Reversible Data Hiding in Encrypted Images Based on Multi-Predictor and Quad-tree Block Encoding
Abstract
References
Recommendations
High-fidelity reversible data hiding scheme based on multi-predictor sorting and selecting mechanism
We propose a reversible data hiding scheme using histogram modification technique.A new mechanism is proposed to select an optimum predictor from a set of predictors.A smaller prediction-error is obtained using our proposed mechanism.The prediction-...
Binary-block embedding for reversible data hiding in encrypted images
This paper first introduces a binary-block embedding (BBE) method to embed secret data in a binary image. Using BBE, we propose an algorithm for reversible data hiding in encrypted images (BBE-RDHEI). It uses BBE to embed binary bits in lower bit-planes ...
High capacity reversible data hiding with contiguous space in encrypted images
AbstractReversible data hiding in encrypted images (RDHEI) is used to embed secret data into an encrypted image to ensure data security and image privacy. However, a considerable portion of the existing methods do not achieve a high data embedding rate (...
Graphical abstractDisplay Omitted
Highlights- The proposed RDHEI method leverages both block and bit-plane level correlation.
- A novel block-shifting mechanism is also introduced for label map free embedding.
- The proposed work provides contiguous space for embedding.
- An ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 40Total Downloads
- Downloads (Last 12 months)7
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format