2018
DOI: 10.1007/s10586-018-1765-3
|View full text |Cite
|
Sign up to set email alerts
|

An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…The original data of an owner is encrypted using the ECC algorithm, which applies some fully homomorphic (FH) operation on the encrypted data before storing it during cloud computation. A study 15 proposed an encryption approach through reversible data hiding (RDH) technique for cloud computation. RDH encrypts an image by embedding hidden data using a bit shifting algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…The original data of an owner is encrypted using the ECC algorithm, which applies some fully homomorphic (FH) operation on the encrypted data before storing it during cloud computation. A study 15 proposed an encryption approach through reversible data hiding (RDH) technique for cloud computation. RDH encrypts an image by embedding hidden data using a bit shifting algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…The first category is the spatial domain which consists of a watermark embedding directly into the image. The second category of the algorithm is embedding in the transform domain [11]. When the watermark is embedded in the frequency domain, the benefits are, the spectral components better capture the peculiarities of the human visual system (HVS).…”
Section: Introductionmentioning
confidence: 99%
“…Frequency methods remain more recent methods whose principle is to insert the mark not directly in the image but in the transformed domain. To obtain the marked image, inverse transform is performed [ 8 ]. These methods are more resistant to geometric attacks [ 9 ].…”
Section: Introductionmentioning
confidence: 99%