2018
DOI: 10.1016/j.procs.2018.07.043
|View full text |Cite
|
Sign up to set email alerts
|

Reversible Data Hiding Scheme During Encryption Using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
23
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(25 citation statements)
references
References 18 publications
1
23
0
Order By: Relevance
“…In medicine, RDH methods are often used to enrich medical images with sections of the EPR (Electronic Patient Record), which is a digital version of a patient's paper chart (medical history, disease diagnosis, treatment methods, etc.) [12,13]. Additionally, RDH methods are applied not only to images, but also to video signals [14,15] and sound signals [16,17].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…In medicine, RDH methods are often used to enrich medical images with sections of the EPR (Electronic Patient Record), which is a digital version of a patient's paper chart (medical history, disease diagnosis, treatment methods, etc.) [12,13]. Additionally, RDH methods are applied not only to images, but also to video signals [14,15] and sound signals [16,17].…”
Section: Related Workmentioning
confidence: 99%
“…Because of the detailed comparison with other existing RDHEI methods, already shown in [2], we treated [2] as a reference for our comparison analysis. To the best of our knowledge, this is the first RDHEI method to use the cyclic binary Golay (23,12) code for data embedding. The contribution of this paper is as follows.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In this method, the primary information was transformed into the customized data container before being encrypted with the diffractiveimaging-based encryption. A reversible data hiding scheme through the image encryption and support vector machine based data extraction and image recovery scheme was proposed in [19]. This scheme provides a way for a secure medical image transmission.…”
Section: Introductionmentioning
confidence: 99%