2019
DOI: 10.1016/j.future.2018.07.051
|View full text |Cite
|
Sign up to set email alerts
|

One-pass lossless data hiding and compression of remote sensing data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 36 publications
(20 citation statements)
references
References 34 publications
0
20
0
Order By: Relevance
“…To date, many RDH methods that work with plaintext images have been proposed. The basic ideas of these methods are different expansion (DE) [5,6], histogram shift (HS) [7,8], pixel value ordering (PVO) [9,10] and the modification of prediction errors [11,12]. All of these methods use the spatial correlation and the redundancy of plaintext images to embed additional bits.…”
Section: Introductionmentioning
confidence: 99%
“…To date, many RDH methods that work with plaintext images have been proposed. The basic ideas of these methods are different expansion (DE) [5,6], histogram shift (HS) [7,8], pixel value ordering (PVO) [9,10] and the modification of prediction errors [11,12]. All of these methods use the spatial correlation and the redundancy of plaintext images to embed additional bits.…”
Section: Introductionmentioning
confidence: 99%
“…From Table 4 , the following observations can be made with respect to the selected properties: All the schemes are applied to the remote sensing images. In some schemes [ 11 , 14 ], multispectral images are used, while in other systems [ 10 , 13 , 16 ] including the proposed scheme, hyperspectral images are considered. The scheme proposed by [ 12 ] is proposed for raster images, but can be extended to hyperspectral images.…”
Section: Resultsmentioning
confidence: 99%
“…Reference [ 16 ] presents a novel one-pass framework based on a modification of prediction errors scheme, which enables data hiding and lossless compression operations simultaneously on hyperspectral images collected through remote sensing facilities. The scheme employs three-dimensional predictors to exploit the redundancies of hyperspectral images.…”
Section: Introductionmentioning
confidence: 99%
“…Many motivations lead us to the use of steganography and they can be significantly different from each other. For example, there may be the need to establish a “covert channel,” as well as to insert a seal into a digital content, which cannot be removed or altered (ie, digital watermarking). It is important to point out that unlike cryptography, which deals with the protection of the message content, steganography deals with techniques to hide the presence of hidden information within a message or within stored/exchanged data.…”
Section: Introductionmentioning
confidence: 99%