2013
DOI: 10.1016/j.jss.2012.08.029
|View full text |Cite
|
Sign up to set email alerts
|

Histogram-shifting-imitated reversible data hiding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
20
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(20 citation statements)
references
References 20 publications
0
20
0
Order By: Relevance
“…According to the reversibility of embedded media, data hiding schemes can be classified into two categories: irreversible data hiding schemes [1][2][3][4] and reversible data hiding schemes [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21]. In the irreversible data hiding schemes, secret data is embedded into the cover media to generate the stego-media.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…According to the reversibility of embedded media, data hiding schemes can be classified into two categories: irreversible data hiding schemes [1][2][3][4] and reversible data hiding schemes [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21]. In the irreversible data hiding schemes, secret data is embedded into the cover media to generate the stego-media.…”
Section: Introductionmentioning
confidence: 99%
“…They are the histogram Contents lists available at ScienceDirect journal homepage: www.elsevier.com/locate/sigpro shifting approach [6][7][8][9][10] and the difference expansion approach [11][12][13][14]. The reversible data hiding scheme based on histogram shifting (HS) [6] was proposed by Ni et al In the HS scheme, the histograms of the pixels in the cover image are explored, and the pairs of the peak and zero points are searched.…”
Section: Introductionmentioning
confidence: 99%
“…Example 1: For First Phase embedding, scanning the image in zigzag manner from coordinates (0, 0) to (3,3), we have p1, p2, p5, p9, p6, p3, p4, p7, p10, p13, p14, p11, p8, p12, p15, and p16 which are 23,24,32,34,37,37,36,38,39,41,43,44,43,44,45, and 43.we construct the Position Chart of the first phase (PC1) for these pixels. The position chart (PC1) for even valued pixels is given by '0' bit and that of odd valued pixels is given by two LSBs in their binary representation.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…The reversible data hiding techniques can be classified based on the domain used such as transform domain, compressed domain and spatial domain. The transform domain based methods [34] transform the cover image into a set of coefficients and modify these coefficients based on the secret data bits. For transforming the cover image into a set of coefficients, there are various transforms such as wavelet transform, cosine transform, etc.…”
mentioning
confidence: 99%
“…While, a reversible data hiding scheme allows the extractor to recover the original cover media completely upon extraction of the hidden data. In the recent past, several reversible data hiding schemes have been developed based on different concepts such as lossless compression [31], difference expansion [1,112], histogram-shifting [16,30,36,40,65,96,100,110], vector quantization [13,56,68,89,98,97,101], and prediction-error [30,33,55,80,114]. A detailed review of reversible watermarking schemes is given in [46].…”
Section: Introductionmentioning
confidence: 99%