A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method

Fan Li, Qian Mao, Chin-Chen Chang. A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method. I. J. Network Security, 18(3):410-419, 2016. [doi]

@article{LiMC16,
  title = {A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method},
  author = {Fan Li and Qian Mao and Chin-Chen Chang},
  year = {2016},
  url = {http://ijns.femto.com.tw/contents/ijns-v18-n3/ijns-2016-v18-n3-p410-419.pdf},
  researchr = {https://researchr.org/publication/LiMC16},
  cites = {0},
  citedby = {0},
  journal = {I. J. Network Security},
  volume = {18},
  number = {3},
  pages = {410-419},
}