Reversible data hiding based on block median preservation

H Luo, FX Yu, H Chen, ZL Huang, H Li, PH Wang - Information sciences, 2011‏ - Elsevier
This paper proposes a reversible data hiding scheme for gray level images. It exploits the
high correlation among image block pixels to produce a difference histogram. Secret data is …

Embedding color watermarks in color images based on Schur decomposition

Q Su, Y Niu, X Liu, Y Zhu - Optics Communications, 2012‏ - Elsevier
In this paper, a blind dual color image watermarking scheme based on Schur decomposition
is introduced. This is the first time to use Schur decomposition to embed color image …

A high capacity reversible watermarking approach for authenticating images: exploiting down-sampling, histogram processing, and block selection

A Khan, SA Malik - Information Sciences, 2014‏ - Elsevier
Amongst the various data hiding schemes, lossless data hiding has achieved substantial
attention in the recent years. Lossless watermarking also known as reversible watermarking …

Applying Decision Tree for Hiding Data in Binary Images for Secure and Secret Information Flow

GJ Chhajed, BR Garg - Cybersecurity Measures for E-Government …, 2022‏ - igi-global.com
In today's digital world, it is noticeable that images are transferred in binary form which
carries significant and confidential information. To secure and keep such information …

Personalized information encryption using ECG signals with chaotic functions

CK Chen, CL Lin, CT Chiang, SL Lin - Information Sciences, 2012‏ - Elsevier
The development of efficient data encryption to ensure high security of information
transmission has long been a popular research subject. Because electrocardiogram (ECG) …

[HTML][HTML] SVD-based image watermarking using the fast Walsh-Hadamard transform, key map**, and coefficient ordering for ownership protection

T Khanam, PK Dhar, S Kowsar, JM Kim - Symmetry, 2019‏ - mdpi.com
Proof of ownership on multimedia data exposes users to significant threats due to a myriad
of transmission channel attacks over distributed computing infrastructures. In order to …

A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability

CW Lee, WH Tsai - IEEE Transactions on Image Processing, 2011‏ - ieeexplore.ieee.org
A new blind authentication method based on the secret sharing technique with a data repair
capability for grayscale document images via the use of the Portable Network Graphics …

A dual color images watermarking scheme based on the optimized compensation of singular value decomposition

Q Su, Y Niu, Y Zhao, S Pang, X Liu - AEU-International Journal of …, 2013‏ - Elsevier
This paper proposes a novel watermarking algorithm based on the improved compensation
of SVD for embedding the color image watermark into the color host image. Firstly, the …

Reversible data hiding with interpolation and adaptive embedding

MA Wahed, H Nyeem - Multimedia Tools and Applications, 2019‏ - Springer
Interpolation based reversible data hiding (IRDH) schemes have recently been studied for
better rate-distortion performance. However, most of them do not have any consideration of …

Perceptually adaptive spread transform image watermarking scheme using Hadamard transform

SP Maity, MK Kundu - Information Sciences, 2011‏ - Elsevier
The present paper proposes a digital image watermarking scheme using the characteristics
of the human visual system (HVS), spread transform technique and statistical information …