A survey of interpolation-based reversible data hiding methods
It is called as a reversible data hiding method when the cover object can be restored together with extracting the secret data at a receiver. In reversible data hiding, interpolation-based data hiding methods are recently proposed, where image interpolation techniques are used before embedding the s...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2018-04, Vol.77 (7), p.7795-7810 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 7810 |
---|---|
container_issue | 7 |
container_start_page | 7795 |
container_title | Multimedia tools and applications |
container_volume | 77 |
creator | Jung, Ki-Hyun |
description | It is called as a reversible data hiding method when the cover object can be restored together with extracting the secret data at a receiver. In reversible data hiding, interpolation-based data hiding methods are recently proposed, where image interpolation techniques are used before embedding the secret data. In this paper, reversible data hiding methods using interpolation techniques are described and analyzed on the embedding capacity and the visual image quality that many researchers have tried to improve these different measurements. It is concluded with the directions of research with some recommendations. |
doi_str_mv | 10.1007/s11042-017-5066-2 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2022080285</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2022080285</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-6b750e02bc5589d32a330261688c75244cadc1a2640f51c118adbb761b183b093</originalsourceid><addsrcrecordid>eNp1kMtKAzEUhoMoWKsP4G7AdfScZHLpRijFGxTc6DokmUw7pZ3UZFrw7U0ZwZWr8y_-y-Ej5BbhHgHUQ0aEmlFARQVISdkZmaBQnCrF8LxoroEqAXhJrnLeAKAUrJ6Qx3mVD-kYvqvYVl0_hLSPWzt0safO5tBUKRxDyp3bhqqxg63WXdP1q2oXhnVs8jW5aO02h5vfOyWfz08fi1e6fH95W8yX1HOUA5WuTAdgzguhZw1nlnNgEqXWXpU_am8bj5bJGlqBHlHbxjkl0aHmDmZ8Su7G3n2KX4eQB7OJh9SXScOAMdDAtCguHF0-xZxTaM0-dTubvg2COWEyIyZTMJkTJsNKho2ZXLz9KqS_5v9DPySAaMI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2022080285</pqid></control><display><type>article</type><title>A survey of interpolation-based reversible data hiding methods</title><source>SpringerLink Journals - AutoHoldings</source><creator>Jung, Ki-Hyun</creator><creatorcontrib>Jung, Ki-Hyun</creatorcontrib><description>It is called as a reversible data hiding method when the cover object can be restored together with extracting the secret data at a receiver. In reversible data hiding, interpolation-based data hiding methods are recently proposed, where image interpolation techniques are used before embedding the secret data. In this paper, reversible data hiding methods using interpolation techniques are described and analyzed on the embedding capacity and the visual image quality that many researchers have tried to improve these different measurements. It is concluded with the directions of research with some recommendations.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-017-5066-2</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Computer Communication Networks ; Computer Science ; Data Structures and Information Theory ; Embedding ; Image quality ; Interpolation ; Methods ; Multimedia Information Systems ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2018-04, Vol.77 (7), p.7795-7810</ispartof><rights>Springer Science+Business Media, LLC 2017</rights><rights>Multimedia Tools and Applications is a copyright of Springer, (2017). All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-6b750e02bc5589d32a330261688c75244cadc1a2640f51c118adbb761b183b093</citedby><cites>FETCH-LOGICAL-c316t-6b750e02bc5589d32a330261688c75244cadc1a2640f51c118adbb761b183b093</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-017-5066-2$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-017-5066-2$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,777,781,27905,27906,41469,42538,51300</link.rule.ids></links><search><creatorcontrib>Jung, Ki-Hyun</creatorcontrib><title>A survey of interpolation-based reversible data hiding methods</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>It is called as a reversible data hiding method when the cover object can be restored together with extracting the secret data at a receiver. In reversible data hiding, interpolation-based data hiding methods are recently proposed, where image interpolation techniques are used before embedding the secret data. In this paper, reversible data hiding methods using interpolation techniques are described and analyzed on the embedding capacity and the visual image quality that many researchers have tried to improve these different measurements. It is concluded with the directions of research with some recommendations.</description><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Data Structures and Information Theory</subject><subject>Embedding</subject><subject>Image quality</subject><subject>Interpolation</subject><subject>Methods</subject><subject>Multimedia Information Systems</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp1kMtKAzEUhoMoWKsP4G7AdfScZHLpRijFGxTc6DokmUw7pZ3UZFrw7U0ZwZWr8y_-y-Ej5BbhHgHUQ0aEmlFARQVISdkZmaBQnCrF8LxoroEqAXhJrnLeAKAUrJ6Qx3mVD-kYvqvYVl0_hLSPWzt0safO5tBUKRxDyp3bhqqxg63WXdP1q2oXhnVs8jW5aO02h5vfOyWfz08fi1e6fH95W8yX1HOUA5WuTAdgzguhZw1nlnNgEqXWXpU_am8bj5bJGlqBHlHbxjkl0aHmDmZ8Su7G3n2KX4eQB7OJh9SXScOAMdDAtCguHF0-xZxTaM0-dTubvg2COWEyIyZTMJkTJsNKho2ZXLz9KqS_5v9DPySAaMI</recordid><startdate>20180401</startdate><enddate>20180401</enddate><creator>Jung, Ki-Hyun</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20180401</creationdate><title>A survey of interpolation-based reversible data hiding methods</title><author>Jung, Ki-Hyun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-6b750e02bc5589d32a330261688c75244cadc1a2640f51c118adbb761b183b093</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Data Structures and Information Theory</topic><topic>Embedding</topic><topic>Image quality</topic><topic>Interpolation</topic><topic>Methods</topic><topic>Multimedia Information Systems</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jung, Ki-Hyun</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jung, Ki-Hyun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A survey of interpolation-based reversible data hiding methods</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2018-04-01</date><risdate>2018</risdate><volume>77</volume><issue>7</issue><spage>7795</spage><epage>7810</epage><pages>7795-7810</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>It is called as a reversible data hiding method when the cover object can be restored together with extracting the secret data at a receiver. In reversible data hiding, interpolation-based data hiding methods are recently proposed, where image interpolation techniques are used before embedding the secret data. In this paper, reversible data hiding methods using interpolation techniques are described and analyzed on the embedding capacity and the visual image quality that many researchers have tried to improve these different measurements. It is concluded with the directions of research with some recommendations.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-017-5066-2</doi><tpages>16</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2018-04, Vol.77 (7), p.7795-7810 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2022080285 |
source | SpringerLink Journals - AutoHoldings |
subjects | Computer Communication Networks Computer Science Data Structures and Information Theory Embedding Image quality Interpolation Methods Multimedia Information Systems Special Purpose and Application-Based Systems |
title | A survey of interpolation-based reversible data hiding methods |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T20%3A51%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20survey%20of%20interpolation-based%20reversible%20data%20hiding%20methods&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Jung,%20Ki-Hyun&rft.date=2018-04-01&rft.volume=77&rft.issue=7&rft.spage=7795&rft.epage=7810&rft.pages=7795-7810&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-017-5066-2&rft_dat=%3Cproquest_cross%3E2022080285%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2022080285&rft_id=info:pmid/&rfr_iscdi=true |