2023
DOI: 10.1109/tcsvt.2023.3270882
|View full text |Cite
|
Sign up to set email alerts
|

Reversible Data Hiding in Encrypted Images With Secret Sharing and Hybrid Coding

Abstract: Reversible data hiding in encrypted images (RD-HEI) is an essential data security technique. Most RDHEI methods cannot perform well in embedding capacity and security. To address this issue, we propose a new RDHEI method using Chinese remainder theorem-based secret sharing (CRTSS) and hybrid coding. Specifically, a hybrid coding is first proposed for RDH to achieve high embedding capacity. At the content owner side, a novel iterative encryption is designed to conduct block based encryption for perfectly preser… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 54 publications
0
12
0
Order By: Relevance
“…The prediction value of a block's pixel pi,j is determined as in where b = p(i−1, j), c = p(i−1, j −1), and a = p(i, j −1). [55] The median edge detector (MED) predicts the remaining pixels, while the preorder pixels of the first row or column anticipate the remaining pixels. Keep in mind that the reference pixel, p1,1, is not included in the data concealing.…”
Section: Methodologies a Proposed Hybrid Coding For Rdhmentioning
confidence: 99%
See 3 more Smart Citations
“…The prediction value of a block's pixel pi,j is determined as in where b = p(i−1, j), c = p(i−1, j −1), and a = p(i, j −1). [55] The median edge detector (MED) predicts the remaining pixels, while the preorder pixels of the first row or column anticipate the remaining pixels. Keep in mind that the reference pixel, p1,1, is not included in the data concealing.…”
Section: Methodologies a Proposed Hybrid Coding For Rdhmentioning
confidence: 99%
“…Keep in mind that the reference pixel, p1,1, is not included in the data concealing. Following that, the prediction error (PE) is produced by [55] Each block's PEs are computed using Equation ( 2), and they are then converted into the one-dimensional PE sequence e = [e2, e3,..., ef ] (f = t×t) in the order shown in Figure 1. The PEs' indexes in the one-dimensional sequence are represented by the numbers in Fig.…”
Section: Methodologies a Proposed Hybrid Coding For Rdhmentioning
confidence: 99%
See 2 more Smart Citations
“…The security of the concealment mechanism is guaranteed by the key-based encryption scheme. Based on the Chinese residue theorem, Yu et al [ 20 ] present a new method for hybrid encoding and secret sharing. In particular, a revolutionary iterative encryption is aimed to precisely preserve the spatial correlation of the original block in its encryption block, whereas a hybrid encoding aims to achieve high embedding capacity.…”
Section: Introductionmentioning
confidence: 99%