Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access


    An Efficient EMD-Based Reversible Data Hiding Technique Using Dual Stego Images

    Ahmad A. Mohammad*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1139-1156, 2023, DOI:10.32604/cmc.2023.035964

    Abstract Exploiting modification direction (EMD) based data hiding techniques (DHTs) provide moderate data hiding capacity and high-quality stego images. The overflow problem and the cyclic nature of the extraction function essentially hinder their application in several fields in which reversibility is necessary. Thus far, the few EMD reversible DHTs are complex and numerically demanding. This paper presents a novel EMD-based reversible DHT using dual-image. Two novel 2 × 4 modification lookup tables are introduced, replacing the reference matrix used in similar techniques and eliminating the numerically demanding search step in similar techniques. In the embedding step, one of the modification tables modifies a… More >

  • Open Access


    High Capacity Data Hiding in Encrypted Image Based on Compressive Sensing for Nonequivalent Resources

    Di Xiao1,*, Jia Liang1, Qingqing Ma1, Yanping Xiang1, Yushu Zhang2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 1-13, 2019, DOI:10.32604/cmc.2019.02171

    Abstract To fulfill the requirements of data security in environments with nonequivalent resources, a high capacity data hiding scheme in encrypted image based on compressive sensing (CS) is proposed by fully utilizing the adaptability of CS to nonequivalent resources. The original image is divided into two parts: one part is encrypted with traditional stream cipher; the other part is turned to the prediction error and then encrypted based on CS to vacate room simultaneously. The collected non-image data is firstly encrypted with simple stream cipher. For data security management, the encrypted non-image data is then embedded into the encrypted image, and… More >

Displaying 1-10 on page 1 of 2. Per Page  

Share Link