Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Reversible data hiding with hierarchical block variable length coding for cloud security
S Xu, JH Horng, CC Chang… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Reversible data hiding in encrypted images (RDHEI) can serve as a technical solution to
secure data in applications that rely on cloud storage. The key features of an RDHEI scheme …
secure data in applications that rely on cloud storage. The key features of an RDHEI scheme …
High-capacity reversible data hiding in encrypted images based on adaptive block encoding
This paper proposes a new high-capacity reversible data hiding scheme in encrypted
images. The content owner first divides the cover image into blocks. Then, the block …
images. The content owner first divides the cover image into blocks. Then, the block …
Reversible data hiding scheme during encryption using machine learning
Reversible data hiding (RDH) is a recent research field of information security for secured
digital data transmission. The advancements in communication technology and the …
digital data transmission. The advancements in communication technology and the …
A novel LSB data hiding scheme with the lowest distortion
NI Wu, MS Hwang - The Imaging Science Journal, 2017 - Taylor & Francis
The proposed scheme groups three pixels as an embedding unit to conceal three bits of
secret data in which the possible modification for each pixel is at most+ 1 or− 1. With our …
secret data in which the possible modification for each pixel is at most+ 1 or− 1. With our …
An authenticatable (2, 3) secret sharing scheme using meaningful share images based on hybrid fractal matrix
Secret image sharing (SIS) scheme is an important technology to protect secret information.
It distributes the secret data into multiple shares so that the participants can obtain the …
It distributes the secret data into multiple shares so that the participants can obtain the …
[PDF][PDF] Generalized PVO-K Embedding Technique for Reversible Data Hiding.
Recently, several reversible information hiding methods based PVO (pixel value ordering)
techniques have been proposed, in these methods, secret data always are embedded in …
techniques have been proposed, in these methods, secret data always are embedded in …
Efficient QR code authentication mechanism based on Sudoku
PC Huang, YH Li, CC Chang, Y Liu - Multimedia Tools and Applications, 2019 - Springer
QR code is an important means for delivering information which has been widely used in our
daily life. As an ISO international standard, the QR code encoding and decoding process are …
daily life. As an ISO international standard, the QR code encoding and decoding process are …
A novel (2, 3) reversible secret image sharing based on fractal matrix
This article first proposes two types of three-dimensional (3D) fractal reference matrices.
Then, a new reversible (2, 3) secret image sharing scheme based on a fractal matrix is …
Then, a new reversible (2, 3) secret image sharing scheme based on a fractal matrix is …
A reversible secret image sharing scheme based on stick insect matrix
This paper first proposes a generation algorithm of a stick insect matrix. Then, a novel
reversible secret image sharing scheme based on the stick insect matrix is presented. With …
reversible secret image sharing scheme based on the stick insect matrix is presented. With …
Reversible data hiding scheme based on VQ prediction and adaptive parametric binary tree labeling for encrypted images
In this paper, we propose a reversible data hiding scheme for the encrypted images (RDHEI)
based on vector quantization (VQ) prediction and parametric binary tree labeling (PBTL). VQ …
based on vector quantization (VQ) prediction and parametric binary tree labeling (PBTL). VQ …