2014
DOI: 10.1016/j.image.2014.05.003
|View full text |Cite
|
Sign up to set email alerts
|

Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
127
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 139 publications
(127 citation statements)
references
References 38 publications
0
127
0
Order By: Relevance
“…whereas they are not utilized in Ou's work [28]. Extensive experiments verify that the proposed method outperforms Sachnev et al [32], and Hong et al [11].…”
Section: Resultsmentioning
confidence: 66%
See 2 more Smart Citations
“…whereas they are not utilized in Ou's work [28]. Extensive experiments verify that the proposed method outperforms Sachnev et al [32], and Hong et al [11].…”
Section: Resultsmentioning
confidence: 66%
“…Meanwhile, optimized embedding to obtain the best image quality by considering the embedding payoff can be achieved. Experimental results demonstrate that both the capacity and the marked image quality can be improved compared with other methods [21,30,28]. Besides, in comparison with the Sachnev et al's work [32], the proposed method also demonstrates superior performance.…”
Section: A N U S C R I P Tmentioning
confidence: 73%
See 1 more Smart Citation
“…While, a reversible data hiding scheme allows the extractor to recover the original cover media completely upon extraction of the hidden data. In the recent past, several reversible data hiding schemes have been developed based on different concepts such as lossless compression [31], difference expansion [1,112], histogram-shifting [16,30,36,40,65,96,100,110], vector quantization [13,56,68,89,98,97,101], and prediction-error [30,33,55,80,114]. A detailed review of reversible watermarking schemes is given in [46].…”
Section: Introductionmentioning
confidence: 99%
“…A group of studies [11][12][13][14][15][16] explored neighboring pixels in an image and predicted a pixel value by its neighboring pixels. Then they adopted the histogram of predicted error for embedding messages.…”
Section: Introductionmentioning
confidence: 99%