2023
DOI: 10.1109/tcc.2022.3155744
|View full text |Cite
|
Sign up to set email alerts
|

A Universal Reversible Data Hiding Method in Encrypted Image Based on MSB Prediction and Error Embedding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 39 publications
0
4
0
Order By: Relevance
“…The decrease in prediction accuracy results in a lower embedding rate for Baboon images, which have a rougher texture. Furthermore, figure 15 reveals that the embedding rate of the scheme proposed in literature [22] is notably lower than those of other schemes. This is primarily due to the fact that the scheme falls under the VRAE category, where the spatial redundancy of encrypted images is relatively low, consequently resulting in a lower embedding rate.…”
Section: Comparisons Of Embedding Ratementioning
confidence: 93%
See 1 more Smart Citation
“…The decrease in prediction accuracy results in a lower embedding rate for Baboon images, which have a rougher texture. Furthermore, figure 15 reveals that the embedding rate of the scheme proposed in literature [22] is notably lower than those of other schemes. This is primarily due to the fact that the scheme falls under the VRAE category, where the spatial redundancy of encrypted images is relatively low, consequently resulting in a lower embedding rate.…”
Section: Comparisons Of Embedding Ratementioning
confidence: 93%
“…There are two primary research methods in RDHEI: Vacating Room After Encryption (VRAE) [17][18][19] and Reserving Room Before Encryption (RRBE) [20][21][22]. The basic idea of RDHEI using VRAE is to encrypt the original image first and then embed the data by modifying small portions of the encrypted data.…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, safeguarding the integrity and confidentiality of the information encapsulated within these images has surfaced as a momentous and pressing challenge. To protect the images effectively and prevent the information from being illegally decrypted, researchers have developed many techniques such as image encryption [1][2][3][4] and data hiding [5][6][7][8][9]. Among these techniques, image encryption is the most direct and effective method to convert a source image into an unrecognizable encrypted image [10].…”
Section: Introductionmentioning
confidence: 99%
“…Others design specific reversible image transformation schemes to convert a plaintext image into another image with a high degree of redundancy, directly using plaintext image-based RDH methods to embed secret data [42,43]. In [44], the image is divided into blocks, which are categorized into three different types, and then different encoding schemes are used on the blocks to vacate room. In [45], a block-level encryption algorithm based on a chaotic system is used, and an adaptive-layer MSB substitution scheme is used for reversible data hiding.…”
Section: Introductionmentioning
confidence: 99%