Sign Up to like & get
recommendations!
1
Published in 2018 at "Circuits, Systems, and Signal Processing"
DOI: 10.1007/s00034-018-0790-z
Abstract: It is essential to maintain a proper balance between the embedding capacity, imperceptibility and robustness in image-based reversible data hiding (RDH) applications. Most of the spatial-domain RDH techniques focus more on embedding capacity and imperceptibility…
read more here.
Keywords:
image;
image based;
reversible data;
embedding capacity ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Journal of Real-Time Image Processing"
DOI: 10.1007/s11554-017-0719-y
Abstract: In data hiding, pixel-value differencing and least significant bit are well-known techniques to embed secret data. In this paper, a novel data hiding scheme is proposed to provide high embedding capacity. In case of previous…
read more here.
Keywords:
bit plane;
bit;
embedding capacity;
data hiding ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "Applied Sciences"
DOI: 10.3390/app11114850
Abstract: With the increasing number of video applications, it is essential to resolve issues such as ineffective search of video content, tampered/forged video content, packet loss, to name a few. Data embedding is typically utilized as…
read more here.
Keywords:
video;
threshold controlled;
embedding capacity;
rate ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Symmetry"
DOI: 10.3390/sym10010019
Abstract: Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhang and Wang proposed a data hiding scheme called exploiting modification direction (EMD) which has become a milestone in…
read more here.
Keywords:
information hiding;
efficient information;
embedding capacity;
proposed scheme ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2023 at "Journal of Database Management"
DOI: 10.4018/jdm.324076
Abstract: The primary concern of every individual and organization is the security of sensitive information generated via authorized activities; nonetheless, illicit data drawing and extraction by attackers is prevalent, which may be mitigated by covert approaches.…
read more here.
Keywords:
medical data;
based text;
embedding capacity;
new bit ... See more keywords