2020
DOI: 10.1049/iet-ipr.2019.1694
|View full text |Cite|
|
Sign up to set email alerts
|

Secure high capacity tetris‐based scheme for data hiding

Abstract: Information hiding is a technique that conceals private information in a trustable carrier, making it imperceptible to unauthorised people. This technique has been used extensively for secure transmissions of multimedia, such as videos, animations, and images. This study proposes a novel Tetris‐based data hiding scheme to flexibly hide more secret messages while ensuring message security. First, an LQ × LQ square lattice Q is selected to determine the maximum embedding capacity, and then it is filled without g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…A surprisingly active field has been the ability of a Tetris player to hide messages via gameplay [70,71,86,87].…”
Section: :4mentioning
confidence: 99%
“…A surprisingly active field has been the ability of a Tetris player to hide messages via gameplay [70,71,86,87].…”
Section: :4mentioning
confidence: 99%
“…Following the immense success of cannabis legalization, Tetris has followed suit with Enhanced Tetris Legalization [38,37,39,37,105] A surprisingly active field has been the ability of a Tetris player to hide messages via gameplay. [106,107,137,138].…”
Section: Related Workmentioning
confidence: 99%
“…Usually, the cryptography-based information security technique [1,2] is considered to be an effective solution for this concern, but the encrypted information can easily attract the attention of attackers. us, the researchers in this area have focused their attention on irreversible data hiding [3][4][5] and reversible data hiding (RDH) [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25] in medical images, which are techniques that can provide security and avoid attracting the attention of attackers.…”
Section: Introductionmentioning
confidence: 99%