Block-based reversible data embedding

JY Hsiao, KF Chan, JM Chang - Signal Processing, 2009 - Elsevier
This paper proposes a block-based reversible data embedding method applied to grayscale
cover images. The image is first divided into two areas: data embedding area and auxiliary …

Recovery based high capacity reversible data hiding scheme using even-odd embedding

A Malik, S Singh, R Kumar - Multimedia Tools and Applications, 2018 - Springer
There have been discussed various data hiding methods which can embed the secret data
in an image. However, the image gets destroyed after extraction of the secret data at the …

A high capacity reversible watermarking approach for authenticating images: exploiting down-sampling, histogram processing, and block selection

A Khan, SA Malik - Information Sciences, 2014 - Elsevier
Amongst the various data hiding schemes, lossless data hiding has achieved substantial
attention in the recent years. Lossless watermarking also known as reversible watermarking …

A parallel identification protocol for RFID systems

L Kong, L He, Y Gu, MY Wu, T He - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
Nowadays, RFID systems have been widely deployed for applications such as supply chain
management and inventory control. One of their most essential operations is to swiftly …

A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography

MS Wang, WC Chen - Computer Standards & Interfaces, 2009 - Elsevier
In this paper, a novel copyright protection scheme that combines the discrete wavelet
transform (DWT) and the singular value decomposition (SVD) is proposed. Instead of …

Tailored reversible watermarking schemes for authentication of electronic clinical atlas

F Bao, RH Deng, BC Ooi, Y Yang - IEEE Transactions on …, 2005 - ieeexplore.ieee.org
It is accepted that digital watermarking is quite relevant in medical imaging. However, due to
the special nature of clinical practice, it is often required that watermarking not introduce …

Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold

OM Al-Qershi, BE Khoo - Signal Processing, 2013 - Elsevier
Fragile watermarking is commonly used for content authentication and tamper detection in
digital multimedia. For some critical applications, such as medical systems, the fragile …

A reversible data hiding algorithm based on bidirectional difference expansion

W Wang - Multimedia Tools and Applications, 2020 - Springer
After the extraction of hidden data, reversible data hiding (RDH) algorithms are able to
completely recover the original image without any error. For the past few years, a number of …

Robust lossless data hiding using clustering and statistical quantity histogram

L An, X Gao, Y Yuan, D Tao - Neurocomputing, 2012 - Elsevier
Lossless data hiding methods usually fail to recover the hidden messages completely when
the watermarked images are attacked. Therefore, the robust lossless data hiding (RLDH), or …

Robust reversible image watermarking scheme based on spread spectrum

Z Huang, B Feng, S Xiang - Journal of Visual Communication and Image …, 2023 - Elsevier
Robust reversible watermarking can provide robustness against various attacks besides the
ability to recover the cover image. However, robustness and reversibility are somewhat …