期刊文献+

Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map

Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map
下载PDF
导出
摘要 Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Henon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images. Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Henon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images.
出处 《Journal of Electronic Science and Technology》 CAS 2013年第2期230-236,共7页 电子科技学刊(英文版)
关键词 Cloud computing environments ENCRYPTION Haar digital wavelet transformation Henonmap reversible data embedding. Cloud computing environments encryption Haar digital wavelet transformation Henonmap reversible data embedding.
  • 相关文献

参考文献26

  • 1C.-C. Chang, P.-Y Pai, C.-M. Yeh, and Y-K. Chan, "A high payload frequency-based reversible image hiding method," Information Sciences, vol. 180, pp. 2286-2298, Jun. 2010.
  • 2L.-C. Huang, L.-Y. Tseng, and M.-S. Hwang, "The study of data hiding in medical image," Int. Journal of Network Security, vol. 14, no. 5, pp. 243-251, 2012.
  • 3S. S. Sujatha and M. M. Sathik, "A novel DWT based blind watermarking for image authentication," Int. Journal of Network Security, vol. 14, no. 4, pp. 223-228, 2012.
  • 4Li-C. Huang and M.-S. Hwang, "The study of intrusion detection system," Journal of Electronic Science and Technology, vol. 10, no. 3,pp. 269-275,2012.
  • 5C.-M. Wang, N.-I. Wu, c.s. Tsai, and M.-S. Hwang, "A high quality steganographic method with pixel-value differencing and modulus function," The Journal of Systems and Software, vol. 81, no. 1, pp. 150-158,2008.
  • 6C.-C. Wu, S.-I. Kao, and M.-S. Hwang, "A high quality image sharing with steganography and adaptive authentication scheme," The Journal of Systems and Software, vol. 84, pp. 2196-2207, Dec. 2011.
  • 7C.-C. Wu, M.-S. Hwang, and S.-I. Kao, "A new approach to the secret image sharing with steganography and authentication," The Imaging Science Journal, vol. 57, no. 3, pp, 140-151,2009.
  • 8L.-C. Huang, L.- Y. Tseng, and M.-S. Hwang, "A reversible data hiding method by histogram shifting in high quality medical images," The Journal of Systems and Software, vol. 86,pp.716-727,Mar.2013.
  • 9L.-C. Huang, M.-S. Hwang, and L.- Y. Tseng, "Reversible and high-capacity data hiding in high quality medical images," KSII Trans. on Internet and Information Systems, vol. 7, no. 1, pp. 132-148,2013.
  • 10G.-R. Xuan, Y.-Q. Shi, Q.-M. Yao, Z.-C. Ni, C.-Y. Yang, J.-I. Gao, and P.-Q. Chai, "Lossless data hiding using histogram shifting method based on integer wavelets," Lecture Notes in Computer Science, vol. 4283, pp. 323-332, Aug. 2006.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部