1 R. Crandall, "Some Notes on Steganography"
2 D. Xu, "Separable and Error-Free Reversible Data Hiding in Encrypted Images" 123 : 9-21, 2016
3 D. Xu, "Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification" 2018 : 1-14, 2018
4 B. Yin, "Separable Reversible Data Hiding in Encrypted Image with Classification Permutation" 201-204, 2017
5 D. Xiao, "Separable Reversible Data Hiding in Encrypted Image Based on Pixel Value Ordering and Additive Homomorphism" 45 : 1-10, 2017
6 Z. Ni, "ReversibleData Hiding" 16 (16): 354-362, 2006
7 J. Hu, "Reversible Steganography using Extended Image Interpolation Technique" 447-455, 2015
8 Z. Qian, "Reversible Data Hiding in Encrypted Images with Distributed Source Encoding" 26 (26): 636-646, 2015
9 K. Ma, "Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption" 8 (8): 553-562, 2013
10 X. Liao, "Reversible Data Hiding in Encrypted Images Based on Absolute Mean Difference of Multiple Neighboring Pixels" 21-27, 2015
1 R. Crandall, "Some Notes on Steganography"
2 D. Xu, "Separable and Error-Free Reversible Data Hiding in Encrypted Images" 123 : 9-21, 2016
3 D. Xu, "Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification" 2018 : 1-14, 2018
4 B. Yin, "Separable Reversible Data Hiding in Encrypted Image with Classification Permutation" 201-204, 2017
5 D. Xiao, "Separable Reversible Data Hiding in Encrypted Image Based on Pixel Value Ordering and Additive Homomorphism" 45 : 1-10, 2017
6 Z. Ni, "ReversibleData Hiding" 16 (16): 354-362, 2006
7 J. Hu, "Reversible Steganography using Extended Image Interpolation Technique" 447-455, 2015
8 Z. Qian, "Reversible Data Hiding in Encrypted Images with Distributed Source Encoding" 26 (26): 636-646, 2015
9 K. Ma, "Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption" 8 (8): 553-562, 2013
10 X. Liao, "Reversible Data Hiding in Encrypted Images Based on Absolute Mean Difference of Multiple Neighboring Pixels" 21-27, 2015
11 Y. Chen, "Reversible Data Hiding in Classification-Scrambling Encrypted-Image Based on Iterative Recovery" 56 (56): 299-312, 2018
12 J. Tian, "Reversible Data Embedding using a Difference Expansion" 13 (13): 890-896, 2003
13 K. Chen, "Real-Time ErrorFree Reversible Data Hiding in Encrypted Images Using(7, 4)Hamming Code and Most Significant Bit Prediction" 11 (11): 1-17, 2019
14 A. Bhise, "Performance Enhancement of Modified Turbo Codes with TwoStage Interleavers" 5 (5): 1336-1342, 2011
15 F. Huang, "New Framework for Reversible Data Hiding in Encrypted Domain" 11 (11): 2777-2789, 2016
16 C. Berrou, "Near Shannon Limit Error-Correcting Coding and Decoding: Turbo-Codes" 23-26, 1993
17 Y. Wu, "NPCR and UCAI randomness tests for image encryption" 31-38, 2011
18 W. Diffie, "Multiuser Cryptographic Techniques" 109-112, 1976
19 Vidya. S, "Modified Cryptographic Turbo Code for Sensitive Information" 1-6, 2017
20 Sadjadpour, "Maximum A Posteriori Decoding Algorithms for Turbo Codes" 4045 : 73-84, 2000
21 W. Zhang, "Improving Embedding Efficiency of Covering Codes for Applications in Steganography" 11 (11): 680-682, 2007
22 A. Bhise, "Improved Low Complexity Hybrid Turbo Codes and Union Bound Analysis" 5 (5): 512-518, 2011
23 Z. Qian, "Improved Joint Reversible Data Hiding in Encrypted Images" 40 : 732-738, 2016
24 H. Alain, "Image quality metrices: PSNR vs SSIM" 2366-2369, 2010
25 X. Wu, "High-Capacity Reversible Data Hiding in Encrypted Images by Prediction Error" 104 : 387-400, 2014
26 C. K. Chan, "Hiding Data in Images by Simple LSB Substitution" 469-474, 2004
27 S. A. Parah, "Hiding Clinical Information in Medical Images : a New High Capacity and Reversible Data Hiding Technique" 214-230, 2017
28 D. Hankerson, "Elliptic Curve Discrete Logarithm Problem" 397-400, 2011
29 N. Kolbitz, "Elliptic Curve Cryptosystems" 48 (48): 203-209, 1987
30 X. Li, "Efficient Reversible Watermarking based on Adaptive Prediction-Error Expansion and Pixel Selection" 20 (20): 3524-3533, 2011
31 K. H. Jung, "Data Hiding Method using Image Interpolation" 465-470, 2009
32 C. Kim, "Data Hiding Based on Overlapped Pixels using Hamming Code" 15651-15663, 2016
33 C. F. Lee, "An Efficient Image Interpolation Increasing Payload in Reversible Data Hiding" 6712-6719, 2012
34 K. Loukhaoukha, "A Secure Image Encryption Algorithm Based on Rubik’s Principle" 2012
35 Q. Mao, "A Fast Algorithm for Matrix Embedding Steganography" 25 : 248-254, 2014