期刊文献+
共找到61篇文章
< 1 2 4 >
每页显示 20 50 100
Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption
1
作者 Zongbao Jiang Minqing Zhang +2 位作者 Weina Dong Chao Jiang Fuqiang Di 《Computers, Materials & Continua》 SCIE EI 2024年第10期1123-1155,共33页
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed... With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data. 展开更多
关键词 Ciphertext-policy attribute-based encryption complex data access structure reversible data hiding large embedding space
下载PDF
Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding
2
作者 Kai Gao Chin-Chen Chang Chia-Chen Lin 《Computer Systems Science & Engineering》 2024年第3期813-833,共21页
Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics,which allows us to hide sensitive data in image files.In this paper,we propose a novel high-fidelity ... Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics,which allows us to hide sensitive data in image files.In this paper,we propose a novel high-fidelity reversible data hiding scheme.Based on the advantage of the multipredictor mechanism,we combine two effective prediction schemes to improve prediction accuracy.In addition,the multihistogram technique is utilized to further improve the image quality of the stego image.Moreover,a model of the grouped knapsack problem is used to speed up the search for the suitable embedding bin in each sub-histogram.Experimental results show that the quality of the stego image of our scheme outperforms state-of-the-art schemes in most cases. 展开更多
关键词 data hiding multipredictor mechanism high-fidelity knapsack problem
下载PDF
A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System
3
作者 Saima Kanwal Feng Tao +3 位作者 Ahmad Almogren Ateeq Ur Rehman Rizwan Taj Ayman Radwan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第1期201-219,共19页
The authenticity and integrity of healthcare is the primary objective.Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads t... The authenticity and integrity of healthcare is the primary objective.Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads to covering image distortion and visual quality resulting in data security detection.A trade-off between robustness,imperceptibility,and embedded capacity is difficult to achieve with current algorithms due to limitations in their ability.Keeping this purpose insight,an improved reversibility watermarking methodology is proposed to maximize data embedding capacity and imperceptibility while maintaining data security as a primary concern.A key is generated by a random path with minimum bit flipping is selected in the 4 × 4 block to gain access to the data embedding patterns.The random path's complex structure ensures data security.Data of various sizes(8 KB,16 KB,32 KB)are used to analyze image imperceptibility and evaluate quality factors.The proposed reversible watermarking methodology performance is tested under standard structures PSNR,SSIM,and MSE.The results revealed that the MRI watermarked images are imperceptible,like the cover image when LSB is 3 bits plane.Our proposed reversible watermarking methodology outperforms other related techniques in terms of average PSNR(49.29).Experiment results show that the suggested reversible watermarking method improves data embedding capacity and imperceptibility compared to existing state-of-the-art approaches. 展开更多
关键词 Medical images security data hiding LSB matching hiding capacity IMPERCEPTIBILITY
下载PDF
High-Imperceptibility Data Hiding Scheme for JPEG Images Based on Direction Modification
4
作者 Li Liu Jing Li +2 位作者 Yingchun Wu Chin-Chen Chang Anhong Wang 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1415-1431,共17页
Data hiding(DH)is an important technology for securely transmitting secret data in networks,and has increasing become a research hotspot throughout the world.However,for Joint photographic experts group(JPEG)images,it... Data hiding(DH)is an important technology for securely transmitting secret data in networks,and has increasing become a research hotspot throughout the world.However,for Joint photographic experts group(JPEG)images,it is difficult to balance the contradiction among embedded capacity,visual quality and the file size increment in existing data hiding schemes.Thus,to deal with this problem,a high-imperceptibility data hiding for JPEG images is proposed based on direction modification.First,this proposed scheme sorts all of the quantized discrete cosine transform(DCT)block in ascending order according to the number of non-consecutive-zero alternating current(AC)coefficients.Then it selects non-consecutive-zero AC coefficients with absolute values less than or equal to 1 at the same frequency position in two adjacent blocks for pairing.Finally,the 2-bit secret data can be embedded into a coefficient-pair by using the filled reference matrix and the designed direction modification rules.The experiment was conducted on 5 standard test images and 1000 images of BOSSbase dataset,respectively.The experimental results showed that the visual quality of the proposed scheme was improved by 1∼4 dB compared with the comparison schemes,and the file size increment was reduced at most to 15%of the comparison schemes. 展开更多
