A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method

Fan Li, Qian Mao, Chin-Chen Chang. A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method. I. J. Network Security, 18(3):410-419, 2016. [doi]

Abstract

Abstract is missing.