Research Article

Noise Modulation-Based Reversible Data Hiding with McEliece Encryption

Figure 8

Histogram of images before and after embedding data: (a) histogram of the original image, (b) histogram of the encrypted image, and (c) histogram of the marked image.
(a)
(b)
(c)