关键词 data hiding JPEG images coefficient-pair direction modification file size increment
下载PDF
A Recursive High Payload Reversible Data Hiding Using Integer Wavelet and Arnold Transform
5
作者 Amishi Mahesh Kapadia P.Nithyanandam 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期537-552,共16页
Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image.We suggested a technique in this research that uses a recurs... Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image.We suggested a technique in this research that uses a recursive embedding method to increase capacity substantially using the Integer wavelet transform and the Arnold transform.The notion of Integer wavelet transforms is to ensure that all coefficients of the cover images are used during embedding with an increase in payload.By scrambling the cover image,Arnold transform adds security to the information that gets embedded and also allows embedding more information in each iteration.The hybrid combination of Integer wavelet transform and Arnold transform results to build a more efficient and secure system.The proposed method employs a set of keys to ensure that information cannot be decoded by an attacker.The experimental results show that it aids in the development of a more secure storage system and withstand few tampering attacks The suggested technique is tested on many image formats,including medical images.Various performance metrics proves that the retrieved cover image and hidden image are both intact.This System is proven to withstand rotation attack as well. 展开更多
关键词 Reversible data hiding(RDH) integer wavelet transforms(IWT) arnold transform PAYLOAD embedding and extraction
下载PDF
Improved Dual-image Quality with Reversible Data Hiding Using Translocation and Switching Strategy
6
作者 Chin-Feng Lee Kuo-Chung Chan 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1551-1566,共16页
Dual-image reversible data hiding(RDH)is a technique for hiding important messages.This technology can be used to safely deliver secret mes-sages to the recipient through dual images in an open network without being e... Dual-image reversible data hiding(RDH)is a technique for hiding important messages.This technology can be used to safely deliver secret mes-sages to the recipient through dual images in an open network without being easily noticed.The recipient of the image must receive the two stego-images before the secret message can be completely retrieved.Imperceptibility is one of the main advantages of data hiding technology;to increase the imperceptibility,the quality requirements of the stego-images are relatively important.A dual ste-ganographic image RDH method,called a DS-CF scheme that can achieve a bet-ter steganographic image quality using the center folding(CF)strategy.In this paper,we developed a translocation and switching strategy(TaS)to shorten the distances between the stego-pixel coordinates and the cover pixel coordinates after information being hidden.Compared with the DS-CF scheme,our proposed DS-TaS scheme can effectively improve the quality of the steganographic images at the same level of embedding capability.The experimental results show that the PSNR of our DS-TaS scheme at k=1 was 55.66 dB,which is an increase of 1.5 dB,and is 51.43 dB for k=2,46.66 dB for k=3,and 40.91 dB for k=4.In addition,the PSNR values of the stego images was increased by 1.5,0.29,0.29,and 0.19 dB,respectively.This shows that our proposed dual-image RDH method can optimize the visual quality of the stego-images and is better than many other dual-image RDH techniques. 展开更多
关键词 Information hiding reversible data hiding(RDH) dual-image RDH center folding(CF)strategy
下载PDF
On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing 被引量:11
7
作者 Lizhi Xiong Yunqing Shi 《Computers, Materials & Continua》 SCIE EI 2018年第6期523-539,共17页
Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the clou... Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the cloud.In the meantime,some computationally expensive tasks are also undertaken by cloud servers.However,the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data.Recently,this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data.In this paper,two reversible data hiding schemes are proposed for encrypted image data in cloud computing:reversible data hiding by homomorphic encryption and reversible data hiding in encrypted domain.The former is that additional bits are extracted after decryption and the latter is that extracted before decryption.Meanwhile,a combined scheme is also designed.This paper proposes the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing,which not only ensures multimedia data security without relying on the trustworthiness of cloud servers,but also guarantees that reversible data hiding can be operated over encrypted images at the different stages.Theoretical analysis confirms the correctness of the proposed encryption model and justifies the security of the proposed scheme.The computation cost of the proposed scheme is acceptable and adjusts to different security levels. 展开更多
关键词 Cloud data security re-encryption reversible data hiding cloud computing privacy-preserving.
