<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232017000600524</article-id>
<article-id pub-id-type="doi">10.1016/j.jart.2017.06.001</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A novel Diamond-Mean predictor for reversible watermarking of images]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ishtiaq]]></surname>
<given-names><![CDATA[Muhammad]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Jaffar]]></surname>
<given-names><![CDATA[Arfan]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,FAST-National University of Computer &amp; Emerging Sciences Department of Computer Science ]]></institution>
<addr-line><![CDATA[Islamabad ]]></addr-line>
<country>Pakistan</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Al Imam Mohammad Ibn Saud Islamic University  ]]></institution>
<addr-line><![CDATA[Riyadh ]]></addr-line>
<country>Saudi Arabia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2017</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2017</year>
</pub-date>
<volume>15</volume>
<numero>6</numero>
<fpage>524</fpage>
<lpage>532</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232017000600524&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232017000600524&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232017000600524&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Reversible watermarking (RW) is the art of embedding secret information in the host image such that after extraction of hidden information, original image is also restored from the watermarked image. Prediction error expansion (PEE) is state of the art technique for RW. Performance of PEE methods depends on the predictor&#8217;s ability to accurately estimate image pixels. In this paper, a novel Diamond-Mean (D-Mean) prediction mechanism is presented. The D-Mean predictor uses only D-4 neighbors of a pixel, i.e. pixels located at {east, west, north, south}. In the estimation process, apart from edge presence, its orientation and sensitivity is also taken into account. In experimental evaluations, the D-Mean predictor outperforms currently in use MED (median edge detector) and GAP (gradient adjusted predictor) predictors. For, standard test images of Lena, Airplane, Barbara and Baboon, an average improvement of 51.79 for mean squared PE and an average improvement of 0.4 for error-entropy than MED/GAP are observed. Payload vs imperceptibility comparison of the method shows promising results.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Prediction]]></kwd>
<kwd lng="en"><![CDATA[Error-expansion]]></kwd>
<kwd lng="en"><![CDATA[Reversible watermarking]]></kwd>
<kwd lng="en"><![CDATA[MED]]></kwd>
<kwd lng="en"><![CDATA[GAP]]></kwd>
<kwd lng="en"><![CDATA[D-Mean]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alattar]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reversible watermark using the difference expansion of a generalized integer transform]]></article-title>
<source><![CDATA[IEEE Transactions on Image Processing]]></source>
<year>2004</year>
<volume>13</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1147-56</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barni]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bartolini]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Cappellini]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Magli]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Olmo]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Watermarking-based protection of remote sensing images: Requirements and possible solutions]]></article-title>
<source><![CDATA[Mathematics of data/image coding, compression, and encryption IV, with applications]]></source>
<year>2001</year>
<volume>4475</volume>
<page-range>191-202</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Caldelli]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Filippini]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Becarelli]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reversible watermarking techniques: An overview and a classification]]></article-title>
<source><![CDATA[EURASIP Journal on Information Security, 2010]]></source>
<year>2010</year>
<page-range>1-19</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hong]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T.-S.]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[Y.-P.]]></given-names>
</name>
<name>
<surname><![CDATA[Shiu]]></surname>
<given-names><![CDATA[C.-W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification]]></article-title>
<source><![CDATA[Signal Processing]]></source>
<year>2010</year>
<volume>90</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>2911-22</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[Y. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[H. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[DE-based reversible data hiding with improved overflow location map]]></article-title>
<source><![CDATA[IEEE Transactions on Circuits and Systems for Video Technology]]></source>
<year>2009</year>
<volume>19</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>250-60</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kamstra]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Heijmans]]></surname>
<given-names><![CDATA[H. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reversible data embedding into images using wavelet techniques and sorting]]></article-title>
<source><![CDATA[IEEE Transactions on Image Processing]]></source>
<year>2005</year>
<volume>14</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>2082-90</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[H.-J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sachnev]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[Y.-Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Nam]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Choo]]></surname>
<given-names><![CDATA[H.-G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel difference expansion transform for reversible data embedding]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2008</year>
<volume>3</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>456-65</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kotvicha]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Sanguansat]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Kasemsa]]></surname>
<given-names><![CDATA[M. L. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Expand variance mean sorting for reversible watermarking]]></article-title>
<source><![CDATA[International Journal of Computer and Communication Engineering]]></source>
<year>2012</year>
<volume>1</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Yoo]]></surname>
<given-names><![CDATA[C. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Kalker]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reversible image watermarking based on integer-to-integer wavelet transform]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2007</year>
<page-range>321-30</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Luo]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zeng]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Xiong]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reversible image watermarking using interpolation technique]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2010</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>187-93</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martucci]]></surname>
<given-names><![CDATA[S. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Reversible compression of HDTV images using median adaptive prediction and arithmetic coding]]></source>
<year>1990</year>
<conf-name><![CDATA[ IEEE international symposium on circuits and systems]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1310-3</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ni]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[Y.-Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Ansari]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Su]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reversible data hiding]]></article-title>
<source><![CDATA[IEEE Transactions on Circuits and Systems for Video Technology]]></source>
<year>2006</year>
<volume>16</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>354-62</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Park]]></surname>
<given-names><![CDATA[S. B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security requirements for multimedia archives]]></article-title>
<source><![CDATA[Advances in Multimedia, 2014]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peng]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adaptive reversible data hiding scheme based on integer transform]]></article-title>
