SI Rosaline, C Rengarajaswamy - … International Conference on …, 2013 - ieeexplore.ieee.org
Reversible Data Hiding (RDH) Technique aims in recovering back the original content from the marked media. The original image is desirable in some applications. Thus, RDH plays a …
C Gayathri, P Karthigaikumar - 2014 International Conference …, 2014 - ieeexplore.ieee.org
In this paper, a novel approach of reversible data hiding (RDH) technique is used to embed additional information in the encrypted images is introduced. Since it maintains the excellent …
P Roshni, A Durvesh, P Urvisha - … International Conference on …, 2015 - ieeexplore.ieee.org
The concept presents an idea to embed data in an encrypted image by using an irreversible approach of data hiding or data hiding, aimed at secretly embedding a message into the …
C Rengarajaswamy, KV Murugan - … Conference on Emerging …, 2013 - ieeexplore.ieee.org
A novel technique for Separable Reversible Data Hiding on Encrypted and transform-based compressed image is proposed. Reversible Data Hiding is the method of hiding data inside …
P Jagtap, A Joshi, S Vyas - IARJSET, 2015 - academia.edu
The following paper proposes a novel scheme of data hiding in encrypted images based on lossless compression of encrypted data. In encryption phase, the original content is …
AK Chaturvedi, PK Shukla - International Journal of …, 2017 - pdfs.semanticscholar.org
In this paper, we present a review work on reversible data hiding in images which deals with secure multimedia data and its authenticity. The purpose of preserving content and …
S Yi, Y Zhou, CM Pun, CLP Chen - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
This paper introduces a new reversible data hiding algorithm in the encryption domain. It integrates data hiding into the image encryption process to achieve different level of access …
R Motomura, S Imaizumi, H Kiya - Journal of Imaging, 2021 - mdpi.com
In this paper, we propose a new framework for reversible data hiding in encrypted images, where both the hiding capacity and lossless compression efficiency are flexibly controlled …
B Yang, C Busch, X Niu - Media Forensics and Security II, 2010 - spiedigitallibrary.org
Image encryption process is jointed with reversible data hiding in this paper, where the data to be hided are modulated by different secret keys selected for encryption. To extract the …