Fig. 4From: Adaptive and separable multiary reversible data hiding in encryption domainExamples of encryption and data hidingBack to article page