下载PDF
Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification 被引量:3
8
作者 Yang Du Zhaoxia Yin Xinpeng Zhang 《Computers, Materials & Continua》 SCIE EI 2018年第6期495-507,共13页
This paper proposes a lossless and high payload data hiding scheme for JPEG images by histogram modification.The most in JPEG bitstream consists of a sequence of VLCs(variable length codes)and the appended bits.Each V... This paper proposes a lossless and high payload data hiding scheme for JPEG images by histogram modification.The most in JPEG bitstream consists of a sequence of VLCs(variable length codes)and the appended bits.Each VLC has a corresponding RLV(run/length value)to record the AC/DC coefficients.To achieve lossless data hiding with high payload,we shift the histogram of VLCs and modify the DHT segment to embed data.Since we sort the histogram of VLCs in descending order,the filesize expansion is limited.The paper’s key contribution includes:Lossless data hiding,less filesize expansion in identical pay-load and higher embedding efficiency. 展开更多
关键词 LOSSLESS data hiding HISTOGRAM VLC JPEG.
下载PDF
Reversible Data Hiding in Encrypted Image Based on Block Classification Permutation 被引量:4
9
作者 Qun Mo Heng Yao +2 位作者 Fang Cao Zheng Chang Chuan Qin 《Computers, Materials & Continua》 SCIE EI 2019年第4期119-133,共15页
Recently,reversible data hiding in encrypted image(RDHEI)has attracted extensive attention,which can be used in secure cloud computing and privacy protection effectively.In this paper,a novel RDHEI scheme based on blo... Recently,reversible data hiding in encrypted image(RDHEI)has attracted extensive attention,which can be used in secure cloud computing and privacy protection effectively.In this paper,a novel RDHEI scheme based on block classification and permutation is proposed.Content owner first divides original image into non-overlapping blocks and then set a threshold to classify these blocks into smooth and non-smooth blocks respectively.After block classification,content owner utilizes a specific encryption method,including stream cipher encryption and block permutation to protect image content securely.For the encrypted image,data hider embeds additional secret information in the most significant bits(MSB)of the encrypted pixels in smooth blocks and the final marked image can be obtained.At the receiver side,secret data will be extracted correctly with data-hiding key.When receiver only has encryption key,after stream cipher decryption,block scrambling decryption and MSB error prediction with threshold,decrypted image will be achieved.When data hiding key and encryption key are both obtained,receiver can find the smooth and non-smooth blocks correctly and MSB in smooth blocks will be predicted correctly,hence,receiver can recover marked image losslessly.Experimental results demonstrate that our scheme can achieve better rate-distortion performance than some of state-of-the-art schemes. 展开更多
关键词 Reversible data hiding image encryption image recovery
下载PDF
Local binary pattern-based reversible data hiding 被引量:4
10
作者 Monalisa Sahu Neelamadhab Padhy +1 位作者 Sasanko Sekhar Gantayat Aditya Kumar Sahu 《CAAI Transactions on Intelligence Technology》 SCIE EI 2022年第4期695-709,共15页
A novel local binary pattern-based reversible data hiding(LBP-RDH)technique has been suggested to maintain a fair symmetry between the perceptual transparency and hiding capacity.During embedding,the image is divided ... A novel local binary pattern-based reversible data hiding(LBP-RDH)technique has been suggested to maintain a fair symmetry between the perceptual transparency and hiding capacity.During embedding,the image is divided into various 3×3 blocks.Then,using the LBP-based image descriptor,the LBP codes for each block are computed.Next,the obtained LBP codes are XORed with the embedding bits and are concealed in the respective blocks using the proposed pixel readjustment process.Further,each cover image(CI)pixel produces two different stego-image pixels.Likewise,during extraction,the CI pixels are restored without the loss of a single bit of information.The outcome of the proposed technique with respect to perceptual transparency measures,such as peak signal-to-noise ratio and structural similarity index,is found to be superior to that of some of the recent and state-of-the-art techniques.In addition,the proposed technique has shown excellent resilience to various stego-attacks,such as pixel difference histogram as well as regular and singular analysis.Besides,the out-off boundary pixel problem,which endures in most of the contemporary data hiding techniques,has been successfully addressed. 展开更多
