咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 3 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 计算机科学与技术...
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 4 篇 reversible data ...
  • 1 篇 reservoir comput...
  • 1 篇 homomorphic encr...
  • 1 篇 optical imaging
  • 1 篇 data integration
  • 1 篇 median preservin...
  • 1 篇 embedding capaci...
  • 1 篇 data fusion stra...
  • 1 篇 reversible data ...
  • 1 篇 optical chaotic ...
  • 1 篇 pixel value orde...
  • 1 篇 additive secret ...
  • 1 篇 correlation
  • 1 篇 imperceptibility
  • 1 篇 secure protocol
  • 1 篇 encryption
  • 1 篇 pixel expansion
  • 1 篇 difference-prese...
  • 1 篇 stimulated emiss...
  • 1 篇 cryptography

机构

  • 1 篇 sastra deemed un...
  • 1 篇 jinan university
  • 1 篇 school of comput...
  • 1 篇 southwest univ c...
  • 1 篇 natl cent univ d...
  • 1 篇 sastra deemed un...
  • 1 篇 natl chiayi univ...
  • 1 篇 yuan ze univ dep...
  • 1 篇 nanjing univ aer...
  • 1 篇 key lab networks...
  • 1 篇 yuan ze univ int...
  • 1 篇 chongqing key la...

作者

  • 1 篇 chen zhuang
  • 1 篇 zhou wenhao
  • 1 篇 li lili
  • 1 篇 jiang xiao
  • 1 篇 ye yichen
  • 1 篇 anushiadevi r.
  • 1 篇 weng jian
  • 1 篇 xu fang
  • 1 篇 huang cheng-ta
  • 1 篇 zhang yushu
  • 1 篇 praveenkumar pad...
  • 1 篇 xia zhihua
  • 1 篇 xiong lizhi
  • 1 篇 weng chi-yao
  • 1 篇 su ye
  • 1 篇 rayappan john bo...
  • 1 篇 weng hao-yu
  • 1 篇 lin tsai-wei
  • 1 篇 amirtharajan ren...
  • 1 篇 xie yiyuan

语言

  • 4 篇 英文
检索条件"主题词=Reversible data hiding in encrypted image"
4 条 记 录,以下是1-10 订阅
排序:
reversible data hiding in encrypted images Using Reservoir Computing-Based data Fusion Strategy
收藏 引用
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 2025年 第1期35卷 684-697页
作者: Jiang, Xiao Xie, Yiyuan Zhang, Yushu Ye, Yichen Xu, Fang Li, Lili Su, Ye Chen, Zhuang Southwest Univ Coll Elect & Informat Engn Chongqing 400715 Peoples R China Key Lab Networks & Cloud Comp Secur Univ Chongqing Chongqing 400715 Peoples R China Chongqing Key Lab Nonlinear Circuits & Intelligent Chongqing 400715 Peoples R China Nanjing Univ Aeronaut & Astronaut Coll Comp Sci & Technol Nanjing 211106 Peoples R China
reversible data hiding in encrypted image (RDHEI) is a powerful security technology that aims to hide data into the encrypted image without any distortions of data extraction and image recovery. Most existing RDHEI me... 详细信息
来源: 评论
Enhanced reversible data hiding in encrypted images via median preserving pixel value ordering and block-wise difference preservation
收藏 引用
SIGNAL image AND VIDEO PROCESSING 2025年 第6期19卷 1-13页
作者: Weng, Chi-Yao Lin, Tsai-Wei Weng, Hao-Yu Huang, Cheng-Ta Natl Chiayi Univ Dept Comp Sci & Informat Engn Chiayi 60004 Taiwan Yuan Ze Univ Dept Informat Management Taoyuan 32003 Taiwan Natl Cent Univ Dept Comp Sci & Informat Engn Taoyuan 32001 Taiwan Yuan Ze Univ Int Bachelor Program Informat Taoyuan 32003 Taiwan
reversible data hiding in encrypted images (RDHEI) has gained significant importance in the age of cloud computing and digital privacy, where securely embedding data into encrypted media without altering the original ... 详细信息
来源: 评论
A Universal Framework for reversible data hiding in encrypted images with Multiple Hiders
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Xiong, Lizhi Zhou, Wenhao Xia, Zhihua Weng, Jian School of Computer and Software Nanjing University of Information science and Technology Nanjing China Jinan University Guangzhou China
Recently, reversible data hiding in encrypted images with Multiple Hiders (RDHEI-MH) has attracted the attention of researchers, as it can satisfy the requirements of multiparty embedding. In this paper, a universal f... 详细信息
来源: 评论
reversible data hiding method based on pixel expansion and homomorphic encryption
收藏 引用
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2020年 第3期39卷 2977-2990页
作者: Anushiadevi, R. Praveenkumar, Padmapriya Rayappan, John Bosco Balaguru Amirtharajan, Rengarajan SASTRA Deemed Univ Sch Comp Thirumalaisamudram Thanjavur India SASTRA Deemed Univ Sch Elect & Elect Engn SEEE Thirumalaisamudram Thanjavur India
Digital image steganography algorithms usually suffer from a lossy restoration of the cover content after extraction of a secret message. When a cover object and confidential information are both utilised, the reversi... 详细信息
来源: 评论