2017
DOI: 10.1016/j.ijleo.2016.11.059
|View full text |Cite
|
Sign up to set email alerts
|

Mean value based reversible data hiding in encrypted images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 53 publications
(37 citation statements)
references
References 35 publications
0
33
0
Order By: Relevance
“…Figure 7 is the PSNR comparison among the assessed algorithms under different test images when r=1. It is observed that the PSNRs of the proposed algorithm are bigger than those of the compared algorithms [26,27,30] under any embedding rate for all test images. The RDH algorithm reported in [27] has lower performance than other algorithms due to the fact that it embeds several bits into hundreds of pixels.…”
Section: Performance Comparisonsmentioning
confidence: 89%
See 3 more Smart Citations
“…Figure 7 is the PSNR comparison among the assessed algorithms under different test images when r=1. It is observed that the PSNRs of the proposed algorithm are bigger than those of the compared algorithms [26,27,30] under any embedding rate for all test images. The RDH algorithm reported in [27] has lower performance than other algorithms due to the fact that it embeds several bits into hundreds of pixels.…”
Section: Performance Comparisonsmentioning
confidence: 89%
“…In this section, we compare the proposed algorithm with some recent popular RDH algorithms [22,26,27,30,31]. Figure 7 is the PSNR comparison among the assessed algorithms under different test images when r=1.…”
Section: Performance Comparisonsmentioning
confidence: 99%
See 2 more Smart Citations
“…At last, the receiver attained the capability to extract the data that were embedded and recuperated the original JPEG bit stream separately. Agarwal [11] introduced a new RDH method for encoded images. For encryption operation, iimplemented method exploited additive modulo 256 and possessions of average for watermark embedding in the images that are encrypted.…”
Section: A State-of-the-art Of Contributionsmentioning
confidence: 99%