2020
DOI: 10.1016/j.image.2019.115632
|View full text |Cite
|
Sign up to set email alerts
|

High-capacity reversible data hiding in encrypted image based on specific encryption process

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 44 publications
(18 citation statements)
references
References 30 publications
0
18
0
Order By: Relevance
“…, α 2 L . The location of the bit on the upper left of the leaf node's corresponding bit-block is first determined by Equations (13) and 14, denoted as (I, J). Then the length of the bit-block is calculated by Equation (15).…”
Section: (A) Hierarchical Quad-tree Code Recoverymentioning
confidence: 99%
See 1 more Smart Citation
“…, α 2 L . The location of the bit on the upper left of the leaf node's corresponding bit-block is first determined by Equations (13) and 14, denoted as (I, J). Then the length of the bit-block is calculated by Equation (15).…”
Section: (A) Hierarchical Quad-tree Code Recoverymentioning
confidence: 99%
“…The RDH methods are suitable for some stringent fields such as medical, military, and legal systems. Therefore, researchers consider combining cryptography with RDH to propose RDHEI methods [11][12][13], which can significantly improve the security of data in the third-party platforms. The RDHEI method is designed for the case that the digital image is encrypted before embedding secret data.…”
Section: Introductionmentioning
confidence: 99%
“…Next, we compare our scheme with other relevant methods [7,11,15,24,25,26 ] in embedding capacity. Chen et al [11] also reserved the embedding room using a reversible integer transformation, and it is also a SOK-type scheme.…”
Section: Comparison Experiments and Analysismentioning
confidence: 99%
“…Scheme [24] divided the encrypted image into blocks and embedded the secret data in each block using the histogram shifting method. Huang [26] combined the MED prediction and specific encryption algorithm to reserve the embedding room for data embedding in the encryption processing and obtained a higher embedding capacity than the above schemes. The detailed comparison results are shown in the Table 4.…”
Section: Comparison Experiments and Analysismentioning
confidence: 99%
See 1 more Smart Citation