2016
DOI: 10.1007/s11042-016-3591-z
|View full text |Cite
|
Sign up to set email alerts
|

An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(11 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…The average PSNR was 51.157 dB when the embedding rate was 1 bit per grayscale pixel and the average PSNR was 31.847 dB when the embedding rate was 4 bpp with good security and absence of overflow/underflow. In 2017, Lee et al proposed an REMD [8] method using image interpolation and edge detection that achieved an embedding capacity of 3.01 bpp with an average image quality of 33 dB.…”
Section: The Emd Embedding Methods and The Emd Extensionsmentioning
confidence: 99%
See 1 more Smart Citation
“…The average PSNR was 51.157 dB when the embedding rate was 1 bit per grayscale pixel and the average PSNR was 31.847 dB when the embedding rate was 4 bpp with good security and absence of overflow/underflow. In 2017, Lee et al proposed an REMD [8] method using image interpolation and edge detection that achieved an embedding capacity of 3.01 bpp with an average image quality of 33 dB.…”
Section: The Emd Embedding Methods and The Emd Extensionsmentioning
confidence: 99%
“…The experimental results showed that Lee and Chen's scheme achieved a high embedding capacity and a low distortion. In 2017, Lee et al proposed an REMD [8] method using image interpolation and edge detection that achieved an embedding capacity of 3.01 bpp with an average image quality of 33 dB.…”
Section: Introductionmentioning
confidence: 99%
“…For Lena image, the payload and quality through Jana [6] scheme were 130,000 bits and 50.60 PSNR dB respectively. Some researcher has been focused on interpolation based data hiding techniques [2,10,12,15,16,18,29,[32][33][34][35][36][37]. [23] and [3] are focused on watermarking and image authentication based data hiding techniques respectively.…”
Section: Introductionmentioning
confidence: 99%
“…A solution to these problems is to employ a data hiding method, in which secret data are embedded into a digital media to cover the presence of embedment, or to protect the transmitted contents. Data hiding methods for images can be classified into irreversible [1][2][3] and reversible [4][5][6][7] methods. The cover images of both methods are distorted to obtain stego images.…”
Section: Introductionmentioning
confidence: 99%
“…The difference expansion scheme proposed by Tian [8] and the histogram shifting scheme proposed by Ni et al [9] are two well-known methods of this type. Many recent works [4][5][6][7] have exploited the merits of [8,9] to propose improved methods with better embedding efficiency. In contrast, compressed domain methods modify the coefficients of compressed codes [10], or use the joint neighborhood coding (JNC) [11] scheme to embed data bits into the compressed code stream.…”
Section: Introductionmentioning
confidence: 99%