Gao X B, Deng C, Li X L, Tao D C. Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 2010, 40(3): 278-286
[2]
Hao Yue, Zhao Yao, Ni Rong-Rong. Multibit image watermarking algorithm resistant to geometric attacks based on level set method. Journal on Communications, 2011, 32(10): 135-142(郝悦, 赵耀, 倪蓉蓉. 基于水平集方法的抵抗几何攻击的多比特图像水印算法. 通信学报, 2011, 32(10): 135-142)
[3]
An L L, Gao X B, Deng C. Reliable embedding for robust reversible watermarking. In: Proceedings of the 2nd International Conference on Internet Multimedia Computing and Service. New York, USA: ACM, 2010. 57-60
[4]
Ni Z C, Shi Y Q, Ansari N, Su W. Reversible data hiding. IEEE Transactions on Circuit and Systems for Video Technology, 2006, 16(3): 354-362
[5]
Kuo W C, Jiang D J, Huang Y C. Reversible data hiding based on histogram. In: Proceedings of the 3rd International Conference on Intelligent Computing. Berlin, Germany: Springer-Verlag, 2007. 1152-1161
[6]
Gao X B, An L L, Yuan Y, Tao D C, Li X L. Lossless data embedding using generalized statistical quantity histogram. IEEE Transactions on Circuit and Systems for Video Technology, 2011, 21(8): 1061-1070
[7]
Kari J. Theory of cellular automata: a survey. Theoretical Computer Science, 2005, 334(1-3): 3-33
[8]
Feng Z H, Zhang Y J, Liu Y C. Image encryption based on reversible cellular automata. Advances in Information and System Sciences, 2007, 2: 178-186
[9]
CVG-UGR Image Database [Online], available: http://decs-ai.ugr.es/cvg/dbimagenes/index.php, October 1, 2002
[10]
Huang Ji-Wu, Tan Tie-Niu. A review of invisible image watermarking. Acta Automatica Sinica, 2000, 26(5): 645-655(黄继武, 谭铁牛. 图像隐形水印综述. 自动化学报, 2000, 26(5): 645-655)
[11]
Deng Cheng, Li Jie, Gao Xin-Bo. Geometric attacks resistant image watermarking in affine covariant regions. Acta Automatica Sinica, 2010, 36(2): 221-228(邓成, 李洁, 高新波. 基于仿射协变区域的抗几何攻击图像水印算法. 自动化学报, 2010, 36(2): 221-228)
[12]
An L L, Gao X B, Deng C, Ji F. Robust lossless data hiding: analysis and evaluation. In: Proceedings of the 2010 International Conference on High Performance Computing and Simulation. Caen, France: IEEE, 2010. 512-516
[13]
Hwang J, Kim J, Choi J. A reversible watermarking based on histogram shifting. In: Proceedings of the 5th International Workshop on Digital Watermarking. Berlin, Germany: Springer-Verlag, 2006. 348-361
[14]
An L L, Gao X B, Deng C, Ji F. Reversible watermarking based on statistical quantity histogram. In: Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing. Berlin, Germany: Springer-Verlag, 2009. 1300-1305
[15]
Kuo W C, Lin Y H. On the security of reversible data hiding based-on histogram shift. In: Proceedings of the 3rd International Conference on Innovative Computing Information and Control. Dalian, China: IEEE, 2008. 174-177
[16]
Wolfram S. Cellular automata as models of complexity. Nature, 1984, 311(5985): 419-424
[17]
Zhai Y, Yi Z, Deng P M. On behavior of two-dimensional cellular automata with an exceptional rule. Information Sciences, 2009, 179(5): 613-622
[18]
Chatzichristofis S A, Mitzias D A, Sirakoulis G C, Boutalis Y S. A novel cellular automata based technique for visual multimedia content encryption. Optics Communications, 2010, 283(21): 4250-4260