关键词 hiding capacity(HC) local binary pattern(LBP) peak signal-to-noise ratio(PSNR) reversible data hiding
下载PDF
Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment 被引量:2
11
作者 Mahmoud Ragab Samah Alshehri +3 位作者 Hani A.Alhadrami Faris Kateb Ehab Bahaudien Ashary SAbdel-khalek 《Computers, Materials & Continua》 SCIE EI 2022年第7期1323-1338,共16页
Rapid advancements of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)pose serious security issues by revealing secret data.Therefore,security data becomes a crucial issue in IIoT communication w... Rapid advancements of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)pose serious security issues by revealing secret data.Therefore,security data becomes a crucial issue in IIoT communication where secrecy needs to be guaranteed in real time.Practically,AI techniques can be utilized to design image steganographic techniques in IIoT.In addition,encryption techniques act as an important role to save the actual information generated from the IIoT devices to avoid unauthorized access.In order to accomplish secure data transmission in IIoT environment,this study presents novel encryption with image steganography based data hiding technique(EISDHT)for IIoT environment.The proposed EIS-DHT technique involves a new quantum black widow optimization(QBWO)to competently choose the pixel values for hiding secrete data in the cover image.In addition,the multi-level discrete wavelet transform(DWT)based transformation process takes place.Besides,the secret image is divided into three R,G,and B bands which are then individually encrypted using Blowfish,Twofish,and Lorenz Hyperchaotic System.At last,the stego image gets generated by placing the encrypted images into the optimum pixel locations of the cover image.In order to validate the enhanced data hiding performance of the EIS-DHT technique,a set of simulation analyses take place and the results are inspected interms of different measures.The experimental outcomes stated the supremacy of the EIS-DHT technique over the other existing techniques and ensure maximum security. 展开更多
关键词 IIoT SECURITY data hiding technique image steganography ENCRYPTION secure communication
下载PDF
Reversible Data Hiding Based on Pixel-Value-Ordering and Pixel Block Merging Strategy 被引量:1
12
作者 Wengui Su Xiang Wang Yulong Shen 《Computers, Materials & Continua》 SCIE EI 2019年第6期925-941,共17页
With the reversible data hiding method based on pixel-value-ordering,data are embedded through the modification of the maximum and minimum values of a block.A significant relationship exists between the embedding perf... With the reversible data hiding method based on pixel-value-ordering,data are embedded through the modification of the maximum and minimum values of a block.A significant relationship exists between the embedding performance and the block size.Traditional pixel-value-ordering methods utilize pixel blocks with a fixed size to embed data;the smaller the pixel blocks,greater is the embedding capacity.However,it tends to result in the deterioration of the quality of the marked image.Herein,a novel reversible data hiding method is proposed by incorporating a block merging strategy into Li et al.’s pixel-value-ordering method,which realizes the dynamic control of block size by considering the image texture.First,the cover image is divided into non-overlapping 2×2 pixel blocks.Subsequently,according to their complexity,similarity and thresholds,these blocks are employed for data embedding through the pixel-value-ordering method directly or after being emerged into 2×4,4×2,or 4×4 sized blocks.Hence,smaller blocks can be used in the smooth region to create a high embedding capacity and larger blocks in the texture region to maintain a high peak signal-to-noise ratio.Experimental results prove that the proposed method is superior to the other three advanced methods.It achieves a high embedding capacity while maintaining low distortion and improves the embedding performance of the pixel-value-ordering algorithm. 展开更多
关键词 Reversible data hiding pixel-value-ordering prediction error expansion dynamic block partition
下载PDF
An Effective Steganalysis Algorithm for Histogram-Shifting Based Reversible Data Hiding 被引量:1