<source><![CDATA[Signal Processing]]></source>
<year>2012</year>
<volume>92</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>54-62</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sachnev]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[H. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Nam]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Suresh]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[Y. Q.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reversible watermarking algorithm using sorting and prediction]]></article-title>
<source><![CDATA[IEEE Transactions on Circuits and Systems for Video Technology]]></source>
<year>2009</year>
<volume>19</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>989-99</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Xiao]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A reversible watermarking authentication scheme for wireless sensor networks]]></article-title>
<source><![CDATA[Information Sciences]]></source>
<year>2013</year>
<volume>1</volume>
<numero>240</numero>
<issue>240</issue>
<page-range>173-83</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Song]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Tu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A reversible video steganography algorithm for MVC based on motion vector]]></article-title>
<source><![CDATA[Multimedia Tools Application]]></source>
<year>2015</year>
<volume>74</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>3559-782</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tai]]></surname>
<given-names><![CDATA[W. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Yeh]]></surname>
<given-names><![CDATA[C. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[C. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reversible data hiding based on histogram modification of pixel differences]]></article-title>
<source><![CDATA[IEEE Transactions on Circuits and Systems for Video Technology]]></source>
<year>2009</year>
<volume>19</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>906-10</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Thodi]]></surname>
<given-names><![CDATA[D. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Prediction-error based reversible watermarking]]></source>
<year>2004</year>
<conf-name><![CDATA[ International conference on image processing (ICIP)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1549-52</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Thodi]]></surname>
<given-names><![CDATA[D. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Expansion embedding techniques for reversible watermarking]]></article-title>
<source><![CDATA[IEEE Transactions on Image Processing]]></source>
<year>2007</year>
<volume>16</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>721-30</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tian]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reversible data embedding using a difference expansion]]></article-title>
<source><![CDATA[IEEE Transactions on Circuits and Systems for Video Technology]]></source>
<year>2003</year>
<volume>13</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>890-6</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tsai]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[Y.-C.]]></given-names>
</name>
<name>
<surname><![CDATA[Yeh]]></surname>
<given-names><![CDATA[H.-L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reversible image hiding scheme using predictive coding and histogram shifting]]></article-title>
<source><![CDATA[Signal Processing]]></source>
<year>2009</year>
<volume>89</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1129-43</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[van der Veen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bruekers]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[van Leest]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Cavin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[High capacity reversible watermarking for audio]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Delp]]></surname>
<given-names><![CDATA[E. J. JIII]]></given-names>
</name>
<name>
<surname><![CDATA[Wong]]></surname>
<given-names><![CDATA[P. W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Society of Photo-Optical Instrumentation Engineers (SPIE)]]></source>
<year>2003</year>
<volume>5020</volume>
<page-range>1-11</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[van Leest]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[van der Veen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bruekers]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reversible watermarking for images]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Delp]]></surname>
<given-names><![CDATA[E. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wong]]></surname>
<given-names><![CDATA[P. W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Security, steganography, and watermarking of multimedia contents, SPIE]]></source>
<year>2004</year>
<volume>5306</volume>
<page-range>374-85</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[High capacity reversible image water-marking based on integer transform]]></source>
<year>2010</year>
<conf-name><![CDATA[ International conference on image processing (ICIP)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>217-20</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Guo]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Efficient generalized integer transform for reversible watermarking]]></article-title>
<source><![CDATA[Signal Processing Letters]]></source>
<year>2010</year>
<volume>17</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>567-70</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Weinberger]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Seroussi]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Sapiro]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The loco-i lossless image compression algorithm: Principles and standardization into JPEG-LS]]></article-title>
<source><![CDATA[IEEE Transactions on Image Processing]]></source>
<year>2000</year>
<volume>9</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1309-24</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Memon]]></surname>
<given-names><![CDATA[N. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Context-based, adaptive, lossless image coding]]></article-title>
<source><![CDATA[IEEE Transactions on Communications]]></source>
<year>1997</year>
<volume>45</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>437-44</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Schmucker]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Funk]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Busch]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[S.-H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Integer DCT-based reversible watermarking for images using companding technique]]></article-title>
<source><![CDATA[Security, steganography, and watermarking of multimedia contents]]></source>
<year>2004</year>
<page-range>405-15</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Schmucker]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Busch]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Niu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Approaching optimal value expansion for reversible watermarking]]></source>
<year>2005</year>
<conf-name><![CDATA[ 7thworkshop on multimedia and security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>95-102</page-range><publisher-loc><![CDATA[New York, NY, USA ]]></publisher-loc>
<publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Qian]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Feng]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Ren]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Efficient reversible data hiding in encrypted images]]></article-title>
<source><![CDATA[Journal of Visual Communication and Image Representation]]></source>
<year>2014</year>
<volume>25</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>322-8</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[J. Z.-T. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Feng]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel two-dimensional histogram modification for reversible data embedding into stereo h.264 video]]></article-title>
<source><![CDATA[Multimedia Tools Application]]></source>
<year>2016</year>
<volume>75</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>5959-80</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
