A BITRATE CONTROLLED DATA HIDING SCHEME FOR JPEG2000

J. Chen, T.-S. Chen, C.-N. Lin, and C.-Y. Cheng

References

  1. [1] C. Christopoulos, A. Skodras, & T. Ebrahimi, The JPEG2000still image coding system: An overview, IEEE Transactionson Consumer Electronics, 46 (4), 2000, 1103–1127.
  2. [2] J. Chen, T.S. Chen, & C.Y. Cheng, New image tamperingdetection and recovery system of JPEG2000 region of interestarea, Imaging Science Journal, 53 (1), 2005, 12–19.
  3. [3] Y.C. Fan, A. Chiang, & J.H. Shen, ROI-based watermark-ing scheme for JPEG 2000, Circuits, Systems, and SignalProcessing, 27 (5), 2008, 763–774.
  4. [4] P.C. Su & C.J. Kuo, Steganography in JPEG2000 compressedimages, IEEE Transaction on Consumer Electronics, 49 (4),2003, 824–832.
  5. [5] Y.C. Fan & H.W. Tsao, A dual pyramid watermarking forJPEG-2000, International Journal of High Performance Com-puting and Networking, 5 (1–2), 2007, 84–96.
  6. [6] T.S. Chen, J. Chen, & J.G. Chen, A simple and efficient water-mark technique based on JPEG2000 codec, ACM MultimediaSystems Journal, Springer-Verlag, 10 (1), 2004, 16–26.
  7. [7] D. Taubman, High performance scalable image compressionwith EBCOT, IEEE Transactions on Image Processing, 9 (7),2000, 1158–1170.
  8. [8] JJ2000 Project, Software & test data: A Java implementationof the JPEG2000 Part I Standard, September 2002, availableat http://jj2000.epfl.ch/

Important Links:

Go Back