2022
DOI: 10.3390/electronics11213505
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Separable Scheme for Encryption and Reversible Data Hiding

Abstract: With the increasing emphasis on security and privacy, video in the cloud sometimes needs to be stored and processed in an encrypted format. To facilitate the indexing and tampering detection of encrypted videos, data hiding is performed in encrypted videos. This paper proposes a novel separable scheme for encryption and reversible data hiding. In terms of encryption method, intra-prediction mode and motion vector difference are encrypted by XOR encryption, and quantized discrete cosine transform block is permu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…In the study [42], the authors introduced the addition and removal of content and images as a form of tampering on some regions in the encrypted video and also performed a recovery of these regions using the POB number system. Another study [43] investigated whether hidden data could be retrieved from encrypted videos by using noise as a sketch attack. By using an enhanced encrypted watermarking technique, the authors [44]detect video tampering using a watermarked blockchain.…”
Section: Tampering and Its Detection In Encrypted Visual Contentmentioning
confidence: 99%
“…In the study [42], the authors introduced the addition and removal of content and images as a form of tampering on some regions in the encrypted video and also performed a recovery of these regions using the POB number system. Another study [43] investigated whether hidden data could be retrieved from encrypted videos by using noise as a sketch attack. By using an enhanced encrypted watermarking technique, the authors [44]detect video tampering using a watermarked blockchain.…”
Section: Tampering and Its Detection In Encrypted Visual Contentmentioning
confidence: 99%
“…This scheme combines the idea of two-layer embedding to further increase the embedding capacity. Chen et al [25] proposed a novel separable scheme for encryption and reversible data hiding. The embedding algorithm used in the proposed scheme can provide a higher capacity in the video with a lower quantization parameter and a good visual quality of the labeled decrypted video, maintaining low bit rate variation.…”
Section: Related Workmentioning
confidence: 99%
“…In this case, we can directly extract the watermark information from the distorted image I a for copyright verification. We adopted a generic reversible algorithm framework and traditional reversible watermarking methods such as histogram modification (HM) [24], pixel value ordering (PVO) [25], difference expansion (DE) [26], and prediction error expansion (PEE) [27] techniques. In this paper, we specifically used difference expansion.…”
Section: Integrity Informationmentioning
confidence: 99%