Fig. 3From: Adaptive and separable multiary reversible data hiding in encryption domainPEH before and after stream cipherBack to article page