Results 1 to 10 of about 102,340 (326)

A Reversible Data Hiding Method in Encrypted Images for Controlling Trade-Off between Hiding Capacity and Compression Efficiency [PDF]

open access: yesJournal of Imaging, 2021
In this paper, we propose a new framework for reversible data hiding in encrypted images, where both the hiding capacity and lossless compression efficiency are flexibly controlled.
Ryota Motomura   +2 more
doaj   +2 more sources

Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding [PDF]

open access: yesProceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
This paper presents a novel reversible data hiding (RDH) algorithm for gray-scaled images, in which the prediction-error of prediction error (PPE) of a pixel is used to carry the secret data.
Shi, Yun-Qing   +2 more
core   +2 more sources

Separable reversible data hiding by vacating room after encryption using encrypted pixel difference [PDF]

open access: yesScientific Reports
As the number of people using the Internet has increased, more information is stored and accessible daily. As a result, the requirement for information security also grows. In the early stages of data security, cryptography is used.
Veeramuthu Venkatesh   +4 more
doaj   +2 more sources

Reversible Data Hiding Based on DNA Computing. [PDF]

open access: yesComput Intell Neurosci, 2017
Biocomputing, especially DNA, computing has got great development. It is widely used in information security. In this paper, a novel algorithm of reversible data hiding based on DNA computing is proposed. Inspired by the algorithm of histogram modification, which is a classical algorithm for reversible data hiding, we combine it with DNA computing to ...
Wang B, Xie Y, Zhou S, Zhou C, Zheng X.
europepmc   +4 more sources

Content-Adaptive Reversible Data Hiding with Multi-Stage Prediction Schemes [PDF]

open access: yesSensors
With the proliferation of image-capturing and display-enabled IoT devices, ensuring the authenticity and integrity of visual data has become increasingly critical, especially in light of emerging cybersecurity threats and powerful generative AI tools ...
Hsiang-Cheh Huang   +2 more
doaj   +2 more sources

Reversible data hiding and authentication scheme for encrypted image based on prediction error compression [PDF]

open access: yesScientific Reports
In the most existing reversible data hiding schemes for encrypted images, cover images can be reversibly recovered, but the integrity of image content cannot be guaranteed.
Fang Ren   +4 more
doaj   +2 more sources

High Capacity Reversible Data Hiding Algorithm for Audio Files Based on Code Division Multiplexing [PDF]

open access: yesJisuanji kexue, 2021
Aiming at the problem of small embedding capacity and low security of reversible data hiding algorithm for audio files,a reversible data hiding(RDH) algorithm for audio files based on code division multiplexing(CDM) is proposed in this paper.The ...
MA Bin, HOU Jin-cheng, WANG Chun-peng, LI Jian, SHI Yun-qing
doaj   +1 more source

Bi-histogram Shifting Reversible Data Hiding Method After Compressed Differences [PDF]

open access: yesJisuanji kexue, 2022
Reversible data hiding(RDH) based on histogram shifting(HS) is the most common technology in current information hiding,especially for the combined method of difference extension and histogram shifting,which can achieve high embedding capacity and low ...
HAO Jie, PING Ping, FU De-yin, ZHAO Hong-ze
doaj   +1 more source

Local-Moment-Driven Robust Reversible Data Hiding

open access: yesApplied Sciences, 2022
In this paper, a local-moment-driven robust reversible data hiding (LM-RRDH) scheme is proposed, which can provide security to hidden messages against unintentional modifications.
Yash Veer Singh   +3 more
doaj   +1 more source

Multi-Level Reversible Data Anonymization via Compressive Sensing and Data Hiding

open access: yesIEEE Transactions on Information Forensics and Security, 2021
Recent advances in intelligent surveillance systems have enabled a new era of smart monitoring in a wide range of applications from health monitoring to homeland security.
Mehmet YamaƧ   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy