2023
DOI: 10.3390/e25040563
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-Directional Pixel-Swapping Approach (MPSA) for Entropy-Retained Reversible Data Hiding in Encrypted Images

Abstract: Reversible data hiding (RDH), a promising data-hiding technique, is widely examined in domains such as medical image transmission, satellite image transmission, crime investigation, cloud computing, etc. None of the existing RDH schemes addresses a solution from a real-time aspect. A good compromise between the information embedding rate and computational time makes the scheme suitable for real-time applications. As a solution, we propose a novel RDH scheme that recovers the original image by retaining its qua… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 47 publications
0
2
0
Order By: Relevance
“…From the above data, it can be seen that in the two stages of encryption and data embedding, the entropy value tended to be the entropy value of the noisy image and remained almost unchanged, which reflects that there was no increase in the information amount of the cover image during the transmission process, which is conducive to transmission security. This feature was also mentioned in works [12,13], which studied the stable entropy of encrypted images, reflecting the security of the algorithm. Therefore, the proposed algorithm also possesses this property and security.…”
Section: Entropymentioning
confidence: 85%
See 1 more Smart Citation
“…From the above data, it can be seen that in the two stages of encryption and data embedding, the entropy value tended to be the entropy value of the noisy image and remained almost unchanged, which reflects that there was no increase in the information amount of the cover image during the transmission process, which is conducive to transmission security. This feature was also mentioned in works [12,13], which studied the stable entropy of encrypted images, reflecting the security of the algorithm. Therefore, the proposed algorithm also possesses this property and security.…”
Section: Entropymentioning
confidence: 85%
“…The joint algorithms must perform data extraction and cover decryption according to the designed order. To achieve true reversibility and separability, the two operations must be completed without errors, such as in [7][8][9][10][11][12][13][14]27,36], etc. Separable algorithms have more flexibility.…”
Section: The Cover Image Decryptionmentioning
confidence: 99%