Data hiding technology has achieved many technological developments through continuous research over the past 20 years along with the development of Internet technology and is one of the research fields that are still receiving attention. In the beginning, there were an intensive amount of studies on digital copyright issues, and since then, interest in the field of secret communications has been increasing. In addition, research on various security issues using this technology is being actively conducted. Research on data hiding is mainly based on images and videos, and there are many studies using JPEG and BMP in particular. This may be due to the use of redundant bits that are characteristic of data hiding techniques. On the other hand, ...
In this era of rapid development of information technique, Internet has become the main conduit of i...
This paper describes a survey on reversible data hiding in encrypted images. Data hiding is a proces...
Nowadays, the volume of data shared over the Internet is growing. As a result, data security is refe...
Data hiding is the art of embedding data into a cover image without any perceptual distortion of the...
Data hiding in the compression domain is a very common method. Nowadays, the images to be transferre...
In recent years, the studies of image processing become advanced rapidly. These applications include...
Data hiding is a way of hiding secret data on cover-media and it is used for a variety of applicatio...
In this paper, we proposed a hybrid data hiding scheme to embed secret data into block truncation co...
[[abstract]]Data hiding technique is using a cover medium to conceal secret data and delivering it t...
[[abstract]]The data-hiding approach in the data compression domain has recently become of great int...
[[abstract]]In this thesis, we propose a reversible data hiding scheme based on Block Truncation Cod...
Preventing secret from being suspicious during transferring over Internet has become an emergent iss...
[[abstract]]The increasing popularity of multimedia network technology, data transmission on the Int...
ABSTRACT: Data hiding has a vital role to play in information security. Using a data hiding techniqu...
As the amplification of internet is one of the main feature of information technology, data hiding t...
In this era of rapid development of information technique, Internet has become the main conduit of i...
This paper describes a survey on reversible data hiding in encrypted images. Data hiding is a proces...
Nowadays, the volume of data shared over the Internet is growing. As a result, data security is refe...
Data hiding is the art of embedding data into a cover image without any perceptual distortion of the...
Data hiding in the compression domain is a very common method. Nowadays, the images to be transferre...
In recent years, the studies of image processing become advanced rapidly. These applications include...
Data hiding is a way of hiding secret data on cover-media and it is used for a variety of applicatio...
In this paper, we proposed a hybrid data hiding scheme to embed secret data into block truncation co...
[[abstract]]Data hiding technique is using a cover medium to conceal secret data and delivering it t...
[[abstract]]The data-hiding approach in the data compression domain has recently become of great int...
[[abstract]]In this thesis, we propose a reversible data hiding scheme based on Block Truncation Cod...
Preventing secret from being suspicious during transferring over Internet has become an emergent iss...
[[abstract]]The increasing popularity of multimedia network technology, data transmission on the Int...
ABSTRACT: Data hiding has a vital role to play in information security. Using a data hiding techniqu...
As the amplification of internet is one of the main feature of information technology, data hiding t...
In this era of rapid development of information technique, Internet has become the main conduit of i...
This paper describes a survey on reversible data hiding in encrypted images. Data hiding is a proces...
Nowadays, the volume of data shared over the Internet is growing. As a result, data security is refe...