Reversible data hiding (RDH) has developed various theories and algorithms since the early 1990s. The existing works involve a large amount of specialized knowledge, making it …
Z Hua, X Liu, Y Zheng, S Yi… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud service is a natural choice to store and manage the exponentially produced images. Data privacy is one of the most concerned points in cloud-based image services. Reversible …
Z Fu, X Chai, Z Tang, X He, Z Gan, G Cao - Signal Processing, 2024 - Elsevier
Reversible data hiding in encrypted image (RDHEI) has received wide attention as an effective information protection technique, and most of the existing RDHEI schemes …
People are increasingly storing their images on the cloud as cloud storage grows in popularity, delivering a variety of benefits. However, the associated privacy concern may …
Y Lu, M Gong, Z Gan, X Chai, L Cao, B Wang - Chaos, Solitons & Fractals, 2023 - Elsevier
As the digital age progresses, 3D models have become increasingly popular in various fields, such as medicine, engineering, and the metaverse. One of the main benefits of using …
C Yu, X Zhang, C Qin, Z Tang - IEEE Transactions on Circuits …, 2023 - ieeexplore.ieee.org
Reversible data hiding in encrypted images (RDHEI) is an essential data security technique. Most RDHEI methods cannot perform well in embedding capacity and security. To address …
Y Yao, K Wang, Q Chang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recently, reversible data hiding in encrypted images (RDHEI) has received widespread attention from researchers. To embed high payload into encrypted images while maintaining …
Z Hua, Z Wang, Y Zheng, Y Chen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Cloud computing offers advantages in handling the exponential growth of images but also entails privacy concerns on outsourced private images. Reversible data hiding (RDH) over …
Challenge-response authentication is an essential and omnipresent network service. Thus, it is a lucrative target for attackers to transport covert information. We present two covert …