2016 5th International Conference on Multimedia Computing and Systems (ICMCS) 2016
DOI: 10.1109/icmcs.2016.7905641
|View full text |Cite
|
Sign up to set email alerts
|

High capacity data hiding methods based on spline interpolation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…To divide the histogram, we use Eqs. (11), (12), and (13), where is the PE value range, and is the number of the partition, is the divided partition. Fig.…”
Section: Data Embeddingmentioning
confidence: 99%
See 1 more Smart Citation
“…To divide the histogram, we use Eqs. (11), (12), and (13), where is the PE value range, and is the number of the partition, is the divided partition. Fig.…”
Section: Data Embeddingmentioning
confidence: 99%
“…It uses differences between the original pixel and the error value of the original pixel. Next, there are other reliable schemes, such as interpolation [10][11][12]. The main goal of the interpolation scheme is to utilize the enlargement of the image resolution.…”
Section: Introductionmentioning
confidence: 99%
“…Spatial domain and transform domain are the main approaches in steganography. Least Significant Bit technique (LSB) is the most famous technique in the spatial domain approach [4], [5]. It directly integrates secret data by substituting the LSBs of the cover image's pixels with secret information bits.…”
Section: A General Contextmentioning
confidence: 99%
“…There are other reliable schemes, such as interpolation [7][8][9]. The essence of the interpolation scheme is to utilize the enlargement of the image resolution.…”
Section: Related Workmentioning
confidence: 99%