Secured Data Transmission through Dual Domain Reversible Data Hiding and Encryption in Images
Citations
12 citations
References
2,240 citations
1,126 citations
"Secured Data Transmission through D..." refers methods in this paper
...In general, RDH methods [3] are developed by modifying the minimum and maximum gray scale values of the image histogram to hide data....
[...]
645 citations
"Secured Data Transmission through D..." refers methods in this paper
...To interpolate the image basic idea of [10] and [14] is used, but in order to obtain higher PSNR value with high embedding capacity, the ALMMSE algorithm is slightly modified as this algorithm interpolates both sample and un-sample pixels, but here only the un-sampled pixels are interpolated....
[...]
550 citations
"Secured Data Transmission through D..." refers background in this paper
...Difference between adjacent pixels in histogram modification and binary tree for communicating pair of peak points is considered [4] to embed information....
[...]
140 citations
"Secured Data Transmission through D..." refers methods in this paper
...In order to overcome overflow of pixel values (less than 0 or greater than 255), ‘flag array’ method [12] can be used to shrink the data hidden image histogram from both the ends....
[...]