Reversible data hiding
Citations
1,229 citations
550 citations
Cites background from "Reversible data hiding"
...in [18], in which the message is embedded into the histogram bin....
[...]
...6 compares the pure payload of the “Lena” image in b/pixel versus image quality in PSNR delivered by the proposed scheme and other existing reversible schemes [7]–[9], [18]–[20]....
[...]
...’s scheme [18] has low hiding capacity compared to those of...
[...]
...Note that the proposed scheme and schemes [7], [18]–[20] are proposed in the spatial domain, whereas schemes [8], [9] are presented in the transform domain....
[...]
...Schemes [18]–[20] are presented based on histogram modification; nevertheless, their algorithms did not provide a solution to the problem of communicating multiple pairs of peak and minimum points....
[...]
479 citations
Cites background from "Reversible data hiding"
...[4] proposed a scheme of using peak/zero points in the histogram of spatial domain images....
[...]
352 citations
Cites background or methods from "Reversible data hiding"
...Besides aforementioned works [11]–[13], [22], many HS-based RDH algorithms have also been proposed so far [23]–[31]....
[...]
...’s HS-based algorithm [11] is another important work of RDH, in which the peak of image histogram is utilized to embed data....
[...]
...2246179 difference expansion (DE) [8]–[10], histogram shifting (HS) [11]–[13], and integer transform [14]–[17], etc....
[...]
324 citations
Cites background or methods from "Reversible data hiding"
...[17] used the zero point and peak point of an image histogram to hide message and achieved reversibility....
[...]
...'s scheme [17] we explore the peak point of the histogram in pixel differences in an image, then slightly modify the pixel values to hide the embedded message....
[...]
...'s scheme [17], in which all peak points are concatenated as a secret key and are transmitted to the receiver side for extraction of the embeddedmessage and restoration of the original image....
[...]
...'s scheme [17] has low hiding capacity compared to the others....
[...]
...'s scheme [17], DE of triplets [13], and Chang et al....
[...]
References
6,194 citations
"Reversible data hiding" refers methods in this paper
...With the most popularly utilized spread-spectrum watermarking techniques, either in DCT domain [1] or block 8x8 DCT domain [2], roundoff error and/or truncation error may take place during data embedding....
[...]
3,037 citations
Additional excerpts
...[20] proposed a reversible data hiding algorithm based on patchwork theory [21], which has certain robustness against JPEG lossy compression....
[...]
2,739 citations
"Reversible data hiding" refers background or methods or result in this paper
...Tian presented a promising high capacity reversible data embedding algorithm in [15]....
[...]
...Later, a difference expansion scheme was developed by Tian [15], which has greatly advanced the performance of reversible data hiding in terms of data embedding capacity versus PSNR of marked images with respect to original images....
[...]
...[16,17], which have demonstrated superior performance over that reported in [15]....
[...]
...It has been reported in [15] that the embedding capacity achieved by the difference expansion method is much higher than that achieved by [10]....
[...]
2,357 citations
"Reversible data hiding" refers methods in this paper
...To increase the payload dramatically, a new lossless data hiding technique [17] based on integer wavelet transform (IWT) [18], [19] (a second generation wavelet transform, which has avoided round-off errors) was developed recently....
[...]
2,218 citations
"Reversible data hiding" refers methods in this paper
...With the third group of frequently used watermarking techniques, called quantization index modulation (QIM) [ 3 ], quantization error renders lossy data hiding....
[...]