Results 11 to 20 of about 24,642,685 (320)

Quantum Data Hiding [PDF]

open access: yesIEEE Transactions on Information Theory, 2001
We expand on our work on Quantum Data Hiding -- hiding classical data among parties who are restricted to performing only local quantum operations and classical communication (LOCC).
DiVincenzo, David P.   +2 more
core   +4 more sources

A Reversible Data Hiding Method in Encrypted Images for Controlling Trade-Off between Hiding Capacity and Compression Efficiency [PDF]

open access: yesJournal of Imaging, 2021
In this paper, we propose a new framework for reversible data hiding in encrypted images, where both the hiding capacity and lossless compression efficiency are flexibly controlled.
Ryota Motomura   +2 more
doaj   +2 more sources

An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu [PDF]

open access: yesSensors, 2020
The massive Internet of Things (IoT) connecting various types of intelligent sensors for goods tracking in logistics, environmental monitoring and smart grid management is a crucial future ICT.
Ji-Hwei Horng   +3 more
doaj   +2 more sources

Separable reversible data hiding by vacating room after encryption using encrypted pixel difference [PDF]

open access: yesScientific Reports
As the number of people using the Internet has increased, more information is stored and accessible daily. As a result, the requirement for information security also grows. In the early stages of data security, cryptography is used.
Veeramuthu Venkatesh   +4 more
doaj   +2 more sources

High-Capacity Reversible Data Hiding in Encrypted Images with Flexible Restoration [PDF]

open access: yesJournal of Imaging, 2022
In this paper, we propose a novel reversible data hiding in encrypted images (RDH-EI) method that achieves the highest hiding capacity in the RDH-EI research field and full flexibility in the processing order without restrictions. In the previous work in
Eichi Arai, Shoko Imaizumi
doaj   +2 more sources

Adversarial Data Hiding in Digital Images [PDF]

open access: yesEntropy, 2022
In recent studies of generative adversarial networks (GAN), researchers have attempted to combine adversarial perturbation with data hiding in order to protect the privacy and authenticity of the host image simultaneously.
Dan Wang, Ming Li, Yushu Zhang
doaj   +2 more sources

High-Payload Data-Hiding Method for AMBTC Decompressed Images [PDF]

open access: yesEntropy, 2020
Data hiding is the art of embedding data into a cover image without any perceptual distortion of the cover image. Moreover, data hiding is a very crucial research topic in information security because it can be used for various applications.
Jung-Yao Yeh   +3 more
doaj   +2 more sources

Reversible data hiding: Advances in the past two decades

open access: yesIEEE Access, 2016
In the past two decades, reversible data hiding (RDH), also referred to as lossless or invertible data hiding, has gradually become a very active research area in the field of data hiding.
Yun-Qing Shi   +4 more
doaj   +3 more sources

Data hiding in encryption–compression domain

open access: yesComplex & Intelligent Systems, 2021
This paper introduces a robust and secure data hiding scheme to transmit grayscale image in encryption-then-compression domain. First, host image is transformed using lifting wavelet transform, Hessenberg decomposition and redundant singular value ...
O. P. Singh, A. K. Singh
doaj   +2 more sources

Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography [PDF]

open access: yesIEEE Transactions on Computational Social Systems, 2021
The advancement of secure communication and identity verification fields has significantly increased through the use of deep learning techniques for data hiding.
Zihan Wang   +7 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy