Fan Li, Qian Mao, Chin-Chen Chang. A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method. I. J. Network Security, 18(3):410-419, 2016. [doi]
@article{LiMC16, title = {A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method}, author = {Fan Li and Qian Mao and Chin-Chen Chang}, year = {2016}, url = {http://ijns.femto.com.tw/contents/ijns-v18-n3/ijns-2016-v18-n3-p410-419.pdf}, researchr = {https://researchr.org/publication/LiMC16}, cites = {0}, citedby = {0}, journal = {I. J. Network Security}, volume = {18}, number = {3}, pages = {410-419}, }