2015
DOI: 10.1007/978-3-319-27051-7_12
|View full text |Cite
|
Sign up to set email alerts
|

Coverless Information Hiding Method Based on the Chinese Mathematical Expression

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
74
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
4

Relationship

2
8

Authors

Journals

citations
Cited by 70 publications
(74 citation statements)
references
References 19 publications
0
74
0
Order By: Relevance
“…A decentralized belief propagationbased method, PD-LBP, was proposed for multiagent task allocation in open and dynamic grid and cloud environments [38]. Chen et al proposed a coverless information hiding method using Chinese character technology with high efficiency [39]. Reference [40] proposed a self-adaptive artificial bee colony algorithm based on the global best candidate for global optimization to a real privacy clustering problem based on the K-means technique.…”
Section: Related Workmentioning
confidence: 99%
“…A decentralized belief propagationbased method, PD-LBP, was proposed for multiagent task allocation in open and dynamic grid and cloud environments [38]. Chen et al proposed a coverless information hiding method using Chinese character technology with high efficiency [39]. Reference [40] proposed a self-adaptive artificial bee colony algorithm based on the global best candidate for global optimization to a real privacy clustering problem based on the K-means technique.…”
Section: Related Workmentioning
confidence: 99%
“…Since the modern steganalyzers based on rich models [29], deep learnings [30], or combinations of these approaches [31] are now capable of detecting the presence of embedment of this type to a large extent, an ideal spatial domain data hiding method should be designed such that the cover and stego images are statistically indistinguishable. To avoid the statistical trace, some novel coverless data hiding methods based on based on scale invariant feature transform and bag of feature [32], or based on binary numbers and transformed by Chinese characters [33] are proposed. The compress domain data hiding method embeds data by modifying the compressed codes.…”
Section: Introductionmentioning
confidence: 99%
“…At present, remarkable results have been achieved. Therefore, this paper proposes a parameter selection for a denoising algorithm based on the evaluation of no-reference image quality [10] and applies the no-reference image quality evaluation method to the image denoising algorithm [11][12][13], making it possible to adaptively select the optimal parameters. We embed it in the ROF model to experiment [14] in the search for the optimal parameters, while reducing the number of iterations of the algorithm.…”
Section: Introductionmentioning
confidence: 99%