Reversible data hiding with hierarchical block variable length coding for cloud security

S Xu, JH Horng, CC Chang… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Reversible data hiding in encrypted images (RDHEI) can serve as a technical solution to
secure data in applications that rely on cloud storage. The key features of an RDHEI scheme …

High-capacity reversible data hiding in encrypted images based on adaptive block encoding

K Gao, JH Horng, CC Chang - Journal of Visual Communication and Image …, 2022 - Elsevier
This paper proposes a new high-capacity reversible data hiding scheme in encrypted
images. The content owner first divides the cover image into blocks. Then, the block …

Reversible data hiding scheme during encryption using machine learning

VM Manikandan, V Masilamani - Procedia computer science, 2018 - Elsevier
Reversible data hiding (RDH) is a recent research field of information security for secured
digital data transmission. The advancements in communication technology and the …

A novel LSB data hiding scheme with the lowest distortion

NI Wu, MS Hwang - The Imaging Science Journal, 2017 - Taylor & Francis
The proposed scheme groups three pixels as an embedding unit to conceal three bits of
secret data in which the possible modification for each pixel is at most+ 1 or− 1. With our …

An authenticatable (2, 3) secret sharing scheme using meaningful share images based on hybrid fractal matrix

K Gao, JH Horng, CC Chang - IEEE access, 2021 - ieeexplore.ieee.org
Secret image sharing (SIS) scheme is an important technology to protect secret information.
It distributes the secret data into multiple shares so that the participants can obtain the …

[PDF][PDF] Generalized PVO-K Embedding Technique for Reversible Data Hiding.

J Li, YH Wu, CF Lee, CC Chang - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Recently, several reversible information hiding methods based PVO (pixel value ordering)
techniques have been proposed, in these methods, secret data always are embedded in …

Efficient QR code authentication mechanism based on Sudoku

PC Huang, YH Li, CC Chang, Y Liu - Multimedia Tools and Applications, 2019 - Springer
QR code is an important means for delivering information which has been widely used in our
daily life. As an ISO international standard, the QR code encoding and decoding process are …

A novel (2, 3) reversible secret image sharing based on fractal matrix

K Gao, JH Horng, CC Chang - IEEE access, 2020 - ieeexplore.ieee.org
This article first proposes two types of three-dimensional (3D) fractal reference matrices.
Then, a new reversible (2, 3) secret image sharing scheme based on a fractal matrix is …

A reversible secret image sharing scheme based on stick insect matrix

K Gao, JH Horng, Y Liu, CC Chang - Ieee Access, 2020 - ieeexplore.ieee.org
This paper first proposes a generation algorithm of a stick insect matrix. Then, a novel
reversible secret image sharing scheme based on the stick insect matrix is presented. With …

Reversible data hiding scheme based on VQ prediction and adaptive parametric binary tree labeling for encrypted images

S Xu, JH Horng, CC Chang - IEEE Access, 2021 - ieeexplore.ieee.org
In this paper, we propose a reversible data hiding scheme for the encrypted images (RDHEI)
based on vector quantization (VQ) prediction and parametric binary tree labeling (PBTL). VQ …