A watermarking algorithm is proposed in this paper to address the copyri...
The utilization of implicit representation for visual data (such as imag...
With the popularization and application of privacy protection technologi...
Considering the prospects of public key embedding (PKE) mechanism in act...
Reversible data hiding in encrypted domain (RDH-ED) schemes based on
sym...
Object detection using an oriented bounding box (OBB) can better target
...
In the past few years, the Generative Adversarial Network (GAN) which
pr...
This paper proposes a fully homomorphic encryption encapsulated differen...
This paper focuses on several theoretical issues and principles in
stega...
In this paper, a new data-driven information hiding scheme called genera...
In order to keep the data secret, various techniques have been implement...
In order to keep the data secret, various techniques have been implement...
In this paper, a new framework for construction of Cardan grille for
inf...
Traditional image steganography modifies the content of the image more o...
The distortion in steganography that usually comes from the modification...