2019
DOI: 10.1016/j.sigpro.2019.05.036
|View full text |Cite
|
Sign up to set email alerts
|

Reversible data hiding in encrypted images with additive and multiplicative public-key homomorphism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 27 publications
0
11
0
Order By: Relevance
“…In addition, an LDH-CT scheme is developed in [34] for the learning with errors (LWE)-based public-key cryptography [9]. In [35], two preprocessing-free schemes using additive and multiplicative homomorphism were proposed for BGN [5] and ELGamal [6] public-key encryptions, respectively.…”
Section: A Rdh Methods For Homomorphic Encrypted Imagesmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, an LDH-CT scheme is developed in [34] for the learning with errors (LWE)-based public-key cryptography [9]. In [35], two preprocessing-free schemes using additive and multiplicative homomorphism were proposed for BGN [5] and ELGamal [6] public-key encryptions, respectively.…”
Section: A Rdh Methods For Homomorphic Encrypted Imagesmentioning
confidence: 99%
“…As shown in Fig. 1(a), the data hidden with the schemes in [30], [33], [34], [35], [38] can be directly extracted from the ciphertext given the extraction rule. Thereby, the to-be-hidden data need to be protected by adopting symmetric encryption schemes before being embedded with this kind of LDH-CT methods.…”
Section: A Rdh Methods For Homomorphic Encrypted Imagesmentioning
confidence: 99%
“…Since homomorphic encryption can directly process data in the encryption domain and there is no need to decrypt the cipher-texts before operating them, the Paillier cryptosystem is more practical [27,28]. For example, Chen et al encrypted an image through the Paillier cryptosystem and used the additive homomorphism of the Paillier encryption system to embed the secret data [29].…”
Section: Related Workmentioning
confidence: 99%
“…The use of RRBE and VRAE frameworks is prevalent in many literature studies 6 , 11 13 , 16 29 RRBE makes use of spatial correlation existing between pixels of the cover image and reserve room. The room reserved for secret data hiding is adopted by self-embedding strategy 11 .…”
Section: Introductionmentioning
confidence: 99%