4.6 Article

An efficient reversible data hiding method for AMBTC compressed images

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Hybrid secret hiding schemes based on absolute moment block truncation coding

Ying-Hsuan Huang et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

A high payload data hiding scheme based on modified AMBTC technique

Aruna Malik et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Telecommunications

Fingerprint liveness detection based on multi-scale LPQ and PCA

Chengsheng Yuan et al.

China Communications (2016)

Article Computer Science, Theory & Methods

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

Zhihua Xia et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Article Computer Science, Information Systems

Steganalysis of LSB matching using differences between nonadjacent pixels

Zhihua Xia et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Theory & Methods

Segmentation-Based Image Copy-Move Forgery Detection Scheme

Jian Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Engineering, Electrical & Electronic

Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing

Zhangjie Fu et al.

IEICE TRANSACTIONS ON COMMUNICATIONS (2015)

Article Computer Science, Information Systems

Reversible data hiding using Delaunay triangulation and selective embedment

Wien Hong et al.

INFORMATION SCIENCES (2015)

Article Computer Science, Information Systems

A rapid learning algorithm for vehicle classification

Xuezhi Wen et al.

INFORMATION SCIENCES (2015)

Article Computer Science, Artificial Intelligence

Incremental learning for ν-Support Vector Regression

Bin Gu et al.

NEURAL NETWORKS (2015)

Article Engineering, Electrical & Electronic

Encrypted image-based reversible data hiding with public key cryptography from difference expansion

Chih-Wei Shiu et al.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2015)

Article Computer Science, Artificial Intelligence

Incremental Support Vector Learning for Ordinal Regression

Bin Gu et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2015)

Article Engineering, Electrical & Electronic

Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing

Zhangjie Fu et al.

IEICE TRANSACTIONS ON COMMUNICATIONS (2015)

Article Computer Science, Artificial Intelligence

Color Image Analysis by Quaternion-Type Moments

Beijing Chen et al.

JOURNAL OF MATHEMATICAL IMAGING AND VISION (2015)

Article Computer Science, Information Systems

A novel reversible data hiding scheme based on AMBTC compression technique

Chia-Chen Lin et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2015)

Article Computer Science, Information Systems

High payload image steganography with minimum distortion based on absolute moment block truncation coding

Duanhao Ou et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2015)

Article Computer Science, Information Systems

Steganalysis of least significant bit matching using multi-order differences

Zhihua Xia et al.

SECURITY AND COMMUNICATION NETWORKS (2014)

Article Engineering, Electrical & Electronic

Reversible Data Hiding for BTC-Compressed Images Based on Lossless Coding of Mean Tables

Yong Zhang et al.

IEICE TRANSACTIONS ON COMMUNICATIONS (2013)

Article Computer Science, Information Systems

Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique

Wien Hong

INFORMATION SCIENCES (2013)

Article Engineering, Electrical & Electronic

High performance reversible data hiding for block truncation coding compressed images

Wei Sun et al.

SIGNAL IMAGE AND VIDEO PROCESSING (2013)

Article Computer Science, Theory & Methods

A Novel Data Embedding Method Using Adaptive Pixel Pair Matching

Wien Hong et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Imaging Science & Photographic Technology

Steganography for BTC compressed images using no distortion technique

Jeanne Chen et al.

IMAGING SCIENCE JOURNAL (2010)

Article Computer Science, Software Engineering

Reversible data hiding for high quality images using modification of prediction errors

Wien Hong et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2009)

Article Computer Science, Artificial Intelligence

A lossless data embedding technique by joint neighboring coding

Chin-Chen Chang et al.

PATTERN RECOGNITION (2009)

Article Engineering, Electrical & Electronic

Reversible data hiding

ZC Ni et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2006)

Article Engineering, Electrical & Electronic

Reversible data embedding using a difference expansion

J Tian

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2003)

Article Computer Science, Information Systems

A steganographic method based upon JPEG and quantization table modification

CC Chang et al.

INFORMATION SCIENCES (2002)