2014
DOI: 10.1007/s11042-014-2289-3
|View full text |Cite
|
Sign up to set email alerts
|

A reversible high capacity data hiding scheme using pixel value adjusting feature

Abstract: In this paper, we propose a new reversible data hiding scheme that uses pixel value adjusting feature. It has two phases. In first phase, It scans the image diagonally from left to right and hides the some of the secret data into the odd valued pixels. In second phase, it also scans the image diagonally but in right to left order and hides the secret data into the even valued pixels. In the second phase, some of the pixels used for hiding in the first phase are again used to hide the secret data but this time … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
10

Relationship

1
9

Authors

Journals

citations
Cited by 29 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…Most of the RDH algorithms have been designed based on different approaches. In compression-based schemes [ 22 , 26 ], the cover image is compressed using different compression techniques that maximize utilization of the redundancy in the cover image and would ensure a lossless recovery. Another approach is histogram shifting-based [ 12 , 21 , 49 ], where the intensity bins are shifted based on the peak intensity value to hide the additional data in the empty bin.…”
Section: Introductionmentioning
confidence: 99%
“…Most of the RDH algorithms have been designed based on different approaches. In compression-based schemes [ 22 , 26 ], the cover image is compressed using different compression techniques that maximize utilization of the redundancy in the cover image and would ensure a lossless recovery. Another approach is histogram shifting-based [ 12 , 21 , 49 ], where the intensity bins are shifted based on the peak intensity value to hide the additional data in the empty bin.…”
Section: Introductionmentioning
confidence: 99%
“…Because of the aforementioned advantage of RDH method, it has attracted a lot of attention from researchers working in the field of security. Therefore, multiple spatial-domain-based RDH methods have been introduced in the literature, which can be categorized into the following categories: namely (a) lossless compression [4][5][6], (b) difference expansion [7,8], and (c) prediction error expansion [9][10][11][12][13][14][15][16][17][18][19].…”
Section: Introductionmentioning
confidence: 99%
“…For this, there exist several reversible data hiding (RDH) techniques which have been developed in the past for lossless embedding and recovery of both secret data and subscriber data. Some of the popular RDH techniques are lossless compression based [3][4][5][6], difference expansion-based [7], histogram expansion, and prediction error expansion based [8][9][10][11][12] RDH techniques. However, these techniques are only suitable for plaintext data, but not for encrypted data.…”
Section: Introductionmentioning
confidence: 99%