Fig. 8.
From: Adaptive and separable multiary reversible data hiding in encryption domain

Encryption results of Li et al.’s work [20]
From: Adaptive and separable multiary reversible data hiding in encryption domain
Encryption results of Li et al.’s work [20]