Lossless data embedding--new paradigm in digital watermarking
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
Lossless Data Hiding in the Spatial Domain for High Quality Images
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Lossless nibbled data embedding scheme based on difference expansion
Image and Vision Computing
Reversible Watermark with Large Capacity Based on the Prediction Error Expansion
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
An Efficient Reversible Image Authentication Method
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform
IEEE Transactions on Information Forensics and Security - Part 1
A Novel Difference Expansion Transform for Reversible Data Embedding
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Multimedia
Reversible watermark using the difference expansion of a generalized integer transform
IEEE Transactions on Image Processing
Reversible data embedding into images using wavelet techniques and sorting
IEEE Transactions on Image Processing
Expansion Embedding Techniques for Reversible Watermarking
IEEE Transactions on Image Processing
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
Toward Quality Improvement in Location Map Free Reversible Watermarking
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Reversible watermarking using statistical information
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
Hi-index | 0.00 |
A great number of reversible watermarking methods have been put forward in the last few years. After analysis of some recent methods, we offer a new simple transform to increase the capacity applying just one iteration. Another advantage of our method is its simplicity. Moreover, it does not need to embed a compressed location map for recovering the original host. Therefore, the computational cost of our method is reduced in comparison to similar methods. The flexibility of the proposed method, on account of selecting appropriate contribution factor, is another advantage of our algorithm.