2020
DOI: 10.1109/lsp.2020.2965826
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Privacy-Preserving Technique Based on Contrast-Enhancement Reversible Data Hiding and Plaintext Encryption for Medical Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(19 citation statements)
references
References 25 publications
0
19
0
Order By: Relevance
“…Next, we use an example illustrated in Figure 9 to demonstrate the coding and compression process. Let the carrier image, A, with a size of m × n be given by m = 14 and n = 1, the grayscale values of A are represented as (163,162,168,166,164,160,124,126,15,13,8,7,9,5), and set the value of b Ele = 4 and b Num = 4 and generate the fragmentation of High 4 and Low 4 by using formula (1). Firstly, transform all the Low 4 into a one-dimensional binary space, B LowConnect = {0011001010000110 .…”
Section: Compressed Redundancy Space-filling Bitsmentioning
confidence: 99%
See 1 more Smart Citation
“…Next, we use an example illustrated in Figure 9 to demonstrate the coding and compression process. Let the carrier image, A, with a size of m × n be given by m = 14 and n = 1, the grayscale values of A are represented as (163,162,168,166,164,160,124,126,15,13,8,7,9,5), and set the value of b Ele = 4 and b Num = 4 and generate the fragmentation of High 4 and Low 4 by using formula (1). Firstly, transform all the Low 4 into a one-dimensional binary space, B LowConnect = {0011001010000110 .…”
Section: Compressed Redundancy Space-filling Bitsmentioning
confidence: 99%
“…RDH-EI scheme can ensure that the user can retrieve and recover the encrypted image in the plaintext domain, yet empowering that the cloud service providers can accurately extract information from the encrypted image and process it. Additionally, RDH-EI scheme can be further extended to support several real-world applications, such as managing credit records in financial services, court records in government agencies, image processing in military applications, and commercial image processing software [15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, there is an increasing trend in employing reversible data hiding (RDH) techniques to embed sensitive information into medical images. RHD schemes have found some applications to the medical images, which are reported by Yang et al [ 4 , 5 ]. This shows that RDH is a promising candidate in securing medical images with the additional ability to embed sensitive information, which is not found in traditional cryptographic algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, [ 4 ] had proposed a scheme to embed information into medical images through RDH and homomorphic encryption. Later on, [ 5 ] improved the scheme by proposing a novel paradigm (encrypt-then-RDH) to enhance the security of RDH over medical images.…”
Section: Introductionmentioning
confidence: 99%
“…Because compulsorily hiding unknown data into a cover image will reduce the image quality, data hiding methods can be further classified into the types of reversible data hiding and irreversible data hiding. Reversible data hiding methods [3][4][5][6][7][8] embed secret data into the image, and original image can be recovered from the marked image (i.e., the dataembedded image) during the decoding process. By contrast, irreversible data hiding methods [9][10][11][12][13][14][15] cannot reverse the marked image back to the cover image once data hiding process is completed.…”
Section: Introductionmentioning
confidence: 99%