Results 261 to 270 of about 102,340 (326)
Some of the next articles are maybe not open access.

Bit-Plane Based Reversible Data Hiding in Encrypted Images Using Multi-Level Blocking With Quad-Tree

IEEE transactions on multimedia
Reversible data hiding in encrypted images (RDHEI) has gained significant popularity among security and privacy researchers as well as users, because of its features such as reversibility, embedding capacity (EC), and security.
.. Ankur, Rajeev Kumar, Ajay K Sharma
semanticscholar   +1 more source

A High-Performance Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments

IEEE transactions on circuits and systems for video technology (Print)
Aiming at the problem of most Robust Reversible Data Hiding (RRDH) schemes failing to anti geometric deformation attacks, a new RRDH algorithm based on Polar Harmonic Fourier Moments (PHFMs) is presented in this paper, thereby enhancing both the ...
Bin Ma   +5 more
semanticscholar   +1 more source

Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing

IEEE transactions on circuits and systems for video technology (Print), 2022
Reversible data hiding in encrypted images (RDH-EIs) has attracted increasing attention since it can protect the privacy of original images while exactly extracting the embedded data.
Zhongyun Hua   +4 more
semanticscholar   +1 more source

Secure data transmission through reversible data hiding

2016 Online International Conference on Green Engineering and Technologies (IC-GET), 2016
Data hacking is very difficult to deal with today's electronic world. There are large numbers of technique used, for the secure communication of data. Images are widely used in different-different processes. So data hiding is used in the encrypted image, but the main problem is that distortion at the time of data extraction.
Linnet Tomy, null Namitha T N
openaire   +1 more source

Reversible Data Hiding in Encrypted Images With Adaptive Huffman Code Based on Dynamic Prediction Axes

IEEE transactions on multimedia
With the development of data security and privacy requirements in the field of cloud computing, Reversible Data Hiding in Encrypted Images (RDHEI) in encryption domain has received increasing attention.
Chi Ji, Guangyong Gao, Yunqing Shi
semanticscholar   +1 more source

Reversible Data Hiding in Palette Images

IEEE transactions on circuits and systems for video technology (Print), 2023
Reversible data hiding (RDH) has been investigated for over two decades. Depending on the application scenario, it can be divided into RDH and reversible data hiding in encrypted images (RDHEI).
Mingji Yu   +3 more
semanticscholar   +1 more source

Survey on reversible data hiding techniques

2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS), 2016
Data transmissions using computer networks has created the need for security. Many robust message encryption techniques have been developed to supply this demand. Steganography is one form of cryptography where we hide data within large texts or images.
null Rathika R, S. Kumaresan
openaire   +1 more source

A Survey on Reversible Data Hiding for Uncompressed Images

ACM Computing Surveys
Reversible data hiding (RDH) has developed various theories and algorithms since the early 1990s. The existing works involve a large amount of specialized knowledge, making it difficult for researchers, especially primary learners, to have a good ...
Cheng Zhang   +4 more
semanticscholar   +1 more source

Optimal PPVO-based reversible data hiding

Journal of Visual Communication and Image Representation, 2017
Abstract The optimal PPVO-based reversible data hiding (RDH) including adaptive prediction pattern and optimal bin selection is proposed in this paper. By reasonably designing the prediction pattern, each to-be-embedded pixel can be predicted by the n ( n ∈ { 4 , … , 13 } ) neighbors surrounding it.
Shaowei Weng   +3 more
openaire   +1 more source

Reversible Data Hiding Using GAN Based Image-Image Transformation

2024 5th International Conference on Circuits, Control, Communication and Computing (I4C)
Traditional Reversible Data Hiding (RDH) techniques modify the cover image, unavoidably leaving traces which can be easily analyzed and exploited by an adversary. Drawing inspiration from modifying cover steganography with Generative Adversarial Networks
G. R
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy