2020
DOI: 10.1109/access.2020.2966234
|View full text |Cite
|
Sign up to set email alerts
|

A High Capacity Reversible Data Hiding in Encrypted AMBTC-Compressed Images

Abstract: Recently, reversible data hiding in encrypted compressed images (RDHECI) has attracted more attention due to privacy information protection concerns. Meanwhile, AMBTC as one technique of lossy image compression that has lower storage costs and the simplicity in computation and is extensively used in many applications. Hence, this paper proposes an RDHECI scheme based on AMBTC, named O-AMBTC, to address privacy concerns. First, the original image is scrambled in a block-wise manner to generate the scrambled ima… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
10

Relationship

1
9

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 41 publications
0
13
0
Order By: Relevance
“…Data hiding (DH) is one technique that has been designed to hide secret messages using various cover media, i.e. images, videos, and audios files, for secret and secure communication [1–4] or the error resilience of multimedia communications [5–7]. The key point of DH lies on the imperceptible modifications made on cover media so that the human eyes have difficulty detecting any distortion caused by DH.…”
Section: Introductionmentioning
confidence: 99%
“…Data hiding (DH) is one technique that has been designed to hide secret messages using various cover media, i.e. images, videos, and audios files, for secret and secure communication [1–4] or the error resilience of multimedia communications [5–7]. The key point of DH lies on the imperceptible modifications made on cover media so that the human eyes have difficulty detecting any distortion caused by DH.…”
Section: Introductionmentioning
confidence: 99%
“…c: NOISE AND CROPPING ATTACKS Fig. 9 demonstrates the noise and cropping attacks [28]- [31] to the encrypted Baboon image, to evaluate the robustness of the proposed encryption method. Here, the encrypted image is generated under a = 2 and b = 5.…”
Section: B: Shannon Entropy Analysismentioning
confidence: 99%
“…With the rapid development of the Internet and digital processing technologies, the ownership protection of digital content, such as an image, audio, videos, and so on, has become a crucial issue. As an important research topic, various approaches are employed, i.e., data hiding [1][2][3][4][5] and watermarking techniques [6][7][8][9][10][11][12][13], to protect the legal owner and protect digital data from illegal manipulations. The main objectives of the above approaches can be achieved by concealing watermarks, such as a company's brand logo or an owner's personal signature, in the original content, so that the authenticated owners can claim their ownership of the digital content by successfully extracting the hidden watermark.…”
Section: Introductionmentioning
confidence: 99%