2017
DOI: 10.1186/s13634-017-0496-6
|View full text |Cite
|
Sign up to set email alerts
|

Efficient reversible data hiding in encrypted image with public key cryptosystem

Abstract: This paper proposes a new reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. The proposed method can embed additional data directly into encrypted image without any preprocessing operations on original image. By selecting two pixels as a group for encryption, data hider can retrieve the absolute differences of groups of two pixels by employing a modular multiplicative inverse method. Additional data can be embedded into encrypted image… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(29 citation statements)
references
References 26 publications
0
28
1
Order By: Relevance
“…Figure 1 plots the sketch of the proposed scheme, which is composed of four main phases: image encryption, data hiding, data extraction and image restoration. For the data hiding algorithm, refer to [ 23 ]. Reversible data hiding is an effective authentication or content integrity verification technique in which hidden data can be completely extracted and the original carrier can be recovered non-destructively after data extraction [ 30 ].…”
Section: Reversible Data Hiding Scheme With Public Key Cryptosystementioning
confidence: 99%
See 3 more Smart Citations
“…Figure 1 plots the sketch of the proposed scheme, which is composed of four main phases: image encryption, data hiding, data extraction and image restoration. For the data hiding algorithm, refer to [ 23 ]. Reversible data hiding is an effective authentication or content integrity verification technique in which hidden data can be completely extracted and the original carrier can be recovered non-destructively after data extraction [ 30 ].…”
Section: Reversible Data Hiding Scheme With Public Key Cryptosystementioning
confidence: 99%
“…In [ 22 ], the authors proposed another algorithm based on discrete fourier transform and compressive sensing in encrypted domain. In [ 23 , 24 ], the authors proposed two methods for reversible data hiding by using Paillier cryptosystem. In [ 23 ], two adjacent pixels as a group are encrypted and then the differences of the two adjacent pixels in each group are computed to generate a difference histogram.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…It is because the homomorphic encryption data can be processed by the third party, a few researches on image homomorphic encryption [16][17][18][19][20][21] and speech homomorphic encryption [22][23] are proposed. In [16][17][18], the original images are encrypted by Paillier homomorphic cryptosystem, and secret data is embedded in the encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. They efficiently embed and extract secret data to perform reversible data hiding in encrypted domain.…”
Section: Introductionmentioning
confidence: 99%