A BITRATE CONTROLLED DATA HIDING SCHEME FOR JPEG2000

J. Chen, T.-S. Chen, C.-N. Lin, and C.-Y. Cheng

References

  1. [1] C. Christopoulos, A. Skodras, & T. Ebrahimi, The JPEG2000 still image coding system: An overview, IEEE Transactions on Consumer Electronics, 46 (4), 2000, 1103–1127.
  2. [2] J. Chen, T.S. Chen, & C.Y. Cheng, New image tampering detection and recovery system of JPEG2000 region of interest area, Imaging Science Journal, 53 (1), 2005, 12–19.
  3. [3] Y.C. Fan, A. Chiang, & J.H. Shen, ROI-based watermarking scheme for JPEG 2000, Circuits, Systems, and Signal Processing, 27 (5), 2008, 763–774.
  4. [4] P.C. Su & C.J. Kuo, Steganography in JPEG2000 compressed images, IEEE Transaction on Consumer Electronics, 49 (4), 2003, 824–832.
  5. [5] Y.C. Fan & H.W. Tsao, A dual pyramid watermarking for JPEG-2000, International Journal of High Performance Computing and Networking, 5 (1–2), 2007, 84–96.
  6. [6] T.S. Chen, J. Chen, & J.G. Chen, A simple and efficient watermark technique based on JPEG2000 codec, ACM Multimedia Systems Journal, Springer-Verlag, 10 (1), 2004, 16–26.
  7. [7] D. Taubman, High performance scalable image compression with EBCOT, IEEE Transactions on Image Processing, 9 (7), 2000, 1158–1170.
  8. [8] JJ2000 Project, Software & test data: A Java implementation of the JPEG2000 Part I Standard, September 2002, available at http://jj2000.epfl.ch/

Important Links:

Go Back