2019
DOI: 10.1007/s11042-018-7098-7
|View full text |Cite
|
Sign up to set email alerts
|

A Turtle Shell based RDH scheme with two-dimensional histogram shifting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Cellular Network Matrix Construction. Inspired by the turtle shell matrix [17], we design the cellular network reference matrix M = ½mði, jÞ N×N ði, j = 0, 1, 2,⋯,NÞ according to the following rules, where N is determined by the bit depth of the cover image.…”
Section: Proposed Schemementioning
confidence: 99%
“…Cellular Network Matrix Construction. Inspired by the turtle shell matrix [17], we design the cellular network reference matrix M = ½mði, jÞ N×N ði, j = 0, 1, 2,⋯,NÞ according to the following rules, where N is determined by the bit depth of the cover image.…”
Section: Proposed Schemementioning
confidence: 99%
“…After the preparation operation, three categories, smooth block, less complex block, and high complex block, of the AMBTC compression codes have been identified. A data embedding operation is conducted based on a turtle-shell reference matrix, called TSM, defined in [11] as shown in Fig. 3.…”
Section: The Proposed Hbf-dh Schemementioning
confidence: 99%
“…AMBTC's compression speed is relatively efficient and effective, and the PNSR of the decompressed image is better than other BTC variants. Many researchers treated the compression codes of AMBTC as cover media and studied how to apply different block classification strategies to achieve good performance on hiding capacity no matter their designed data hiding schemes with or without reversibility [11]- [16], [41], [42]. Chuang et al proposed a BTC-based data hiding method in 2006 [13] which classified BTC compression codes into smooth and edge categories by a pre-determined threshold, and embedded 16 bits secret data into each smooth block.…”
Section: Introductionmentioning
confidence: 99%