Fig. 1From: Adaptive and separable multiary reversible data hiding in encryption domainFlow diagram of encryption and data hidingBack to article page