EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Data hiding"
Narrow search

Narrow search

Year of publication
Subject
All
Data Hiding 6 Reversible Data Hiding 3 Histogram Shifting 2 data hiding 2 2D Vector Map 1 3D STL Model 1 Authentication 1 Bit Mapping 1 Blind 1 Clustering 1 DCT 1 Data Mining 1 Data Privacy Protection 1 Data hiding 1 Decision 1 Decision-making method 1 Entity Rearrangement 1 Entscheidung 1 Fragile Watermarking 1 Fundus Images 1 Fuzzification 1 Ghost Rule 1 HEVC 1 Homomorphic Property 1 Huffman coding 1 Image Encryption 1 Image Interpolation 1 Image Steganography 1 Industrial Internet of Things (IIoT) 1 Internet of Things (IoT) 1 Interpolation Error Expansion 1 LSB 1 LSB Substitution 1 Linguistics 1 Linguistik 1 Lossless 1 Lossless Watermarking 1 Lost Rule 1 Medical Image Watermarking 1 Multi-criteria analysis 1
more ... less ...
Online availability
All
Undetermined 12 Free 1
Type of publication
All
Article 12 Book / Working Paper 1
Type of publication (narrower categories)
All
Article in journal 2 Aufsatz in Zeitschrift 2 Conference Paper 1
Language
All
English 13
Author
All
Long, Min 2 Peng, Fei 2 Al Makhdhub, Dalal 1 Al Qahtani, Amal A. 1 Al Shabanat, Ghadah A. 1 Alomerini, Rawan S. 1 Chan, Chi-Shiang 1 Chen, Juan 1 Chen, Kai 1 Chen, Shuili 1 Dhivya, M. 1 Di, Fuqiang 1 Dutta, Malay Kishore 1 Feng, Xiaoqing 1 Gong, Xiaoqing 1 Huang, Yao-Hsien 1 Ismail, Sahar A. El-Rahman 1 Kim, Myung Ho 1 Kowsalyaa, K. 1 Krishnamoorthy, Sathiyapriya 1 Li, Jie 1 Lin, Ruo-Jhu 1 Liu, Jia 1 Omair, Nouf M. 1 Rajalakshmi, M. 1 Sadasivam, G. Sudha 1 Singh, Abhilasha 1 Stoyanova, Veselka T. 1 Sun, Xiao 1 Tsai, Yuan-Yu 1 Wang, Jilin 1 Wang, Nana 1 Wong, Kok-Seng 1 Wu, Dongrui 1 Xie, Jialiang 1 Xu, Dawen 1 Yue, Na 1 Zhang, Minqing 1 Zhang, Yingnan 1
more ... less ...
Published in...
All
International Journal of Digital Crime and Forensics (IJDCF) 5 Fuzzy optimization and decision making : a journal of modeling and computation under uncertainty 1 International Journal of E-Health and Medical Communications (IJEHMC) 1 International Journal of Intelligent Information Technologies (IJIIT) 1 International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 1 International Journal of Technology Diffusion (IJTD) 1 International Journal of Web Services Research (IJWSR) 1 International journal of information technology and management : IJITM 1
more ... less ...
Source
All
Other ZBW resources 10 ECONIS (ZBW) 2 EconStor 1
Showing 1 - 10 of 13
Cover Image
Steganography System Using LSB Methods
Stoyanova, Veselka T. - 2018
Steganography is the method of hiding message in a cover object for cover communication. The article deals with the steganography system which hides text inside images without losing of data (BMP, PNG, TIFF and GIF). The secret message is hidden in the cover image using Last Significant Bit...
