896.
- [7] H. J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, and H. -G. Choo, A Novel Difference Expansion Transform for Reversible Data Embedding, IEEE Transactions on Information Forensics and Security, 3(3) (2008), 456–465.
- [8] X. Li, B. Yang, and T. Zeng, Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection, IEEE Transactions on Image Processing, 20(12) (2011), 3524–3533.
- [9] K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption, IEEE Transactions on Information Forensics and Security, 8(3) (2013), 553–562.
- [10] B. Ou, X. Li, W. Zhang, and Y. Zhao, Improving Pairwise PEE via Hybrid-Dimensional Histogram Generation and Adaptive Mapping Selection, IEEE Transactions on Circuits and Systems for Video Technology, 29(7) (2019), 2176–2190.
- [11] B. Ou, X. Li, Y. Zhao, R. Ni, and Y. -Q. Shi, Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding, IEEE Transactions on Image Processing, 22(12) (2013), 5010–5021.
- [12] W. Puech, M. Chaumont, and O. Strauss, A Reversible Data Hiding Method for Encrypted Images, SPIE Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, (2008), 1–9.
- [13] P. Puteaux, S. Ong, K. Wong, and W. Puech, A survey of reversible data hiding in encrypted images – The first 12 years, Journal of Visual Communication and Image Representation, 77 (2021), 103085.
- [14] P. Puteaux and W. Puech, An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images, IEEE Transactions on Information Forensics and Security, 13(7) (2018), 1670–1681.
- [15] P. Puteaux and W. Puech, A Recursive Reversible Data Hiding in Encrypted Images Method With a Very High Payload, IEEE Transactions on Multimedia, 23 (2021), 636–650.
- [16] P. Puteaux and W. Puech, EPE-based Huge-Capacity Reversible Data Hiding in Encrypted Images, 018 IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, China, (2018), 1–7.
- [17] Y. Puyang, Z. Yin, and Z. Qian, Reversible Data Hiding in Encrypted Images with Two-MSB Prediction, 2018 IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, China , (2018), 1–7.
- [18] Z. Qian, X. Zhang, and S. Wang, Reversible Data Hiding in Encrypted JPEG Bitstream, IEEE Transactions on Multimedia, 16(5) (2014), 1486–1491.
- [19] A. Rosewelt and A. Renjit, Semantic analysis-based relevant data retrieval model using feature selection, summarization and CNN, Soft Computing, 24 (2020), 16983–17000.
- [20] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, Reversible Watermarking Algorithm Using Sorting and Prediction, IEEE Transactions on Circuits and Systems for Video Technology, 19(7) (2009), 989–999.
- [21] N. K. Sao, C. T. Luyen, and P. V. At, Efficient reversible data hiding using block histogram shifting with invariant peak points, J. Inf. Hiding Multim. Signal Process., 38(1) (2022), 78–97.
- [22] K. P. S. Shijin and D. D. Edwin, Simulated attack based feature region selection for efficient digital image watermarking, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), Nagercoil, India, (2012), 1128–1132.
- [23] M. Suchetha, N. S. Ganesh, R. Raman, and D. E. Dhas, Region of interest-based predictive algorithm for subretinal hemorrhage detection using faster R-CNN, Soft Computing, 25 (2021), 15255–15268.
- [24] D. M. Thodi and J. J. Rodriguez, Expansion Embedding Techniques for Reversible Watermarking, IEEE Transactions on Image Processing, 16(3) (2007), 721–730.
- [25] M. Y. Valandar, M. J. Barani, P. Ayubi, and M. Aghazadeh, An integer wavelet transform image steganography method based on 3D sine chaotic map, Multimed Tools Appl, 78 (2019), 9971–9989.
- [26] W. Weiqing, Y. Junyong, W. Tongqing, and W. Weifu, A high capacity reversible data hiding scheme based on right-left shift, Signal Processing, 150 (2018), 102–115.
- [27] C.-H. Yang and M.-H. Tsai, Improving histogram-based reversible data hiding by interleaving predictions, IET Image Processing, 4(4) (2010), 223–234.
- [28] M. Yesilyurt and Y. Yalman, New approach for ensuring cloud computing security: using data hiding methods, S¯adhan¯a, 41 (2016), 1289–1298.
- [29] S. Yi and Y. Zhou, Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling, IEEE Transactions on Multimedia, 20(1) (2019), 51–64.
- [30] X. Zhang, J. Long, Z. Wang, and H. Cheng, Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography, IEEE Transactions on Circuits and Systems for Video Technology, 26(9) (2016), 1622– 1631.
- [31] A. Zulehner and R. Wille, Make it reversible: Efficient embedding of non-reversible functions, Design, Automation & Test in Europe Conference & Exhibition (DATE), (2017), 458–463.
|