R Anushiadevi, P Praveenkumar… - Journal of Intelligent …, 2020 - content.iospress.com
Digital image steganography algorithms usually suffer from a lossy restoration of the cover content after extraction of a secret message. When a cover object and confidential …
FS Hassan, A Gutub - Journal of King Saud University-Computer and …, 2022 - Elsevier
This paper proposed an innovative approach for reversible data hiding (RDH) within images in such a way that the image can be accurately recovered after extracting the data. The work …
AG Chefranov, G Öz - Journal of Information Security and Applications, 2022 - Elsevier
A new irreversible data hiding spatial domain method, A 2 MLSB, adaptive to pixel value (PV) and pixel value difference (PVD) using variable threshold on PV and PVD ranges, and …
CC Chang, YC Chou - Journal of Digital Information Management, 2008 - go.gale.com
The data hiding technique is used to hide a secret message into a cover image which is then sent to a receiver without raising any suspicions. With a reversible (lossless) data hiding …
YJ Lu, WL Lyu - 2015 8th International Conference on …, 2015 - ieeexplore.ieee.org
This paper proposes a novel reversible data-hiding scheme utilizing two steganographic images. The proposed method is able to hide more secret messages than other messages …
W Wang - Multimedia Tools and Applications, 2020 - Springer
After the extraction of hidden data, reversible data hiding (RDH) algorithms are able to completely recover the original image without any error. For the past few years, a number of …
PM Kumar, JA Renjith - International Journal of Electronic …, 2016 - inderscienceonline.com
In reversible compressed image data hiding, the exact cover image is restored at approximate efficient rate after extracting the secret data from the stego-image. The …
There have been discussed various data hiding methods which can embed the secret data in an image. However, the image gets destroyed after extraction of the secret data at the …
S Mukherjee, B Jana - International Journal of Natural Computing …, 2019 - igi-global.com
Data hiding techniques are very significant in the research area of information security. In this article, the authors propose a new reversible data hiding (RDH) scheme using …