2019
DOI: 10.1109/tcsvt.2018.2863029
|View full text |Cite
|
Sign up to set email alerts
|

A High Capacity Multi-Level Approach for Reversible Data Hiding in Encrypted Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
46
0
3

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 77 publications
(49 citation statements)
references
References 34 publications
0
46
0
3
Order By: Relevance
“…In the case of using permutation keys, the size of the key is much larger. In [24], when using the permutation key to scramble sub-blocks, the total key space can achieve [25], in addition to the block permutation key, the sub-permutation key is used to scramble the pixels in sub-blocks. The total key space reaches…”
Section: Performance Comparisonmentioning
confidence: 99%
“…In the case of using permutation keys, the size of the key is much larger. In [24], when using the permutation key to scramble sub-blocks, the total key space can achieve [25], in addition to the block permutation key, the sub-permutation key is used to scramble the pixels in sub-blocks. The total key space reaches…”
Section: Performance Comparisonmentioning
confidence: 99%
“…Next, we compare our scheme with other relevant methods [7,11,15,24,25,26 ] in embedding capacity. Chen et al [11] also reserved the embedding room using a reversible integer transformation, and it is also a SOK-type scheme.…”
Section: Comparison Experiments and Analysismentioning
confidence: 99%
“…Di et al [25] used the bitplane operation and adaptive embedding method to improve the embedding capacity of the existing schemes. Scheme [24] divided the encrypted image into blocks and embedded the secret data in each block using the histogram shifting method. Huang [26] combined the MED prediction and specific encryption algorithm to reserve the embedding room for data embedding in the encryption processing and obtained a higher embedding capacity than the above schemes.…”
Section: Comparison Experiments and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Data hiding (also called data embedding or information hiding) embeds secret data imperceptibly into a cover media, such as a video, a piece of audio, an image, etc. Since 1990s, a variety of data hiding techniques have been performing a growingly important role in privacy protection, copyright, and so on [1]- [12], [49], [50]. Traditional data hiding is usually irreversible, and the embedding process brings permanent distortion to the original host image, which is unacceptable in circumstances where a complete reconstruction of the original host image and verification of data are required, such as encrypted data annotation in the cloud environment, remote medical diagnostic and judicial forensics, and so on.…”
Section: Introductionmentioning
confidence: 99%