The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2016
DOI: 10.1007/s11042-016-3971-4
|View full text |Cite
|
Sign up to set email alerts
|

Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
57
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 176 publications
(57 citation statements)
references
References 20 publications
0
57
0
Order By: Relevance
“…The workflow of data extraction and recovery stage is explained in Figure 4. (6) where, MSE is the Mean Square Error which is used to measure the error between the original image and compressed image and is computed using (7).…”
Section: Rbmentioning
confidence: 99%
See 2 more Smart Citations
“…The workflow of data extraction and recovery stage is explained in Figure 4. (6) where, MSE is the Mean Square Error which is used to measure the error between the original image and compressed image and is computed using (7).…”
Section: Rbmentioning
confidence: 99%
“…Reversible data hiding technique is used in some special applications such as Military images, Medical Images and Forensics, where the exact recovery of the original cover image is inevitable. Data hiding techniques can be carried out in three domains [2] namely; Spatial Domain [3,4], Frequency Domain [5,6,7], and Compression Domain [8,9,10]. In the Spatial Domain based data hiding techniques, the secret data is embedded by modifying the pixel values directly.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…(A) Data protection in terms of CS has been discussed in [136]- [141]. Fakhr in [137] proposed a watermark embedding and recovery technique based on the CS framework, tested under MP3 compression.…”
Section: Cs In Watermarkingmentioning
confidence: 99%
“…Xiao and Chen [10] left some space in the image for embedding data later to achieve separability. The quality of the decrypted image is improved by Liao et al [11] using compressive sensing and discrete Fourier transform (DFT). Qian and Zhang [12] compressed some bits from the encrypted image to find room for hiding.…”
Section: Introductionmentioning
confidence: 99%