2015
DOI: 10.1016/j.jvcir.2015.01.009
|View full text |Cite
|
Sign up to set email alerts
|

Reversible data hiding scheme for VQ indices based on modified locally adaptive coding and double-layer embedding strategy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…MATLAB R2013a and Adobe Audition 1.5 software are also used to specify the duration of the audio files required for each experiment. Mean Square Error (MSE) [33] and Peak Signal to Noise Ratio (PSNR) [33] are used to evaluate the compressed audio quality while compression ratio and factor [34] are used to evaluate the compression performance. Regarding the audio dataset, a GTZAN dataset [35] is adopted.…”
Section: Resultsmentioning
confidence: 99%
“…MATLAB R2013a and Adobe Audition 1.5 software are also used to specify the duration of the audio files required for each experiment. Mean Square Error (MSE) [33] and Peak Signal to Noise Ratio (PSNR) [33] are used to evaluate the compressed audio quality while compression ratio and factor [34] are used to evaluate the compression performance. Regarding the audio dataset, a GTZAN dataset [35] is adopted.…”
Section: Resultsmentioning
confidence: 99%
“…In recent years, several VQ‐based reversible image data hiding schemes have been developed [5–37]. However, most VQ‐based RDH schemes in the literature generate non‐legitimate codes as outputs [5–29], i.e. their outputs cannot be decoded by the conventional VQ – or conventional VQ‐based – decoders.…”
Section: Introductionmentioning
confidence: 99%
“…Digital watermarking techniques have been commonly used to copyright protection and multimedia authentication. The watermarking techniques are active authentication methods [1][2][3][4][5][6]. The watermarking techniques use spatial, frequency, compressed and encrypted domains to image authentication and copyright protection [7].…”
Section: Introductionmentioning
confidence: 99%