2023
DOI: 10.3390/sym15061222
|View full text |Cite
|
Sign up to set email alerts
|

Reversible Data Hiding in Encrypted Images Based on Hybrid Prediction and Huffman Coding

Abstract: As an interesting technique that allows data extraction and image recovery without any loss, reversible data hiding in encrypted images is an area of great concern in the field of information security. In this paper, a new reversible data hiding method with high embedding capacity is proposed based on hybrid prediction and Huffman coding. The combination of two embedding mechanisms is innovatively designed to improve the embedding capacity according to different parts of the original image, i.e., the most sign… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 41 publications
0
0
0
Order By: Relevance
“…Then the generalized probability is expressed as Pr[sj] = Pj, ∑ n j=1 Pj = 1. The entropy from the source can be expanded with Equation (38)…”
Section: Entropy Encodingmentioning
confidence: 99%
See 1 more Smart Citation
“…Then the generalized probability is expressed as Pr[sj] = Pj, ∑ n j=1 Pj = 1. The entropy from the source can be expanded with Equation (38)…”
Section: Entropy Encodingmentioning
confidence: 99%
“…The prominent techniques under lossy compression include transform coding [22,23], fractal compression [24,25], chroma sampling [26,27], discrete cosine transform (DCT) [28,29], and the vector quantization algorithm (VQA) [30,31]. On the other hand, lossless compression techniques include run-length encoding [32,33], entropy encoding [34,35], Lempel-Ziv-Welch (LZW) [36,37], and DEFLATE, which synergizes LZSS with Huffman coding [38,39]. Lossless compression is ideal for applications like technical drawings, and medical imaging as it preserves the quality of all original data.…”
Section: Introductionmentioning
confidence: 99%
“…The ciphered image is then compressed on the basis of adaptive block coding; therefore, the room used for embedding data is vacated. In [19], Sui et al used a pseudo-random matrix-based symmetric encryption to encrypt a primitive image. The receiver uses the same key matrix to restore the primitive image due to the symmetry of the encryption algorithm.…”
Section: Introductionmentioning
confidence: 99%