2022
DOI: 10.3390/math10050841
|View full text |Cite
|
Sign up to set email alerts
|

Reversible Data Hiding with a New Local Contrast Enhancement Approach

Abstract: Reversible data hiding schemes hide information into a digital image and simultaneously increase its contrast. The improvements of the different approaches aim to increase the capacity, contrast, and quality of the image. However, recent proposals contrast the image globally and lose local details since they use two common methodologies that may not contribute to obtaining better results. Firstly, to generate vacancies for hiding information, most schemes start with a preprocessing applied to the histogram tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…Histograms, as a form of synopsis-based methods, have been extensively studied [6,8] and are widely adopted in common database systems [14] for the purpose of selectivity estimation, including MySQL, PostgreSQL, Oracle, and SQL-Server [15][16][17][18]. Histograms are commonly used in databases for other tasks, including, for instance, data security and watermarking [19,20].…”
Section: Review Of Related Workmentioning
confidence: 99%
“…Histograms, as a form of synopsis-based methods, have been extensively studied [6,8] and are widely adopted in common database systems [14] for the purpose of selectivity estimation, including MySQL, PostgreSQL, Oracle, and SQL-Server [15][16][17][18]. Histograms are commonly used in databases for other tasks, including, for instance, data security and watermarking [19,20].…”
Section: Review Of Related Workmentioning
confidence: 99%
“…This has motivated researchers to study reversible information hiding (RIH) [11] or say reversible data hiding (RDH) [12], reversible watermarking [13] to ensure that both the secret message and the original cover media can be reconstructed at the receiver side. Many RDH algorithms can be found in the literature such as [13][14][15][16][17][18][19][20].…”
Section: Introductionmentioning
confidence: 99%