“…Yu et al [41] proposed an adaptive difference recovery (ADR) based data hiding technique and then applied this technique in RDHEI to achieve high embedding capacity. Qiu et al [42] proposed a generalized framework for highcapacity RDHEI using pixel prediction and entropy encoding, which can be applied to both the RRBE and VRBE cases.…”
Section: Vrbe Based Methodsmentioning
confidence: 99%
“…Essentially, these RDHEI methods with high payload almost exploit the specific coding techniques to represent the image context with less information so that the vacated room can accommodate secret data, such as PBTL [39], entropy encoding [42] and BEME [49]. Although these single-coding techniques can achieve a high payload, there is still an improvement.…”
Section: Ss Based Methodsmentioning
confidence: 99%
“…At present, researchers have designed many RDHEI methods. The existing RDHEI methods can be mainly divided into four categories, namely, vacating room after encryption (VRAE) [20]- [25], reserving room before encryption (RRBE) [26]- [33] and vacating room by encryption (VRBE) [34]- [42] and SS based methods [43]- [49].…”
Reversible data hiding in encrypted images (RD-HEI) is an essential data security technique. Most RDHEI methods cannot perform well in embedding capacity and security. To address this issue, we propose a new RDHEI method using Chinese remainder theorem-based secret sharing (CRTSS) and hybrid coding. Specifically, a hybrid coding is first proposed for RDH to achieve high embedding capacity. At the content owner side, a novel iterative encryption is designed to conduct block based encryption for perfectly preserving the spatial correlation of original blocks in their encrypted blocks. Then, the CRTSS with the constraints is exploited to generate multiple encrypted image shares, in which spatial correlations of the encrypted blocks are also preserved. Meanwhile, the CRTSS provides good security properties for the proposed method. Since there are strong spatial correlations in the blocks of each share, the datahider can exploit the proposed hybrid coding to perform data embedding for improving capacity. On the receiver side, even if some shares are corrupted/missing, the original image can be losslessly recovered as long as enough uncorrupted marked shares are obtained. Experiment results show that the proposed RDHEI method outperforms some state-of-the-art methods, including some secret sharing (SS) based methods in terms of embedding capacity.
“…Yu et al [41] proposed an adaptive difference recovery (ADR) based data hiding technique and then applied this technique in RDHEI to achieve high embedding capacity. Qiu et al [42] proposed a generalized framework for highcapacity RDHEI using pixel prediction and entropy encoding, which can be applied to both the RRBE and VRBE cases.…”
Section: Vrbe Based Methodsmentioning
confidence: 99%
“…Essentially, these RDHEI methods with high payload almost exploit the specific coding techniques to represent the image context with less information so that the vacated room can accommodate secret data, such as PBTL [39], entropy encoding [42] and BEME [49]. Although these single-coding techniques can achieve a high payload, there is still an improvement.…”
Section: Ss Based Methodsmentioning
confidence: 99%
“…At present, researchers have designed many RDHEI methods. The existing RDHEI methods can be mainly divided into four categories, namely, vacating room after encryption (VRAE) [20]- [25], reserving room before encryption (RRBE) [26]- [33] and vacating room by encryption (VRBE) [34]- [42] and SS based methods [43]- [49].…”
Reversible data hiding in encrypted images (RD-HEI) is an essential data security technique. Most RDHEI methods cannot perform well in embedding capacity and security. To address this issue, we propose a new RDHEI method using Chinese remainder theorem-based secret sharing (CRTSS) and hybrid coding. Specifically, a hybrid coding is first proposed for RDH to achieve high embedding capacity. At the content owner side, a novel iterative encryption is designed to conduct block based encryption for perfectly preserving the spatial correlation of original blocks in their encrypted blocks. Then, the CRTSS with the constraints is exploited to generate multiple encrypted image shares, in which spatial correlations of the encrypted blocks are also preserved. Meanwhile, the CRTSS provides good security properties for the proposed method. Since there are strong spatial correlations in the blocks of each share, the datahider can exploit the proposed hybrid coding to perform data embedding for improving capacity. On the receiver side, even if some shares are corrupted/missing, the original image can be losslessly recovered as long as enough uncorrupted marked shares are obtained. Experiment results show that the proposed RDHEI method outperforms some state-of-the-art methods, including some secret sharing (SS) based methods in terms of embedding capacity.
“…In Reference [15], the encrypted image is divided into two sets, the LSBs of one set are embedded into the other to generate redundancy space, then, the image is encrypted, and the data hider can directly replace the LSBs with additional data to achieve embedding, which improves the EC. Later, more and more methods that are used to vacate the room before encryption was presented, such as the most significant bit (MSB) prediction [16], bit plane rearrangement [17], parametric binary tree labeling (PBTL) [18], and compressed coding, like sparse coding [19] and entropy coding [20]. Most of the schemes rely on image correlation and usually can obtain high EC for smooth images, while it is smaller for images with complex textures.…”
Section: In Terms Of Improving Embedding Capacitymentioning
McEliece cryptosystem is expected to be the next generation of the cryptographic algorithm due to its ability to resist quantum computing attacks. Few research studies have combined it with reversible data hiding in the encrypted domain (RDH-ED). In this article, we analysed and proved that there is a redundancy in the McEliece encryption process that is suitable for embedding. Then, a noise modulation-based scheme is proposed, called NM-RDHED, which is suitable for any signal and not only for images. The content owner scrambles the original image and then encrypts it with the receiver’s public key. The data hider generates a load noise by modulating additional data. After that, the load noise is added to the encrypted image, which achieves the data embedding. The reconstructed image is without any distortion after the direct decryption of the marked image, and the extracted data are no errors. The experimental results demonstrate our scheme has a higher embedding rate and more security, which is superior to existing schemes.
“…Unlike VRAE, the RRBE research requires a pre-processing operation to be completed prior to image encryption to release the embedding space, or more precisely, to create space in the plaintext domain [20][21][22][23][24][25][26][27][28][29][30][31]. Ma et al [20] proposed the first RRBE solution for dealing with capacity and visual quality issues in VRAE.…”
With the rapid development of network technology and the massive accumulation of user data, huge amounts of data are being rapidly generated and shared on the network, while the problems of unauthorized data access and misuse continue to emerge. Reversible data hiding in encrypted images (RDHEI) is a privacy-preserving method that embeds protected data into encrypted content and accurately extracts the embedded data without affecting the original content. However, the amount of embedded protected information has always been one of the major constraints on the performance and application of RDHEI. Currently, the main approaches to improve the net embedding capacity of RDHEI are to increase the total embedding capacity or to reduce the length of the auxiliary information to be embedded. In this paper, we propose a novel RDHEI scheme based on multi-prediction and adaptive Huffman encoding. To increase the total embedding capacity, we use the MED + GAP predictor to generate the label map data of non-reference pixels before image encryption. Then, an adaptive Huffman coding is designed to compress the generated labels to reduce the embedding length of the auxiliary information used for extraction and recovery. Experimental results show that with MED + GAP predictor and adaptive Huffman coding, the proposed method achieves a higher embedding capacity than other recent methods while ensuring security and reversibility.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.