Persistent link: https://www.econbiz.de/10011920464
Saved in:
Cover Image
Probabilistic linguistic multi-criteria decision-making based on double information under imperfect conditions
Yue, Na; Wu, Dongrui; Xie, Jialiang; Chen, Shuili - In: Fuzzy optimization and decision making : a journal of … 19 (2020) 4, pp. 391-433
Persistent link: https://www.econbiz.de/10012309944
Saved in:
Cover Image
An improved reversible data hiding scheme based on pixel permutation
Wang, Jilin; Sun, Xiao; Feng, Xiaoqing - In: International journal of information technology and … 18 (2019) 1, pp. 110-125
Persistent link: https://www.econbiz.de/10012056970
Saved in:
Cover Image
An Efficient Reversible Data Hiding Scheme for Encrypted Images
Chen, Kai; Xu, Dawen - In: International Journal of Digital Crime and Forensics (IJDCF) 10 (2018) 2, pp. 1-22
Reversible data hiding in the encrypted domain is an emerging technology, as it can preserve the confidentiality. In … this article, an efficient method of reversible data hiding in encrypted images is proposed. The cover image is first … the data-hiding key only. If the receiver has the encryption key only, he/she can recover the original image approximately …
Persistent link: https://www.econbiz.de/10012043964
Saved in:
Cover Image
A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network
Long, Min; Peng, Fei; Gong, Xiaoqing - In: International Journal of Digital Crime and Forensics (IJDCF) 10 (2018) 2, pp. 23-39
video coding (HEVC) based on sigh data hiding (SDH) is proposed. The encryption is tightly integrated with the encoding …
Persistent link: https://www.econbiz.de/10012043965
Saved in:
Cover Image
Reversible Data Hiding for Encrypted Image Based on Interpolation Error Expansion
Di, Fuqiang; Zhang, Minqing; Zhang, Yingnan; Liu, Jia - In: International Journal of Mobile Computing and … 9 (2018) 4, pp. 76-96
A novel reversible data hiding algorithm for encrypted image based on interpolation error expansion is proposed. The …
Persistent link: https://www.econbiz.de/10012046499
Saved in:
Cover Image
A Lossless Watermarking for 3D STL Model Based on Entity Rearrangement and Bit Mapping
Chen, Juan; Peng, Fei; Li, Jie; Long, Min - In: International Journal of Digital Crime and Forensics (IJDCF) 9 (2017) 2, pp. 25-37
With the wide application of 3D STL model in 3D printing, much attention has been paid to its content security and copyright protection. Based on entity rearrangement and bit mapping, a lossless and high capacity watermarking scheme is proposed for 3D STL model. Experimental results and analysis...
Persistent link: https://www.econbiz.de/10012043941
Saved in:
Cover Image
A Reversible Data Hiding Scheme for Efficient Management of Tele-Ophthalmological Data
Singh, Abhilasha; Dutta, Malay Kishore - In: International Journal of E-Health and Medical … 8 (2017) 3, pp. 38-54
Advancements in medical sciences and induction of advanced technologies have led to increased role of medical images in tele-diagnosis. This paper proposes a technique for easy, efficient and accurate management of distributed medical databases and alleviates the risk of any distortion in images...
Persistent link: https://www.econbiz.de/10012044439
Saved in:
Cover Image
Privacy Preserving Fuzzy Association Rule Mining in Data Clusters Using Particle Swarm Optimization
Krishnamoorthy, Sathiyapriya; Sadasivam, G. Sudha; … - In: International Journal of Intelligent Information … 13 (2017) 2, pp. 1-20
An association rule is classified as sensitive if its thread of revelation is above certain confidence value. If these sensitive rules were revealed to the public, it is possible to deduce sensitive knowledge from the published data and offers benefit for the business competitors. Earlier...
Persistent link: https://www.econbiz.de/10012045502
Saved in:
Cover Image
Privacy Protection for Data-Driven Smart Manufacturing Systems
Wong, Kok-Seng; Kim, Myung Ho - In: International Journal of Web Services Research (IJWSR) 14 (2017) 3, pp. 17-32
The Industrial Internet of Things (IIoT) is a new industrial ecosystem that combines intelligent and autonomous machines, advanced predictive analytics, and machine-human collaboration to improve productivity, efficiency and reliability. The integration of industry and IoT creates various attack...
Persistent link: https://www.econbiz.de/10012048755
Saved in:
  • 1
  • 2
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...