2023
DOI: 10.3390/electronics12153245
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive 3D Reversible Data Hiding Technique Based on the Cumulative Peak Bins in the Histogram of Directional Prediction Error

Abstract: Reversible data hiding (RDH) is crucial in modern data security, ensuring confidentiality and tamper-proofness in various industries like copyright protection, medical imaging, and digital forensics. As technology advances, RDH techniques become essential, but the trade-off between embedding capacity and visual quality must be heeded. In this paper, the relative correlation between the pixel’s local complexity and its directional prediction error is employed to enhance an efficient RDH without using a location… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 43 publications
(72 reference statements)
0
2
0
Order By: Relevance
“…Researchers in the literature have proposed various steganography techniques, including cryptographic-based, perception-based, least significant bit LSB-based, histogram-based, and feature extraction-based [1]- [3], [11], [12]. Each technique has its own strengths and weaknesses, and the choice of technique depends on the specific application requirements and constraints.…”
Section: Bulletin Of Electr Eng and Infmentioning
confidence: 99%
See 1 more Smart Citation
“…Researchers in the literature have proposed various steganography techniques, including cryptographic-based, perception-based, least significant bit LSB-based, histogram-based, and feature extraction-based [1]- [3], [11], [12]. Each technique has its own strengths and weaknesses, and the choice of technique depends on the specific application requirements and constraints.…”
Section: Bulletin Of Electr Eng and Infmentioning
confidence: 99%
“…However, the openness of the internet and communication networks requires robust techniques to protect the transferred digital information from intrusion or destruction, copying or modification, and assurance that the data are protected from intruders and hackers and are correctly delivered to recipients. Individuals try to keep their messages safe by using more advanced steganography techniques than traditional cryptographic methods or by combining traditional cryptographic methods with steganography techniques [1]- [3]. Steganography makes use of the hidden message's appearance to enhance the performance of the communication channel, which allows important digital information to be hidden within a spoof carrier image in such a way that the modifications are imperceptible to some degree.…”
Section: Introductionmentioning
confidence: 99%