标题
Secure data hiding scheme using shape generation algorithm: a key based approach
作者
关键词
Data hiding, Secret key, Midpoint circle generation algorithm, Avalanche effect
出版物
MULTIMEDIA TOOLS AND APPLICATIONS
Volume 77, Issue 13, Pages 16319-16345
出版商
Springer Nature
发表日期
2017-09-16
DOI
10.1007/s11042-017-5200-1
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- A high capacity data hiding scheme based on re-adjusted GEMD
- (2017) Chun-Cheng Wang et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Parallel deblocking filter for HEVC on many-core processor
- (2014) Chenggang Yan et al. ELECTRONICS LETTERS
- Efficient parallel HEVC intra-prediction on many-core processor
- (2014) C. Yan et al. ELECTRONICS LETTERS
- A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm
- (2014) Hamidreza Rashidy Kanan et al. EXPERT SYSTEMS WITH APPLICATIONS
- A Highly Parallel Framework for HEVC Coding Unit Partitioning Tree Decision on Many-core Processors
- (2014) Chenggang Yan et al. IEEE SIGNAL PROCESSING LETTERS
- Efficient Parallel Framework for HEVC Motion Estimation on Many-Core Processors
- (2014) Chenggang Yan et al. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY
- General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes
- (2013) Shyong Jian Shyu et al. IEEE Transactions on Information Forensics and Security
- Reversible data hiding based on PDE predictor
- (2013) Bo Ou et al. JOURNAL OF SYSTEMS AND SOFTWARE
- A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding
- (2013) Xinlu Gui et al. SIGNAL PROCESSING
- Reversible data hiding for high quality images exploiting interpolation and direction order mechanism
- (2012) Xing-Tian Wang et al. DIGITAL SIGNAL PROCESSING
- Hierarchy-based reversible data hiding
- (2012) Hsiang-Cheh Huang et al. EXPERT SYSTEMS WITH APPLICATIONS
- Improving the visual quality of random grid-based visual secret sharing
- (2012) Xiaotian Wu et al. SIGNAL PROCESSING
- Lossy Compression and Iterative Reconstruction for Encrypted Image
- (2011) Xinpeng Zhang IEEE Transactions on Information Forensics and Security
- Secret image sharing with authentication-chaining and dynamic embedding
- (2011) Z. Eslami et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Lossless Data Embedding in Electronic Inks
- (2010) Hong Cao et al. IEEE Transactions on Information Forensics and Security
- Efficient multi-secret image sharing based on Boolean operations
- (2010) Tzung-Her Chen et al. SIGNAL PROCESSING
- Reversible Image Watermarking Using Interpolation Technique
- (2009) Lixin Luo et al. IEEE Transactions on Information Forensics and Security
- A novel data hiding scheme based on modulus function
- (2009) Chin-Feng Lee et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Data hiding in grayscale images by dynamic programming based on a human visual model
- (2009) I-Shi Lee et al. PATTERN RECOGNITION
- Sharing secrets in stego images with authentication
- (2008) Chin-Chen Chang et al. PATTERN RECOGNITION
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started