13
作者 Junxiang Wang Lin Huang +3 位作者 Ying Zhang Yonghong Zhu Jiangqun Ni Yunqing Shi 《Computers, Materials & Continua》 SCIE EI 2020年第7期325-344,共20页
To measure the security for hot searched reversible data hiding(RDH)technique,especially for the common-used histogram-shifting based RDH(denoted as HS-RDH),several steganalysis schemes are designed to detect whether ... To measure the security for hot searched reversible data hiding(RDH)technique,especially for the common-used histogram-shifting based RDH(denoted as HS-RDH),several steganalysis schemes are designed to detect whether some secret data has been hidden in a normal-looking image.However,conventional steganalysis schemes focused on the previous RDH algorithms,i.e.,some early spatial/pixel domain-based histogram-shifting(HS)schemes,which might cause great changes in statistical characteristics and thus be easy to be detected.For recent improved methods,such as some adaptive prediction error(PE)based embedding schemes,those conventional schemes might be invalid,since those adaptive embedding mechanism would effectively reduce the embedding trace and thus increase the difficulty of steganalysis.Therefore,a novel steganalysis method is proposed in this paper to detect recent adaptive RDH schemes and provide a more effective detection tool for RDH.The contributions of this paper could be summarized as follows.(1)By analyzing the characteristics for those adaptive HS-RDH,an effective“flat ground”based detection method is designed to fast identify whether the given image is used to hide secret data;(2)According to the empirical statistical model,double check mechanism is provided to improve the detection accuracy;(3)In addition,to further improve detection ability,some detailed information for secret data,i.e.,its content and embedding location are further estimated.Compared with conventional steganalysis methods,experimental results indicate that our proposed algorithm could achieve a better detection accuracy and meanwhile acquire more detailed information on secret data. 展开更多
关键词 Reversible data hiding STEGANALYSIS DETECTION histogram shifting
下载PDF
Reversible Data Hiding in Encrypted Images Based on Prediction and Adaptive Classification Scrambling 被引量:1
14
作者 Lingfeng Qu Hongjie He +1 位作者 Shanjun Zhang Fan Chen 《Computers, Materials & Continua》 SCIE EI 2020年第12期2623-2638,共16页
Reversible data hiding in encrypted images(RDH-EI)technology is widely used in cloud storage for image privacy protection.In order to improve the embedding capacity of the RDH-EI algorithm and the security of the encr... Reversible data hiding in encrypted images(RDH-EI)technology is widely used in cloud storage for image privacy protection.In order to improve the embedding capacity of the RDH-EI algorithm and the security of the encrypted images,we proposed a reversible data hiding algorithm for encrypted images based on prediction and adaptive classification scrambling.First,the prediction error image is obtained by a novel prediction method before encryption.Then,the image pixel values are divided into two categories by the threshold range,which is selected adaptively according to the image content.Multiple high-significant bits of pixels within the threshold range are used for embedding data and pixel values outside the threshold range remain unchanged.The optimal threshold selected adaptively ensures the maximum embedding capacity of the algorithm.Moreover,the security of encrypted images can be improved by the combination of XOR encryption and classification scrambling encryption since the embedded data is independent of the pixel position.Experiment results demonstrate that the proposed method has higher embedding capacity compared with the current state-of-the-art methods for images with different texture complexity. 展开更多
关键词 Reversible data hiding classification scrambling prediction error multi-bits embedding
下载PDF
Reversible Data Hiding Based on Varying Radix Numeral System
15
作者 J.Hemalatha S.Geetha +3 位作者 R.Geetha C.Balasubramanian Daniela Elena Popescu D.Jude Hemanth 《Computers, Materials & Continua》 SCIE EI 2021年第10期283-300,共18页
