Continuous technological progressions and huge investments are made for the realization of the various goals in the Internet of Things (IoT) driven networks. Internet of Medical Things …
W Qi, T Zhang, X Li, B Ma, Z Guo - Signal Processing, 2023 - Elsevier
Prediction-error expansion (PEE) is the most widely investigated reversible data hiding (RDH) framework. However, the performance of PEE can be further improved since the …
C Yu, X Zhang, D Wang, Z Tang - Signal Processing, 2022 - Elsevier
Reversible data hiding (RDH) is an important topic of data hiding. In this paper, we exploit pixel-based pixel value ordering prediction (PPVO) and pairwise prediction-error expansion …
Y Wu, R Hu, S Xiang - … on Circuits and Systems for Video …, 2023 - ieeexplore.ieee.org
Pixel-value-ordering (PVO) is one of the most popular methods in reversible data hiding (RDH). In PVO based methods, pixels are processed in a block-wise way, so that the local …
J Hou, B Ou, H Tian, Z Qin - Signal Processing: Image Communication, 2021 - Elsevier
In the previous multiple histograms modification (MHM) based reversible data hiding (RDH) method, the prediction-error histograms are generated by a fixed manner, which may …
R Hu, S Xiang - Signal Processing, 2021 - Elsevier
In this paper, we propose a lossless robust watermarking method by using the polar harmonic transform with reversible and robust watermarking techniques. Firstly, a new …
B Ou, Y Zhao - IEEE Transactions on Circuits and Systems for …, 2019 - ieeexplore.ieee.org
Among various techniques of reversible data hiding (RDH), histogram modification has been mostly investigated and used in practice. Recently, a new histogram modification technique …
A Mehbodniya, BK Douraki, JL Webber, HA Alkhazaleh… - Processes, 2022 - mdpi.com
Researchers have scrutinized data hiding schemes in recent years. Data hiding in standard images works well, but does not provide satisfactory results in distortion-sensitive medical …
A Jose, K Subramaniam - IET Image Processing, 2020 - Wiley Online Library
The data hiding method embeds the data into covers such as video, audio, and images, which are used for integrity authentication, media protection, communication covert …