Expansion Embedding Techniques for Reversible Watermarking
Citations
773 citations
Cites background or methods or result from "Expansion Embedding Techniques for ..."
...The histogram shift scheme of Thodi and Rodriguez [13] is utilized in this paper to enhance performance....
[...]
...Experimental results show that the proposed method has better results compared to the methods of Thodi and Rodriguez [14], Kamstra and Heijmans [7], and Lee et al. [9]....
[...]
...The combined use of the rhombus prediction scheme, sorting, histogram shift method, and, as result, small size of location map produces relatively superior results compared to existing schemes [7], [9], [14]....
[...]
...and Heijmans [14] based on [9] [7] Difference Prediction expansion errors 0....
[...]
...Reversible data hiding techniques with smaller, or in some cases, no location maps (like [12] and [14]), can be very desirable....
[...]
610 citations
Cites background from "Expansion Embedding Techniques for ..."
...K. Ma, W. Zhang, and N. Yu are with the School of Information Science and Technology, University of Science and Technology of China, Hefei, 230026, China (e-mail: k29ma@uwaterloo.ca; weimingzhang@yahoo.cn; ynh@ustc.edu.cn)....
[...]
589 citations
Cites background from "Expansion Embedding Techniques for ..."
...[3] shifts the bins of image histograms to leave an empty bin for data embedment....
[...]
550 citations
Cites methods from "Expansion Embedding Techniques for ..."
...Tian’s technique has been extended recently in [9]–[11]....
[...]
530 citations
Cites background from "Expansion Embedding Techniques for ..."
...These methods usually provide a low capacity and may lead to severe degradation in image quality....
[...]
...From (1) and (2), we see that the pixel values in inner region are either unchanged or modified by 1 while the ones in outer region are altered by 1....
[...]
References
3,037 citations
"Expansion Embedding Techniques for ..." refers background in this paper
...This enables the decoder to not only extract the watermark, but also perfectly reconstruct the original host signal from the watermarked work....
[...]
2,739 citations
1,149 citations
"Expansion Embedding Techniques for ..." refers background in this paper
...The data embedding is done by expanding these features in order to create vacancies into which the data bits are embedded....
[...]
1,126 citations
1,058 citations