There have been discussed various data hiding methods which can embed the secret data in an image. However, the image gets destroyed after extraction of the secret data at the …
A Khan, SA Malik - Information Sciences, 2014 - Elsevier
Amongst the various data hiding schemes, lossless data hiding has achieved substantial attention in the recent years. Lossless watermarking also known as reversible watermarking …
Nowadays, RFID systems have been widely deployed for applications such as supply chain management and inventory control. One of their most essential operations is to swiftly …
In this paper, a novel copyright protection scheme that combines the discrete wavelet transform (DWT) and the singular value decomposition (SVD) is proposed. Instead of …
It is accepted that digital watermarking is quite relevant in medical imaging. However, due to the special nature of clinical practice, it is often required that watermarking not introduce …
Fragile watermarking is commonly used for content authentication and tamper detection in digital multimedia. For some critical applications, such as medical systems, the fragile …
W Wang - Multimedia Tools and Applications, 2020 - Springer
After the extraction of hidden data, reversible data hiding (RDH) algorithms are able to completely recover the original image without any error. For the past few years, a number of …
L An, X Gao, Y Yuan, D Tao - Neurocomputing, 2012 - Elsevier
Lossless data hiding methods usually fail to recover the hidden messages completely when the watermarked images are attacked. Therefore, the robust lossless data hiding (RLDH), or …
Z Huang, B Feng, S Xiang - Journal of Visual Communication and Image …, 2023 - Elsevier
Robust reversible watermarking can provide robustness against various attacks besides the ability to recover the cover image. However, robustness and reversibility are somewhat …