2018
DOI: 10.12720/jcm.13.6.325-332
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Pixel Value Grouping for Protecting Secret Data in Public Computer Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…It shows that our method outperforms that of [17] in all test images. For method in [18], our method is better for medical images (i.e. Abdominal, Hand, Head, and Leg).…”
Section: Quality and Capacity Of Stego Imagementioning
confidence: 94%
See 1 more Smart Citation
“…It shows that our method outperforms that of [17] in all test images. For method in [18], our method is better for medical images (i.e. Abdominal, Hand, Head, and Leg).…”
Section: Quality and Capacity Of Stego Imagementioning
confidence: 94%
“…Abdominal, Hand, Head, and Leg). This happens because in [17], there is no block selection before embedding the data; while in [18], pixel grouping is implemented for embedding the data. This method is suitable in non-medical images but does not give significant effect in the smoother carrier images, such as medical images.…”
Section: Quality and Capacity Of Stego Imagementioning
confidence: 99%
“…A histogram is used as a reference for the embedding phase, or the PE histogram can provide a higher number of pixel frequencies. This method is also used and further refined in [18][19][20]. Rad et al [21] then established a checkerboard predictor (CBP).…”
Section: Related Workmentioning
confidence: 99%
“…The main weakness in the HS scheme can be eliminated because the PE histogram is able to produce a histogram with a higher number of frequencies. This scheme is further developed in [14][15][16].…”
Section: Related Workmentioning
confidence: 99%
“…The process of embedding the last bit of secret data can be described by using Eq. (14). The location of PE value is also stored using Eq.…”
Section: Histogram Modificationmentioning
confidence: 99%