Secure data hiding scheme using shape generation algorithm: a key based approach
Published 2017 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Secure data hiding scheme using shape generation algorithm: a key based approach
Authors
Keywords
Data hiding, Secret key, Midpoint circle generation algorithm, Avalanche effect
Journal
MULTIMEDIA TOOLS AND APPLICATIONS
Volume 77, Issue 13, Pages 16319-16345
Publisher
Springer Nature
Online
2017-09-16
DOI
10.1007/s11042-017-5200-1
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A high capacity data hiding scheme based on re-adjusted GEMD
- (2017) Chun-Cheng Wang et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Parallel deblocking filter for HEVC on many-core processor
- (2014) Chenggang Yan et al. ELECTRONICS LETTERS
- Efficient parallel HEVC intra-prediction on many-core processor
- (2014) C. Yan et al. ELECTRONICS LETTERS
- A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm
- (2014) Hamidreza Rashidy Kanan et al. EXPERT SYSTEMS WITH APPLICATIONS
- A Highly Parallel Framework for HEVC Coding Unit Partitioning Tree Decision on Many-core Processors
- (2014) Chenggang Yan et al. IEEE SIGNAL PROCESSING LETTERS
- Efficient Parallel Framework for HEVC Motion Estimation on Many-Core Processors
- (2014) Chenggang Yan et al. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY
- General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes
- (2013) Shyong Jian Shyu et al. IEEE Transactions on Information Forensics and Security
- Reversible data hiding based on PDE predictor
- (2013) Bo Ou et al. JOURNAL OF SYSTEMS AND SOFTWARE
- A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding
- (2013) Xinlu Gui et al. SIGNAL PROCESSING
- Reversible data hiding for high quality images exploiting interpolation and direction order mechanism
- (2012) Xing-Tian Wang et al. DIGITAL SIGNAL PROCESSING
- Hierarchy-based reversible data hiding
- (2012) Hsiang-Cheh Huang et al. EXPERT SYSTEMS WITH APPLICATIONS
- Improving the visual quality of random grid-based visual secret sharing
- (2012) Xiaotian Wu et al. SIGNAL PROCESSING
- Lossy Compression and Iterative Reconstruction for Encrypted Image
- (2011) Xinpeng Zhang IEEE Transactions on Information Forensics and Security
- Secret image sharing with authentication-chaining and dynamic embedding
- (2011) Z. Eslami et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Lossless Data Embedding in Electronic Inks
- (2010) Hong Cao et al. IEEE Transactions on Information Forensics and Security
- Efficient multi-secret image sharing based on Boolean operations
- (2010) Tzung-Her Chen et al. SIGNAL PROCESSING
- Reversible Image Watermarking Using Interpolation Technique
- (2009) Lixin Luo et al. IEEE Transactions on Information Forensics and Security
- A novel data hiding scheme based on modulus function
- (2009) Chin-Feng Lee et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Data hiding in grayscale images by dynamic programming based on a human visual model
- (2009) I-Shi Lee et al. PATTERN RECOGNITION
- Sharing secrets in stego images with authentication
- (2008) Chin-Chen Chang et al. PATTERN RECOGNITION
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started