Abstract:Recently, more and more attention is paid to protect sensitive data transmitting across network.Currently,there are methods which use RDH with cover image also as information to transfer. To ensure confidentiality of cover image, it is encrypted and data hiding is done in encrypted image. In real-time scenarios we need to use color images as cover image and large amount of data to hide in image. The standard encryption methods which encrypt every bit of cover image waste large amount of time for encryption and… Show more
“…For medial and military applications, the data hiding scheme requires high fidelity of the stego image and the reversible property, which can recover the original cover image without any distortion from the stego image after the hidden embedding data have been extracted. Many reversible data hiding algorithms for images were proposed [14][15][16][17][18][19][20][21]. However, most of the reversible data hiding schemes have extremely low embedding capability.…”
“…For medial and military applications, the data hiding scheme requires high fidelity of the stego image and the reversible property, which can recover the original cover image without any distortion from the stego image after the hidden embedding data have been extracted. Many reversible data hiding algorithms for images were proposed [14][15][16][17][18][19][20][21]. However, most of the reversible data hiding schemes have extremely low embedding capability.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.