2014 International Conference on Contemporary Computing and Informatics (IC3I) 2014
DOI: 10.1109/ic3i.2014.7019628
|View full text |Cite
|
Sign up to set email alerts
|

Reversible data hiding in encrypted images by active block exchange and room reservation

Abstract: Reversible data hiding in encrypted images (RDH-EI) has got some promising applications in cloud storage, medical imaging, forensics etc. It has gained considerable research interest in recent years. In this paper, we follow the paradigm of reserving room for additional data before encrypting the image and propose a new method by classifying the smooth and coarse blocks of the image. LSB-planes of coarse blocks are reserved to hide additional data. Smooth blocks are used to back-up the locations reserved for t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 14 publications
0
10
0
1
Order By: Relevance
“…The vacated room of LSBs in complex parts can be applied for embedding a secret message. On the basis of the original algorithm, Mathew et al [ 20 ] improved Ma et al’s method in ER and PSNR, mainly adding the steps of dividing the original image into small blocks and classifying the small blocks into smooth blocks and complex blocks. In [ 21 ], Zhang et al introduced a lossless, a reversible, and a combined data hiding scheme for ciphertext image encryption based on public-key cryptosystems with probabilistic and homomorphic properties.…”
Section: Preliminariesmentioning
confidence: 99%
“…The vacated room of LSBs in complex parts can be applied for embedding a secret message. On the basis of the original algorithm, Mathew et al [ 20 ] improved Ma et al’s method in ER and PSNR, mainly adding the steps of dividing the original image into small blocks and classifying the small blocks into smooth blocks and complex blocks. In [ 21 ], Zhang et al introduced a lossless, a reversible, and a combined data hiding scheme for ciphertext image encryption based on public-key cryptosystems with probabilistic and homomorphic properties.…”
Section: Preliminariesmentioning
confidence: 99%
“…In this work, original image is divided into coarse area and smooth area, the traditional RDH method [3] is exploited to embed several least significant bit (LSB) planes of the coarse area into the smooth area, and the vacated LSB planes are used for data embedding. Motivated by [16], Mathew and Wilscy [17] presented an IET Image Process. 2021;1-13.…”
Section: Introductionmentioning
confidence: 99%
“…In the past decade, researchers have proposed many effective RDHEI methods [24][25][26][27][28][29]. According to the different order, either before or after encryption, there are two kinds of categories in recent RDHEI methods: (1) the methods by vacating room after encryption (VRAE) [24][25][26] and (2) the methods by reserving room before encryption (RRBE) [27][28][29].…”
Section: Introductionmentioning
confidence: 99%
“…Thus, after the encryption of the image, the LSBs of A can be used to embed data. Based on [27], Mathew and Wilscy [28] proposed an improved method using active block exchange in 2014. They divided the original image into smooth blocks and active blocks, and then they rearranged all the blocks to obtain a smooth area and an active area.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation