Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Reversible data hiding based on block median preservation
H Luo, FX Yu, H Chen, ZL Huang, H Li, PH Wang - Information sciences, 2011 - Elsevier
This paper proposes a reversible data hiding scheme for gray level images. It exploits the
high correlation among image block pixels to produce a difference histogram. Secret data is …
high correlation among image block pixels to produce a difference histogram. Secret data is …
Embedding color watermarks in color images based on Schur decomposition
In this paper, a blind dual color image watermarking scheme based on Schur decomposition
is introduced. This is the first time to use Schur decomposition to embed color image …
is introduced. This is the first time to use Schur decomposition to embed color image …
A high capacity reversible watermarking approach for authenticating images: exploiting down-sampling, histogram processing, and block selection
Amongst the various data hiding schemes, lossless data hiding has achieved substantial
attention in the recent years. Lossless watermarking also known as reversible watermarking …
attention in the recent years. Lossless watermarking also known as reversible watermarking …
Applying Decision Tree for Hiding Data in Binary Images for Secure and Secret Information Flow
In today's digital world, it is noticeable that images are transferred in binary form which
carries significant and confidential information. To secure and keep such information …
carries significant and confidential information. To secure and keep such information …
Personalized information encryption using ECG signals with chaotic functions
The development of efficient data encryption to ensure high security of information
transmission has long been a popular research subject. Because electrocardiogram (ECG) …
transmission has long been a popular research subject. Because electrocardiogram (ECG) …
[HTML][HTML] SVD-based image watermarking using the fast Walsh-Hadamard transform, key map**, and coefficient ordering for ownership protection
Proof of ownership on multimedia data exposes users to significant threats due to a myriad
of transmission channel attacks over distributed computing infrastructures. In order to …
of transmission channel attacks over distributed computing infrastructures. In order to …
A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability
A new blind authentication method based on the secret sharing technique with a data repair
capability for grayscale document images via the use of the Portable Network Graphics …
capability for grayscale document images via the use of the Portable Network Graphics …
A dual color images watermarking scheme based on the optimized compensation of singular value decomposition
This paper proposes a novel watermarking algorithm based on the improved compensation
of SVD for embedding the color image watermark into the color host image. Firstly, the …
of SVD for embedding the color image watermark into the color host image. Firstly, the …
Reversible data hiding with interpolation and adaptive embedding
Interpolation based reversible data hiding (IRDH) schemes have recently been studied for
better rate-distortion performance. However, most of them do not have any consideration of …
better rate-distortion performance. However, most of them do not have any consideration of …
Perceptually adaptive spread transform image watermarking scheme using Hadamard transform
The present paper proposes a digital image watermarking scheme using the characteristics
of the human visual system (HVS), spread transform technique and statistical information …
of the human visual system (HVS), spread transform technique and statistical information …