2019
DOI: 10.1109/access.2019.2908924
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Reversible Information Hiding Based on Arithmetic of Quadratic Residues

Abstract: The phenomenal advances of cloud computing technology have given rise to the research area of privacy-preserving signal processing, which aims to preserve information privacy even when the signals are processed in an insecure environment. Privacy-preserving information hiding is a multidisciplinary study that has opened up a great deal of intriguing real-life applications, such as data exfiltration prevention, data origin authentication, and electronic data management. Information hiding is a practice of embed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 43 publications
(17 citation statements)
references
References 60 publications
0
17
0
Order By: Relevance
“…ere is, in addition, one further strategy for cryptospace invertible steganography. Compared with the aforementioned strategies, it suggests analysing and exploiting data redundancy after decryption rather than before or during a state of encryption [40][41][42][43][44].…”
Section: Introductionmentioning
confidence: 99%
“…ere is, in addition, one further strategy for cryptospace invertible steganography. Compared with the aforementioned strategies, it suggests analysing and exploiting data redundancy after decryption rather than before or during a state of encryption [40][41][42][43][44].…”
Section: Introductionmentioning
confidence: 99%
“…Data hiding (DH) is one technique that has been designed to hide secret messages using various cover media, i.e. images, videos, and audios files, for secret and secure communication [1–4] or the error resilience of multimedia communications [5–7]. The key point of DH lies on the imperceptible modifications made on cover media so that the human eyes have difficulty detecting any distortion caused by DH.…”
Section: Introductionmentioning
confidence: 99%
“…For example, let n be 4 and there are four overflow pixels on the same row. Suppose that their locations are (6,5), (6,7), (6,9), (6,10), respectively. Then the location sequence of these four overflow pixels is (0110 0100 0101 0111 1001 1010).…”
Section: Vacating Room For Data Embeddingmentioning
confidence: 99%
“…However, with the increasing popularity of cloud computing and storage applications, people often store or process their privacy data in cloud servers [8][9][10]. Various security issues, such as tampering, forgery, and illegal copying, continuously emerge, which make the privacy protection of digital images attract more and more attention.…”
Section: Introductionmentioning
confidence: 99%