A novel image reversible data-hiding scheme based on primitive and varying radix numerical model is presented in this article.Using varying radix,variable sum of data may be embedded in various pixels of images.This s... A novel image reversible data-hiding scheme based on primitive and varying radix numerical model is presented in this article.Using varying radix,variable sum of data may be embedded in various pixels of images.This scheme is made adaptive using the correlation of the neighboring pixels.Messages are embedded as blocks of non-uniform length in the high-frequency regions of the rhombus mean interpolated image.A higher amount of data is embedded in the high-frequency regions and lesser data in the low-frequency regions of the image.The size of the embedded data depends on the statistics of the pixel distribution in the cover image.One of the major issues in reversible data embedding,the location map,is minimized because of the interpolation process.This technique,which is actually LSB matching,embeds only the residuals of modulo radix into the LSBs of each pixel.No attacks on this RDH technique will be able to decode the hidden content in the marked image.The proposed scheme delivers a prominent visual quality despite high embedding capacity.Experimental tests carried out on over 100 natural image data sets and medical images show an improvement in results compared to the existing schemes.Since the algorithm is based on the variable radix number system,it is more resistant to most of the steganographic attacks.The results were compared with a higher embedding capacity of up to 1.5 bpp reversible schemes for parameters like Peak Signal-to-Noise Ratio(PSNR),Embedding Capacity(EC)and Structural Similarity Index Metric(SSIM). 展开更多
关键词 data hiding spatial correlation radix system prediction error embedding capacity
下载PDF
A Reversible Data Hiding Algorithm Based on Image Camouflage and Bit-Plane Compression
16
作者 Jianyi Liu Ru Zhang +3 位作者 Jing Li Lei Guan Cheng Jie Jiaping Gui 《Computers, Materials & Continua》 SCIE EI 2021年第8期2634-2650,共17页
Reversible data hiding in encrypted image(RDHEI)is a widely used technique for privacy protection,which has been developed in many applications that require high confidentiality,authentication and integrity.Proposed R... Reversible data hiding in encrypted image(RDHEI)is a widely used technique for privacy protection,which has been developed in many applications that require high confidentiality,authentication and integrity.Proposed RDHEI methods do not allow high embedding rate while ensuring losslessly recover the original image.Moreover,the ciphertext form of encrypted image in RDHEI framework is easy to cause the attention of attackers.This paper proposes a reversible data hiding algorithm based on image camouflage encryption and bit plane compression.A camouflage encryption algorithm is used to transform a secret image into another meaningful target image,which can cover both secret image and encryption behavior based on“plaintext to plaintext”transformation.An edge optimization method based on prediction algorithm is designed to improve the image camouflage encryption quality.The reversible data hiding based bit-plane level compression,which can improve the redundancy of the bit plane by Gray coding,is used to embed watermark in the camouflage image.The experimental results also show the superior performance of the method in terms of embedding capacity and image quality. 展开更多
关键词 Reversible data hiding image camouflage bit plane compression ENCRYPTION edge optimization
下载PDF
Lossless Data Hiding Scheme Based on VQ Index Coding
17
作者 Chin-Feng Lee Ming-Chi Shih 《Journal of Electronic Science and Technology》 CAS 2013年第1期27-32,共6页
Lossless data hiding can restore the original status of cover media after embedded secret data are extracted. In 2010, Wang et al. proposed a lossless data hiding scheme which hides secret data in vector quantization ... Lossless data hiding can restore the original status of cover media after embedded secret data are extracted. In 2010, Wang et al. proposed a lossless data hiding scheme which hides secret data in vector quantization (VQ) indices, but the encoding strategies adopted by their scheme expand the final codestream. This paper designs four embedding and encoding strategies to improve Wang et aL's scheme. The experiment result of the proposed scheme compared with that of the Wang et aL's scheme reduces the bit rates of the final codestream by 4.6% and raises the payload by 1.09% on average. 展开更多
关键词 Bit rate lossless data hiding PAYLOAD vector quantization vector quantization index table.
