2020
DOI: 10.1109/access.2020.2980302
|View full text |Cite
|
Sign up to set email alerts
|

A High-Embedding Efficiency RDH in Encrypted Image Combining MSB Prediction and Matrix Encoding for Non-Volatile Memory-Based Cloud Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…It is a new field of integrated multidisciplinary theory and technology. The main methods include hiding data in the spatial domain [6]- [8], frequency domain [9]- [13], and encryption domain [14]- [16].…”
Section: Introductionmentioning
confidence: 99%
“…It is a new field of integrated multidisciplinary theory and technology. The main methods include hiding data in the spatial domain [6]- [8], frequency domain [9]- [13], and encryption domain [14]- [16].…”
Section: Introductionmentioning
confidence: 99%
“…The visual traits of the cover image after direct decryption is good in [ 43 ] and [ 36 ]. This is not the case with others, unlike [ 44 ], the proposed scheme generates an error map that is self-embedded after encryption to support recovery.…”
Section: Comparison With Other Rdh Schemesmentioning
confidence: 83%
“…Similarly, the proposed scheme and others are completely reversible without any recovery loss. There are schemes that do not reserve room prior to the embedding of the additional information like [ 33 , 35 , 37 , 43 , 44 ], while others, unlike the proposed scheme reserves room. The visual traits of the cover image after direct decryption is good in [ 43 ] and [ 36 ].…”
Section: Comparison With Other Rdh Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…In reversible information hiding, the recipient can restore the original carrier losslessly after extracting the secret data embedded by the sender, while after irreversible information hiding, one cannot restore the original carrier. Based on these two categories of information hiding methods, it can be subdivided into the following four types: information hiding based on spatial domain [6] [7] [8] [9] [10] [11] [12], information hiding based on frequency domain [13] [14] [15], information hiding based on encryption domain [16] [17] [18] [19], and information hiding based on compressed domain [20] [21].…”
Section: Introductionmentioning
confidence: 99%