2011
DOI: 10.3390/s111009717
|View full text |Cite
|
Sign up to set email alerts
|

Authenticity Preservation with Histogram-Based Reversible Data Hiding and Quadtree Concepts

Abstract: With the widespread use of identification systems, establishing authenticity with sensors has become an important research issue. Among the schemes for making authenticity verification based on information security possible, reversible data hiding has attracted much attention during the past few years. With its characteristics of reversibility, the scheme is required to fulfill the goals from two aspects. On the one hand, at the encoder, the secret information needs to be embedded into the original image by so… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 39 publications
(16 citation statements)
references
References 12 publications
0
16
0
Order By: Relevance
“…Finally, difference histogram corresponding to original image D(k) can be calculated with Eqs. (9) and (10). By adding back the difference values, original image X(i, j) can be recovered.…”
Section: Proposed Algorithm and One Examplementioning
confidence: 99%
See 1 more Smart Citation
“…Finally, difference histogram corresponding to original image D(k) can be calculated with Eqs. (9) and (10). By adding back the difference values, original image X(i, j) can be recovered.…”
Section: Proposed Algorithm and One Examplementioning
confidence: 99%
“…For intentionally altering the selected portion, the mean squared error (MSE) between original and marked image would be at most 1.0, leading to the peak signal-to-noise ratio (PSNR) of at least 48.13 dB [10,21]. Due to its simplicity in implementation, and the guaranteed output image quality, the histogram-based techniques are famous for these advantages.…”
Section: Techniques Based On Luminance and Difference Histogramsmentioning
confidence: 99%
“…This includes cryptography [15], steganography [12,25] and watermarking [9,10]. The former approach dealt with converting the original information into a unreadable form, whereas, the latter approaches are a kind of data hiding technique [17,18,32], where the secure information is hidden over the cover content.…”
Section: Introductionmentioning
confidence: 99%
“…Among them, most are for digital images in the plain text domain (e.g. [3][4][5][6][7][8][9][10][11][12][13][14]), and even in the encrypted domain (e.g. [15][16][17][18]).…”
Section: Introductionmentioning
confidence: 99%