2014
DOI: 10.1016/j.sigpro.2013.06.023
|View full text |Cite
|
Sign up to set email alerts
|

Reversibility improved data hiding in encrypted images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
182
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 335 publications
(183 citation statements)
references
References 20 publications
1
182
0
Order By: Relevance
“…These test images are named as Lena, F16, Baboon, Barbara, Boat, Pepper, House, Sailboat, Elaine, Tiffany, Goldhill, Toys and Zelda. PSNR [36] and Quality (Q) [37] given Equation 5-12 are used to utilized the result of proposed method. The proposed method is compared with Shen and Huang method [19] and obtained results is given in The proposed method is also compared with other data hiding methods [38,39,19] based on pixel pairs in literature in terms of Quality metric and the obtained results are shown in Table 4.…”
Section: Resultsmentioning
confidence: 99%
“…These test images are named as Lena, F16, Baboon, Barbara, Boat, Pepper, House, Sailboat, Elaine, Tiffany, Goldhill, Toys and Zelda. PSNR [36] and Quality (Q) [37] given Equation 5-12 are used to utilized the result of proposed method. The proposed method is compared with Shen and Huang method [19] and obtained results is given in The proposed method is also compared with other data hiding methods [38,39,19] based on pixel pairs in literature in terms of Quality metric and the obtained results are shown in Table 4.…”
Section: Resultsmentioning
confidence: 99%
“…Encryption and embedding keys are used to protect embedding and recovery an adversary is unable to break into the system without these keys. W. Zhang, K. Ma, et al [12], presented l reversible data hiding technique in encrypted images. While embedding data pixels are estimated before encryption and AES algorithm is applied to the other pixels of images.…”
Section: Related Workmentioning
confidence: 99%
“…Encryption and embedding keys are used to protect embedding and recovery an adversary is unable to break into the system without these keys [11].Reversible data hiding technique in encrypted images embedding data pixels are estimated before encryption and AES algorithm is applied to the other pixels of images. To improve performance of reversing the order of encryption and vacating room is introduced in [12]. A better correlation between neighbor pixels by considering the patch-level sparse representation when hiding the secret data explored in [13].…”
Section: Related Workmentioning
confidence: 99%