2019
DOI: 10.1109/tcsvt.2018.2797897
|View full text |Cite
|
Sign up to set email alerts
|

New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
33
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 92 publications
(35 citation statements)
references
References 25 publications
0
33
0
2
Order By: Relevance
“…In VRAE methods, the remote server generates embedding room by modified some pixel values of the encrypted image directly. VRAE methods can be further grouped into three categories, i.e., data extraction in plaintext domain [19]- [23], data extraction in the cipher domain [24]- [30], and data extraction in both domains [31]- [34]. These VRAE methods achieve decent performances of RDH in encrypted image.…”
Section: Introductionmentioning
confidence: 99%
“…In VRAE methods, the remote server generates embedding room by modified some pixel values of the encrypted image directly. VRAE methods can be further grouped into three categories, i.e., data extraction in plaintext domain [19]- [23], data extraction in the cipher domain [24]- [30], and data extraction in both domains [31]- [34]. These VRAE methods achieve decent performances of RDH in encrypted image.…”
Section: Introductionmentioning
confidence: 99%
“…Although these RDHECI methods [22]- [27], [37], [38] well provide content security and privacy-preserving while effectively reducing the bandwidth of transmission. However, all of them have the weakness of the limitation of embedding capacity.…”
Section: Introductionmentioning
confidence: 99%
“…Data hiding is then performed with the use of a labelling strategy. It achieves a higher embedding capacity than most existing methods [22]- [27], [37], [38]. 2) We propose another RDHECI scheme based on modified AMBTC compression codes, M-AMBTC, where the parities of quantization levels are modified to be in homomorphism.…”
Section: Introductionmentioning
confidence: 99%
“…The work of Puteaux and Puech [14] has used most significant bits of increasing the embedding capacity using predictive approach. Existing system has also witnessed usage of ciphering process over image bitstreams using reversible data hiding approach as seen in work of Qian et al, [15].…”
Section: Introductionmentioning
confidence: 99%