Results 281 to 290 of about 21,227 (324)
Some of the next articles are maybe not open access.
Secure data transmission through reversible data hiding
2016 Online International Conference on Green Engineering and Technologies (IC-GET), 2016Data hacking is very difficult to deal with today's electronic world. There are large numbers of technique used, for the secure communication of data. Images are widely used in different-different processes. So data hiding is used in the encrypted image, but the main problem is that distortion at the time of data extraction.
Linnet Tomy, null Namitha T N
openaire +1 more source
Survey on reversible data hiding techniques
2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS), 2016Data transmissions using computer networks has created the need for security. Many robust message encryption techniques have been developed to supply this demand. Steganography is one form of cryptography where we hide data within large texts or images.
null Rathika R, S. Kumaresan
openaire +1 more source
Optimal PPVO-based reversible data hiding
Journal of Visual Communication and Image Representation, 2017Abstract The optimal PPVO-based reversible data hiding (RDH) including adaptive prediction pattern and optimal bin selection is proposed in this paper. By reasonably designing the prediction pattern, each to-be-embedded pixel can be predicted by the n ( n ∈ { 4 , … , 13 } ) neighbors surrounding it.
Shaowei Weng +3 more
openaire +1 more source
Reversible Data Hiding for Video
2018Difference expansion (DE) and histogram modification (HM) are efficient ways for reversible data hiding (RDH) into digital video. In most occasions, the reversibility of an algorithm cannot be confirmed until the data extracting experiments have been carried out, it means the design of a reversible data hiding algorithm lacks theoretical guidance.
Dong Li +3 more
openaire +1 more source
Improved PVO-based reversible data hiding
Digital Signal Processing, 2014This work extends a recently proposed reversible data hiding (RDH) scheme of Li et al. which is based on pixel-value-ordering and prediction-error expansion. In Li et al.?s method, the maximum and minimum of a pixel block are predicted and modified to embed data.
Fei Peng, Xiaolong Li, Bin Yang
openaire +1 more source
2005
This paper presents a novel reversible data hiding algorithm, which can recover the original image without distortion from the marked image after the hidden data have been extracted. This algorithm utilizes the zero or the minimum point of the histogram and slightly modifies the pixel values to embed data.
openaire +1 more source
This paper presents a novel reversible data hiding algorithm, which can recover the original image without distortion from the marked image after the hidden data have been extracted. This algorithm utilizes the zero or the minimum point of the histogram and slightly modifies the pixel values to embed data.
openaire +1 more source
Dual-JPEG-image reversible data hiding
Information Sciences, 2021zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yao, Heng +3 more
openaire +1 more source
Histogram-Based Reversible Data Hiding
2010This paper presents a novel histogram-based reversible data hiding technique to embed secret data into gray-scale host image. This method utilizes the difference of the pixel values of the host image and the zero or the minimum points of the histogram of the difference image and modifies the pixel grayscale values slightly to embed secret data into ...
Masoumeh Khodaei, Karim Faez
openaire +1 more source
Adaptive reversible data hiding through autoregression
2012 IEEE International Conference on Information Science and Technology, 2012An adaptive reversible data hiding method through autoregression is presented in this paper. In the proposed algorithm, we focus on the image pixel value prediction, which plays a key role in the data embedding process. Unlike conventional data hiding techniques, a threshold is adjusted for each image to divide all pixels into two regions: the smooth ...
Jingyang Wen, Jinli Lei, Yi Wan
openaire +1 more source
2019
The chapter presents an application of reversible data hiding for the authentication of image travelling over a hostile and insecure communication channel. The reversible data resides in the image and tracks any changes done to it on a communication channel. The extraction of data and any modification to its structure reveals changes in the image. This
openaire +1 more source
The chapter presents an application of reversible data hiding for the authentication of image travelling over a hostile and insecure communication channel. The reversible data resides in the image and tracks any changes done to it on a communication channel. The extraction of data and any modification to its structure reveals changes in the image. This
openaire +1 more source

