2016
DOI: 10.1109/tcsvt.2015.2418611
|View full text |Cite
|
Sign up to set email alerts
|

Reversible Data Hiding in Encrypted Images With Distributed Source Encoding

Abstract: Abstract-This paper proposes a novel scheme of reversible data hiding (RDH) in encrypted images using distributed source coding (DSC). After the original image is encrypted by the content owner using a stream cipher, the data-hider compresses a series of selected bits taken from the encrypted image to make room for the secret data. The selected bit series is Slepian-Wolf encoded using low density parity check (LDPC) codes. On the receiver side, the secret bits can be extracted if the image receiver has the e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
116
0
2

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 253 publications
(118 citation statements)
references
References 29 publications
0
116
0
2
Order By: Relevance
“…In this paper, proposed method content owner encrypts the original uncompressed image using encryption key. Z. Qian and X. Zhang [11], proposed RDH method in encrypted images using distributed source coding. In this paper LDPC i.e.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, proposed method content owner encrypts the original uncompressed image using encryption key. Z. Qian and X. Zhang [11], proposed RDH method in encrypted images using distributed source coding. In this paper LDPC i.e.…”
Section: Related Workmentioning
confidence: 99%
“…A separable reversible data hiding in encrypted images is discussed in [10]. RDH method in encrypted images using distributed source coding is defined in [11]. A LDPC is low density parity check codes used to select bit series Slepian-Wolf encoded.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, experimental results shows that the previous methods such as, VRAE method, DSC substantially increases the payload. Encryption and embedding keys are used to protect embedding and recovery an adversary is unable to break into the system without these keys [11].Reversible data hiding technique in encrypted images embedding data pixels are estimated before encryption and AES algorithm is applied to the other pixels of images. To improve performance of reversing the order of encryption and vacating room is introduced in [12].…”
Section: Related Workmentioning
confidence: 99%
“…In the lossless method the cipher text pixels were replaced with new values to embed the additional data into several of the least significant bit planes of cipher text pixels by multilayer wet paper coding . Qian and Zhang (2016) proposed a data-hiding scheme where the content owner, using a stream cipher, encrypted the original image and the data-hider compresses a series of selected bits taken from the encrypted image to make room for the secret data. On the other side of the receiver, the secret bits could be extracted using an embedded key.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, in the proposed scheme a key played a vital role between sender and receiver. Ma et al (2013) proposed reversible data hiding (RDH) in encrypted images by reserving room before the encryption (Qian and Zhang, 2016;Ma et al, 2013). Zhou et al (2016) proposed an image hiding method.…”
Section: Introductionmentioning
confidence: 99%