Fig. 11From: Adaptive and separable multiary reversible data hiding in encryption domainPerformance comparisons between the methods [18, 20, 33], and the proposed method in terms of ER versus PSNRBack to article page