Perbaikan Deteksi Watermark Dengan Knn Pada Penyembunyian Data Berbasiskan Histogram- Based Reversible Data Hiding
References
N. Bhargava, M. M. Sharma, A. S. Garhwal, and
M. Mathuria,
based on digital watermarking,= 2012 Int. Conf.
Radar, Commun. Comput. ICRCC 2012, pp. 185-
, 2012, doi: 10.1109/ICRCC.2012.6450573.
A. Ghifari,
Watermarking Menggunakan Histogram-Based
Reversible Data Hiding Dengan Border Point dan
Localization= Analysis And Implementation of
Image Watermarking Using Histogram-Based
Reversible Data Hiding With Border Point And
Local,= pp. 1-7.
K. S. R. Murthy and V. M. Manikandan,
Histogram Shifting based Reversible Data
Hiding Scheme with Overflow Handling,= 2020
th Int. Conf. Comput. Commun. Netw. Technol.
ICCCNT 2020, pp. 11-16, 2020, doi:
1109/ICCCNT49239.2020.9225552.
P. Rahmani and G. Dastghaibyfard,
data hiding scheme based on prediction-error
expansion using pixel-based pixel value ordering
predictor,= 19th CSI Int. Symp. Artif. Intell. Signal
Process. AISP 2017, vol. 2018-Janua, pp. 219-223,
, doi: 10.1109/AISP.2017.8324085.
K. Subramanian and S. Vairachilai,
data hiding in digital image,= Int. J. Eng. Adv.
Technol., vol. 8, no. 6 Special Issue 3, pp. 2132-
, 2019, doi: 10.35940/ijeat.F1387.0986S319.
R. Thabit and B. E. Khoo,
authentication using SLT and IWT schemes,=
Multimed. Tools Appl., vol. 76, no. 1, pp. 309-332,
, doi: 10.1007/s11042-015-3055-x.
H. Golpira and H. Danyali,
image watermarking based on wavelet histogram
shifting,= Imaging Sci. J., vol. 59, no. 1, pp. 49-59,
, doi: 10.1179/136821910X12863758415720.
A. Kala,
Integer Wavelet Domain using SVD,= Int. J. Comput. Sci. Eng., vol. 2, no. 02, pp. 30-35, 2013
Z. Ni, Y. Q. Shi, N. Ansari, and W. Su,
data hiding,= IEEE Trans. Circuits Syst. Video
Technol., vol. 16, no. 3, pp. 354-361, 2006, doi:
1109/TCSVT.2006.869964.
N. K. Chen, C. Y. Su, C. Y. Shih, and Y. T. Chen,
histogram shifting with location map reduction,=
Proc. IEEE Int. Conf. Ind. Technol., vol. 2016-May,
pp. 792-797, 2016, doi:
1109/ICIT.2016.7474852.
R. J. Ramteke and K. M. Y,
Image Classification and Abnormality Detection
Using K- Nearest Neighbour,= Int. J. Adv. Comput.
Res., vol. 2, no. 4, pp. 190-196, 2012
C. Sreevidhya, M. Kumar, and K. Ilango,
and Implementation of Non-Intrusive Load
Monitoring using Machine Learning Algorithm for
Appliance Monitoring,= IEEE Int. Conf. Intell.
Tech. Control. Optim. Signal Process. INCOS 2019,
pp. 1-6, 2019, doi:
1109/INCOS45849.2019.8951312.