2019
DOI: 10.1007/s11042-019-07767-y
|View full text |Cite
|
Sign up to set email alerts
|

Difference expansion based reversible data embedding and edge detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…The third LSB 2 is served as the natural marker bit and the embedding strategy is determined by it. More specifically, when 2 = 0, the surrounding pixels of this block are partitioned into (4,4) groups to embed secret data; when 2 = 1, they are partitioned into (2,2,2,2) groups. In addition, the Data 1, Data 2, and Data 3 are three different random streams.…”
Section: Adaptive Methods Based On 2dand4d Flexible Magic Matrices Without Marker Bitmentioning
confidence: 99%
See 1 more Smart Citation
“…The third LSB 2 is served as the natural marker bit and the embedding strategy is determined by it. More specifically, when 2 = 0, the surrounding pixels of this block are partitioned into (4,4) groups to embed secret data; when 2 = 1, they are partitioned into (2,2,2,2) groups. In addition, the Data 1, Data 2, and Data 3 are three different random streams.…”
Section: Adaptive Methods Based On 2dand4d Flexible Magic Matrices Without Marker Bitmentioning
confidence: 99%
“…The difference between them is that the reversible hiding scheme can reconstruct the original cover image after secret data is extracted. Many successful reversible data hiding schemes have been proposed [1][2][3][4][5][6][7], including the difference expansion [3,4], the prediction error expansion (PEE) [5,6], the histogram shifting [8,9], the neural network [10][11][12] and so on. For instance, the prediction error expansion is first proposed by Thodi et al [13], which embeds the secret information by expanding the prediction errors obtained from the difference of original and predicted value of the target pixel.…”
Section: Introductionmentioning
confidence: 99%
“…Instead, other data hiding schemes embed secret messaves into the spatial domain, such as least significant bit (LSB) [8], [31], [32], pixel value differencing (PVD) [33], [34], histogram shifting [35], [36], [37], expansion based [38], [39], multiple bit-planes [40], [41]. These methods have higher embedding rates than frequency-domain based methods, but are usually less robust and less resistant to steganalysis [42], [43], [44], [45], [46].…”
Section: A Data Hiding Of Low Embedding Ratesmentioning
confidence: 99%
“…and b is called auxiliary information, among which a ∈ [1, 2n], the embedded y 1 and y 2 . e formula ( 2) is no longer satisfied [9].…”
Section: Information Embeddingmentioning
confidence: 99%
“…By adding a number b , y 1 = x 1 + b and y 2 = x 2 satisfy formula ( 2 ), where 2 1 , and b is called auxiliary information, among which a ∈ [1,2 n ], the embedded y 1 and y 2 . The formula ( 2 ) is no longer satisfied [ 9 ]. Like the general wavelet transform method, the wavelet low- and high-frequency coefficients obtained by the first level decomposition can be further decomposed into higher order.…”
Section: Wavelet Transform and Information Hiding Technology In Plaintext Domainmentioning
confidence: 99%