Proceedings of 3rd International Conference on Multimedia Technology(ICMT-13) 2013
DOI: 10.2991/icmt-13.2013.107
|View full text |Cite
|
Sign up to set email alerts
|

Separable Reversible Data hiding in Encrypted Images by n-nary Histogram Modification

Abstract: Abstract. This work proposes a novel scheme of separable reversible data hiding for encrypted image using histogram modification. After the original image is encrypted by the sender, the data-hider embeds the secret message into the encrypted image by a histogram modification and n-nary data hiding scheme. On the receiver side, the secret message can be extracted by the embedding key, and the original image can be totally recovered using both the embedding key and the encryption key. If the embedding key is un… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…This limitation has led to the emergence of a new subfield of RDH called RDH in encrypted images (RDHEIs). 3 There are many existing works of literature for RDHEI using pseudo-random number generators, [4][5][6] homomorphic encryption, [7][8][9][10] advanced encryption standard, 3 and stream cipher. [11][12][13] RDHEI consists of two procedures: embedding and extraction of secret data cum recovery of the cover image.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This limitation has led to the emergence of a new subfield of RDH called RDH in encrypted images (RDHEIs). 3 There are many existing works of literature for RDHEI using pseudo-random number generators, [4][5][6] homomorphic encryption, [7][8][9][10] advanced encryption standard, 3 and stream cipher. [11][12][13] RDHEI consists of two procedures: embedding and extraction of secret data cum recovery of the cover image.…”
Section: Introductionmentioning
confidence: 99%
“…This limitation has led to the emergence of a new subfield of RDH called RDH in encrypted images (RDHEIs) 3 . There are many existing works of literature for RDHEI using pseudo-random number generators, 4 6 homomorphic encryption, 7 10 advanced encryption standard, 3 and stream cipher 11 13 …”
Section: Introductionmentioning
confidence: 99%
“…Zhang, Qian, Feng & Ren (2014) losslessly compress partition of the encrypted image using Low Density Parity Check Code (LDPC) and obtain the extra room for embedding the data; on the receiver side, with the help of compressed data and the uncompressed data, the image content can be perfectly recovered. Qian, Han & Zhang (2013) utilize the property of the random histogram in encrypted image, and modulate the histogram for embedding room. All these methods in (Zhang, 2011;Hong et al, 2012;Zhang, 2012) vacate room before encryption and recover the image through the correlation of pixels.…”
Section: Introductionmentioning
confidence: 99%