2012
DOI: 10.1109/lsp.2012.2187334
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Reversible Data Hiding in Encrypted Images Using Side Match

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
396
0
4

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 572 publications
(400 citation statements)
references
References 11 publications
0
396
0
4
Order By: Relevance
“…The decoder side by further exploiting the spatial correlation using a dissimilar estimation equation and side match technique. For both methods in [10] and [11], decrypting image and extracting data must be jointly executed. Recently, Zhou et al [12] proposed a novel RDH-EI method for joint decryption and extraction, in which the correlation of plaintexts is further exploited by distinguishing the encrypted and non-encrypted pixel blocks with a twoclass SVM classifier.…”
Section: IImentioning
confidence: 99%
“…The decoder side by further exploiting the spatial correlation using a dissimilar estimation equation and side match technique. For both methods in [10] and [11], decrypting image and extracting data must be jointly executed. Recently, Zhou et al [12] proposed a novel RDH-EI method for joint decryption and extraction, in which the correlation of plaintexts is further exploited by distinguishing the encrypted and non-encrypted pixel blocks with a twoclass SVM classifier.…”
Section: IImentioning
confidence: 99%
“…Then according to the result the bit by bit data is embedded into the image. In this way the distortion analysis is done & it is helpful to remove the distortion in the covering media & to get the original cover back [3].…”
Section: Theory a Reversible Data Hiding Techniquesmentioning
confidence: 99%
“…The proposed method is separable for data extraction and image recovery, the same as the methods [11] and [12]. Errors may happen in the recovered image depending on the block size when using the methods [9] and [10], while the proposed method can perfectly recover the original image on the receiver side. Another important feature in Table 2 is whether the RDH method needs pre-processing for reserving embedding room for data hiding in encrypted image.…”
Section: Imagesmentioning
confidence: 99%
“…In [9], Zhang divides the encrypted image into blocks, and embeds one bit into each block by flipping 3 LSBs of the half of the pixels in the block. Hong et al [10] provided an improved version of Zhang's method, by exploiting the correlation of the border of neighboring blocks, and using the side-match scheme to achieve a lower error rate. These two methods can be realized because of the spatial correlation in the decrypted image.…”
Section: Introductionmentioning
confidence: 99%