下载PDF
Reversible Data Hiding in Classification-Scrambling Encrypted-Image Based on Iterative Recovery
18
作者 Yuyu Chen Bangxu Yin +3 位作者 Hongjie He Shu Yan Fan Chen Hengming Tai 《Computers, Materials & Continua》 SCIE EI 2018年第8期299-312,共14页
To improve the security and quality of decrypted images,this work proposes a reversible data hiding in encrypted image based on iterative recovery.The encrypted image is firstly generated by the pixel classification s... To improve the security and quality of decrypted images,this work proposes a reversible data hiding in encrypted image based on iterative recovery.The encrypted image is firstly generated by the pixel classification scrambling and bit-wise exclusive-OR(XOR),which improves the security of encrypted images.And then,a pixel-typemark generation method based on block-compression is designed to reduce the extra burden of key management and transfer.At last,an iterative recovery strategy is proposed to optimize the marked decrypted image,which allows the original image to be obtained only using the encryption key.The proposed reversible data hiding scheme in encrypted image is not vulnerable to the ciphertext-only attack due to the fact that the XOR-encrypted pixels are scrambled in the corresponding encrypted image.Experimental results demonstrate that the decrypted images obtained by the proposed method are the same as the original ones,and the maximum embedding rate of proposed method is higher than the previously reported reversible data hiding methods in encrypted image. 展开更多
关键词 Reversible data hiding image encryption scrambling encryption iterative recovery
下载PDF
A General Framework of Reversible Data Hiding with Controlled Contrast Enhancement
19
作者 Shaowei Weng Yiyun Liu +3 位作者 Yunqing Shi Bo Ou Chunyu Zhang Cuiping Wang 《Computers, Materials & Continua》 SCIE EI 2020年第1期157-177,共21页
This paper proposes a two-step general framework for reversible data hiding(RDH)schemes with controllable contrast enhancement.The first step aims at preserving visual perception as much as possible on the basis of ac... This paper proposes a two-step general framework for reversible data hiding(RDH)schemes with controllable contrast enhancement.The first step aims at preserving visual perception as much as possible on the basis of achieving high embedding capacity(EC),while the second step is used for increasing image contrast.In the second step,some peak-pairs are utilized so that the histogram of pixel values is modified to perform histogram equalization(HE),which would lead to the image contrast enhancement.However,for HE,the utilization of some peak-pairs easily leads to over-enhanced image contrast when a large number of bits are embedded.Therefore,in our proposed framework,contrast over-enhancement is avoided by controlling the degree of contrast enhancement.Since the second step can only provide a small amount of data due to controlled contrast enhancement,the first one helps to achieve a large amount of data without degrading visual quality.Any RDH method which can achieve high EC while preserve good visual quality,can be selected for the first step.In fact,Gao et al.’s method is a special case of our proposed framework.In addition,two simple and commonly-used RDH methods are also introduced to further demonstrate the generalization of our framework. 展开更多
关键词 Reversible data hiding controlled contrast enhancement general framework PEE-based RDH method IT-based RDH method
下载PDF
Data Hiding in DNA for Authentication of Plant Variety Rights
20
作者 Wei-Liang Tai Charles C.N.Wang +1 位作者 Phillip C.Y.Sheu Jeffrey J.P.Tsai 《Journal of Electronic Science and Technology》 CAS 2013年第1期38-43,共6页
Hiding data in acid (DNA) can facilitate annotation of important plant the deoxyribose nucleic the authentication and variety rights. A grant of plant variety rights for a new plant variety gives you the exclusive r... Hiding data in acid (DNA) can facilitate annotation of important plant the deoxyribose nucleic the authentication and variety rights. A grant of plant variety rights for a new plant variety gives you the exclusive right to produce for sale and sell propagating material of the variety. Digital watermarking techniques have been proposed for a wide range of applications, including ownership protection, copy control, annotation, and authentication. However, existing data hiding methods for DNA change the functionalities of DNA sequences, which induce morphological changes in biological patterns. This paper proposes a high capacity data hiding scheme for DNA without changing the functionalities of DNA sequences. This scheme adaptively varies the embedding process according to the amount of hidden data. Experimental results show that the proposed scheme gives a significantly improved hiding performance than previous schemes. And the robustness and security issues are also analyzed. 展开更多
关键词 AUTHENTICATION data hiding deoxyribose nucleic acid watermarking.
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部