 J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.
 Z. Ni, Y. Q. Shi, N. Ansari, and S.Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362,Mar. 2006.
 G.Xuan,Y.Q.Shi,C.Y.Yang,Y. Z. Zheng, D. K.Zou, and P. Q. Chai, “Lossless data hiding using integer wavelet transform and thresholdembedding technique,” in Proc. Int. Conf.Multimedia and Expo, 2005, pp. 1520–1523.
 D.M. Thodi and J. J. Rodriquez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16,no. 3, pp. 721–730, Mar. 2007.
 Y. Hu, H.K. Lee, and J. Li, “DEbased reversible data hiding with improved overflow location map,” IEEE Trans. Circuits Syst. VideoTechnol., vol. 19, no. 2, pp. 250–260, Feb. 2009.
 G. Coatrieux, C. Le Guillou, J.M. Cauvin, and C. Roux, “Reversible watermarking for knowledge digest embedding and reliabilitycontrol in medical images,” IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 2, pp. 158–165, Mar. 2009.
 F. Bao, R. H. Deng,B.C.Ooi, andY. Yang, “Tailored reversible watermarking schemes for authentication of electronic clinical atlas,”IEEE Trans. Inf. Technol. Biomed., vol. 9, no. 4, pp. 554–563, Dec. 2005.
 H. M. Chao, C. M. Hsu, and S. G. Miaou, “A datahidding technique with authentication, integration, and confidentiality for electronicpatient records,” IEEE Trans. Inf. Technol. Biomed., vol. 6, no. 1, pp. 46–53, Mar. 2002.
 L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, “Reversible image watermarking using interpolation technique,” IEEE Trans. Inf.Forensics Security, vol. 5, no. 1, pp. 187–193, Mar. 2010.
 D. Coltuc, “Improved embedding for predictionbased reversible watermarking,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp.873–882, Sep. 2011.
 C. C. Lin, W. L. Tai, and C. C. Chang, “Multilevel reversible data hiding based on histogram modification of difference images,” PatternRecognit., vol. 41, pp. 3582–3591, 2008.
 C. H.YangandM.H. Tsai, “Improving histogrambased reversible data hiding by interleaving predictions,” IET Image Process., vol. 4, no.4, pp. 223–234, Aug. 2010.
 C. De Vleeschouwer, J.F. Delaigle, and B. Macq, “Circular interpretation of bijective transformations in lossless watermarking for mediaasset management,” IEEE Trans.Multimedia, vol. 5, no. 1, pp. 97–105, Mar. 2003.
 D. Coltuc and J.M. Chassery, “Distortionfree robust watermarking: A case study,” in Proc. Security, Steganography, and Watermarkingof Multimedia Contents IX, San Jose, CA, 2007, p. 65051N8.
 V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans.Circuit Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul. 2009.
 H. J. Hwang, H. J. Kim, V. Sachnev, and S. H. Joo, “Reversible watermarking method using optimal histogram pair shifting based onprediction and sorting,” KSII, Trans. Internet Inform. Syst., vol. 4, no. 4, pp. 655–670, Aug. 2010.
