Reference: [1] H.Y. Qin, H.Y. Zhao and H. Zhao, Research on the Digital Image Encryption Algorithm based on Double Chaos, Bulletin of Science and Technology, 12(2016), 169-173. [2] G. Gao, X.Wan, S. Yao, et al, Reversible data hiding with contrast enhancement and tamper localization for medical images, Information Sciences, C(2017), 250-265. [3] T. Luo, G. Jiang, M. Yu, et al, Inter-view local texture analysis based stereo image reversible data hiding, Digital Signal Processing, C(2016), 116-129. [4] N. Jiang, N. Zhao and L. Wang, LSB Based Quantum Image Steganography Algorithm, International Journal of Theoretical Physics, 1(2016), 107-123. [5] M. Aziz, M.H. Tayarani-N and M. Afsar, A cycling chaos-based cryptic-free algorithm for image steganography, Nonlinear Dynamics, 3(2015), 1271-1290. [6] M. Li, D. Xiao, A. Kulsoom, et al, Improved reversible data hiding for encrypted images using full embedding strategy, Electronics Letters, 9(2015), 690-691. [7] K. Dong, H.J. Kim, S.C. Yong, et al, Reversible Binary Image Watermarking Method Using Overlapping Pattern Substitution, Etri Journal, 5(2015), 990–1000. [8] H. Zhou, K. Chen, W. Zhang, et al, Comments on Steganography Using Reversible Texture Synthesis, IEEE Transactions on Image Processing, 4(2017), 1623-1625. [9] H. Zheng, Y. Yang, D. Xiao, et al, RDH in BCS images based on block edge pixel separation, Electronics Letters, 1(2016), 18-20. [10] H. Unno, R. Yamkum, C. Bunporn, et al, A New Displaying Technology for Information Hiding Using Temporally Brightness Modulated Pattern, IEEE Transactions on Industry Applications, 1(2017), 596-601. [11] B. Bank, J. Heintz, G. Matera, et al, Quiz games as a model for information hiding, Journal of Complexity, C(2015), 1-29. [12] S.M.E. Sahraeian, M.A. Akhaee, B. Sankur, et al, Information hiding with maximum likelihood detector for correlated signals, Digital Signal Processing, C(2015), 144-155. [13] A. Basu, K. Nandy, A. Banerjee, et al, On the implementation of IP protection using biometrics based information hiding and firewall, International Journal of Electronics, 2(2016), 177-194. [14] F. Wang, L. Wang, T.T, Wang.Hidden Optimization Algorithm Simulation Analysis of Large Capacity Images,Computer Simulation. 3(2016), 409-412. [15] J.L. Han and X.H. Zhao, Adjustable reversible data hiding algorithm with large embedded capacity based on image gradient prediction, Journal of Jilin University(Engineering and Technology Edition), 6(2016), 2074-2079. [16] S.H. Song, Ubiquitous Data Gathering Algorithm Based on Maximization of Information Gain in Wireless Sensor Networks, Journal of China Academy of Electronics and Information Technology, 4(2017), 371-377.
|