J Wang, J Ni - … Workshop on Information Forensics and Security …, 2013 - ieeexplore.ieee.org
As a typical reversible data hiding scheme, the performance of histogram shifting (HS) technique is dependent on the selected side information, ie, peak and zero bins. Due to the …
W Puech, M Chaumont… - … , and watermarking of …, 2008 - spiedigitallibrary.org
Since several years, the protection of multimedia data is becoming very important. The protection of this multimedia data can be done with encryption or data hiding algorithms. To …
NK Sao, NN Hoa, P Van At - Journal of Computer Science and Cybernetics, 2020 - vjs.ac.vn
This paper presents a new effective reversible data hiding method based on pixel-value- ordering (iGePVO-K) which is improvement of a recent GePVO-K method that recently is …
R Liu, R Ni, Y Zhao - Signal and Information Processing …, 2014 - ieeexplore.ieee.org
Reversible data hiding recovers the original image from the stego-image without distortion after data extraction. In this paper, we propose a novel reversible data hiding method based …
V Agham, T Pattewar - … on Issues and Challenges in Intelligent …, 2014 - ieeexplore.ieee.org
Internet is the most popular communication medium now a days but message communication over the internet is facing some problem such as data security, copyright …
J Jeong - Digital consumer electronics handbook, 1997 - dl.acm.org
The JPEG standard | Digital consumer electronics handbook skip to main content ACM Digital Library home ACM home Google, Inc. (search) Advanced Search Browse About Sign in …
XZ Xie, CC Chang, CC Lin - IEEE Access, 2019 - ieeexplore.ieee.org
This paper proposed a high capacity reversible data hiding (RDH) scheme using three steganographic images, on which three successive embedding phases are performed. An …
J Yin, R Wang, Y Guo, F Liu - … , IWDW 2016, Beijing, China, September 17 …, 2017 - Springer
Currently JPEG is the most popular image file format and the majority of images are stored in JPEG format due to storage constraint. Recently, reversible data hiding (RDH) for JPEG …
CC Tseng, YH Chiu, YC Chou - 2015 International Conference …, 2015 - ieeexplore.ieee.org
In recent years, much research has been focused on the delivery of secret data in communications networks. Steganography is commonly used to ensure the successful …