2015
DOI: 10.1016/j.image.2015.09.014
|View full text |Cite
|
Sign up to set email alerts
|

Encrypted image-based reversible data hiding with public key cryptography from difference expansion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
85
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 133 publications
(99 citation statements)
references
References 25 publications
0
85
1
Order By: Relevance
“…To further improve the embedding rate, the PSNR will be reduced and more secret bits will be embedded using VE. Compared with other related methods including Wu et al [31], Shiu et al [29], and Chen et al [28], the proposed method has a better performance in terms of the embedding rate and PSNR.…”
Section: Algorithmmentioning
confidence: 82%
See 2 more Smart Citations
“…To further improve the embedding rate, the PSNR will be reduced and more secret bits will be embedded using VE. Compared with other related methods including Wu et al [31], Shiu et al [29], and Chen et al [28], the proposed method has a better performance in terms of the embedding rate and PSNR.…”
Section: Algorithmmentioning
confidence: 82%
“…technology for protecting image content security although it is not efficient enough. Table 3 denotes signal expansion between our method and the selected methods, including Wu et al [31], Shiu et al [29], and Chen et al [28]. According to Paillier encryption, the size of the cipher space is square of the size of the message space.…”
Section: Data Extraction and Image Recovery Phasementioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, some RDH methods for encrypted images have been proposed. In general, these methods can be divided into three categories, that is, methods by vacating room after encryption (VRAE) [18][19][20][21][22][23][24], methods by reserving room before encryption (RRBE) [25][26][27][28], and methods based on homomorphic encryption [29][30][31][32][33][34]. In VRAE framework, the original signal is encrypted directly by the content owner, and the data hider embeds the additional bits by modifying some bits of the encrypted data.…”
Section: Security and Communication Networkmentioning
confidence: 99%
“…The basics of the proposed technique are to preprocess an image with the quality of various expansions before encryption of an image. This technique gives good payload and improves quality of image [11]. In the data transmission, security is the most significant and important issue over network.…”
Section: Introductionmentioning
confidence: 99%