2017
DOI: 10.1007/s11045-017-0497-5
|View full text |Cite
|
Sign up to set email alerts
|

An integer wavelet transform based scheme for reversible data hiding in encrypted images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
44
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 108 publications
(44 citation statements)
references
References 15 publications
0
44
0
Order By: Relevance
“…According to the recoverability of the cover image, data-hiding methods can be classified into lossy [6][7][8][9][10][11][12][13][14] and lossless [15][16][17]. The least significant bit (LSB) matching [18] is one of the well-known lossy methods.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…According to the recoverability of the cover image, data-hiding methods can be classified into lossy [6][7][8][9][10][11][12][13][14] and lossless [15][16][17]. The least significant bit (LSB) matching [18] is one of the well-known lossy methods.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, the lossless data hiding methods have the capability to restore the cover image after data extraction and thus they have wide applications. For example, [17] employs a lossless data hiding scheme using integer wavelet transform to embed data into encrypted images. Nevertheless, the payload and stego image quality offered by the lossless methods are often considerably lower than that of lossy ones.…”
Section: Introductionmentioning
confidence: 99%
“…For example, an integer wavelet transform is proposed by Lizhi Xiong, it shows that this scheme outperforms all of other existing RDH schemes in encrypted domain in terms of higher PSNR at the same amount of payload [5]. It is effective in diagnosing and classifying different states of gearbox in short time.…”
Section: Introductionmentioning
confidence: 99%
“…Many of these graph processing frameworks employ iterative processing techniques [38,41,50]. Namely, graph processing involves many iterations.…”
Section: Introductionmentioning
confidence: 99%