2015
DOI: 10.17148/iarjset.2015.2209
|View full text |Cite
|
Sign up to set email alerts
|

Reversible Data Hiding in Encrypted Images

Abstract: Abstract:The following paper proposes a novel scheme of data hiding in encrypted images based on lossless compression of encrypted data. In encryption phase, the original content is encrypted into images. As majority of the encrypted data is kept unchanged, the quality of the decrypted image is satisfactory. In the receiver phase, the data is successfully extracted from the image with the help of a public key. The receiver can further recover the original plaintext image without any error.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…However, uploading plaintext images directly to cloud services can lead to data leakage. RDH in encrypted domains, revered to reversible data hiding in encrypted images (RDH-EI), has emerged to address this issue [23,24]. In this technique, the sender encrypts the plaintext image before transmitting the ciphertext image to the data embedding party, which then embeds it into the ciphertext image and transmits it to the receiver to protect the original image from leakage.…”
Section: Introductionmentioning
confidence: 99%
“…However, uploading plaintext images directly to cloud services can lead to data leakage. RDH in encrypted domains, revered to reversible data hiding in encrypted images (RDH-EI), has emerged to address this issue [23,24]. In this technique, the sender encrypts the plaintext image before transmitting the ciphertext image to the data embedding party, which then embeds it into the ciphertext image and transmits it to the receiver to protect the original image from leakage.…”
Section: Introductionmentioning
confidence: 99%
“…Multilevel modification of histogram of the pixel differences was used to embed the secret bit into each block. In this method, nonoverlapping blocks were constructed by encrypting and dividing the cover-image [20][21][22][23][24][25][26]. The authors of [27,28] emphasize the importance of the magnitude of local variance to increase the EC which is based on prediction errors expansion (PEE).…”
Section: Introductionmentioning
confidence: 99%
“…An algorithm designed [11] to improve the visual quality of embedded stego image, where the substitution of LSB bits using three modulo strategies. Cover image is encrypted and divided in to non overlapping blocks and data hiding can be done based on pixel value differences and another method in which histogram modification in multilevel was used to embed payload data [12][13][14]. Other than changing or matching least significant bits of cover image pixels, one more technique which uses two adjacent pixels to hide two adjacent pixels of payload data and it is given name as LSB matching revisited [15].…”
Section: Introductionmentioning
confidence: 99%