2016
DOI: 10.1016/j.sigpro.2016.02.001
|View full text |Cite
|
Sign up to set email alerts
|

Reversible data hiding by adaptive group modification on histogram of prediction errors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
30
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(30 citation statements)
references
References 31 publications
0
30
0
Order By: Relevance
“…Rad et al [3] then produce a checkerboard predictor (CBP). It is able to generate more accurate PE histogram than MED.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Rad et al [3] then produce a checkerboard predictor (CBP). It is able to generate more accurate PE histogram than MED.…”
Section: Related Workmentioning
confidence: 99%
“…Many techniques have been developed in the last few decades. Broadly speaking, the method of steganography on spatial domains can be divided into compress-and-append, expansion (EB) and histogram shifting (HS) [3]. The compress-andappend method is widely used in the early days of the RDH method.…”
Section: Introductionmentioning
confidence: 99%
“…However, the maximum embedding capacity is limited by the number of pixels at the peak of the histogram. To improve the embedding capacity, many scholars have performed further improvements based on HS technology in recent years [Qin, Chang, Huang et al (2013); Wang, Ye, Wang et al (2018); Rad, Wong and Guo (2016); Du, Yin and Zhang (2018)]. For example, Du et al [Du, Yin and Zhang (2018)] introduced the HS-based method in JPEG bitstream to optimize histogram modification.…”
Section: Introductionmentioning
confidence: 99%
“…Steganography is one of the most important techniques used to secure information [4]. Steganography is the art and science of hiding secret data within seemingly innocent carriers, which can be employed to achieve covert communications [5,6]. A steganographic system hides secret data into cover media (like text, image, audio, and video) and generates a stego-media [2], which is then sent to the receiver without anyone else knowing that it contains the hidden data [7].…”
Section: Introductionmentioning
confidence: 99%