2023
DOI: 10.3390/electronics12020450
|View full text |Cite
|
Sign up to set email alerts
|

An Ensemble Learning Approach for Reversible Data Hiding in Encrypted Images with Fibonacci Transform

Abstract: Reversible data hiding (RDH) is an active area of research in the field of information security. In RDH, a secret can be embedded inside a cover medium. Unlike other data-hiding schemes, RDH becomes important in applications that demand recovery of the cover without any deformation, along with recovery of the hidden secret. In this paper, a new RDH scheme is proposed for performing reversible data hiding in encrypted images using a Fibonacci transform with an ensemble learning method. In the proposed scheme, t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 59 publications
0
4
0
Order By: Relevance
“…The joint algorithms must perform data extraction and cover decryption according to the designed order. To achieve true reversibility and separability, the two operations must be completed without errors, such as in [7][8][9][10][11][12][13][14]27,36], etc. Separable algorithms have more flexibility.…”
Section: The Cover Image Decryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…The joint algorithms must perform data extraction and cover decryption according to the designed order. To achieve true reversibility and separability, the two operations must be completed without errors, such as in [7][8][9][10][11][12][13][14]27,36], etc. Separable algorithms have more flexibility.…”
Section: The Cover Image Decryptionmentioning
confidence: 99%
“…Therefore, the embedding ability has excellent advantages. Li(2020) [29] Wang(2021) [17] Xu(2021) [15] Liu[2020] [16] Panchikki[2023] [10] The proposed scheme Although the EC varied across datasets, the performance in decryption recovery was consistent. PSNR can be obtained from Tables 3-6.…”
Section: Tests On Other Datasetsmentioning
confidence: 99%
“…Both data hiding [1,2] and message encryption [3,4] can be used to transmit secret information in secure communication [5]. The confusion in encrypted messages easily catches attackers' attention.…”
Section: Introductionmentioning
confidence: 99%
“…RDH in natural images [ 19 ] and RDH in encrypted images [ 20 ] are the two widely explored types of RDH. A basic workflow of RDH in an encrypted image is shown in Figure 3 .…”
Section: Introductionmentioning
confidence: 99%