2015 International Conference on Green Computing and Internet of Things (ICGCIoT) 2015
DOI: 10.1109/icgciot.2015.7380662
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of reversible Data Hiding in Encrypted Image using A-S Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 33 publications
0
0
0
Order By: Relevance
“…A receiver with encryption and hiding keys can perfectly extract the secret bits by analysing the blocking artefacts of the neighbouring blocks. Achuthshankar et al (2015) presented a data hiding approach for encrypted images using the AS algorithm which extracts the hidden data after applying the decryption algorithm. Cao and Zhou (2016) developed an RDHEI algorithm using the rhombus prediction model and difference histogram shifting.…”
Section: Related Workmentioning
confidence: 99%
“…A receiver with encryption and hiding keys can perfectly extract the secret bits by analysing the blocking artefacts of the neighbouring blocks. Achuthshankar et al (2015) presented a data hiding approach for encrypted images using the AS algorithm which extracts the hidden data after applying the decryption algorithm. Cao and Zhou (2016) developed an RDHEI algorithm using the rhombus prediction model and difference histogram shifting.…”
Section: Related Workmentioning
confidence: 99%