2018
DOI: 10.1155/2018/9103418
|View full text |Cite
|
Sign up to set email alerts
|

Reversible Data Hiding with Pixel Prediction and Additive Homomorphism for Encrypted Image

Abstract: Data hiding in encrypted image is a recent popular topic of data security. In this paper, we propose a reversible data hiding algorithm with pixel prediction and additive homomorphism for encrypted image. Specifically, the proposed algorithm applies pixel prediction to the input image for generating a cover image for data embedding, referred to as the preprocessed image. The preprocessed image is then encrypted by additive homomorphism. Secret data is finally embedded into the encrypted image via modular 256 a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 42 publications
0
3
0
Order By: Relevance
“…As digital images are widely used in our lives, researchers have designed many image-based RDH algorithms. According to the meanings of visual contents of digital images, these RDH algorithms can be divided into two kinds: RDH algorithms for plaintext image [9][10][11] and RDH algorithms for encrypted image [12][13][14][15]. In this work, we study a novel RDH algorithm for encrypted image.…”
Section: Introductionmentioning
confidence: 99%
“…As digital images are widely used in our lives, researchers have designed many image-based RDH algorithms. According to the meanings of visual contents of digital images, these RDH algorithms can be divided into two kinds: RDH algorithms for plaintext image [9][10][11] and RDH algorithms for encrypted image [12][13][14][15]. In this work, we study a novel RDH algorithm for encrypted image.…”
Section: Introductionmentioning
confidence: 99%
“…The receiver can obtain the original image, secret data or both under specific authority. Generally, there are mainly three RDHEI frameworks, namely reserving room before encryption (RRBE) [19][20][21][22][23][24][25], vacating room after encryption (VRAE) [26][27][28][29][30][31][32] and vacating room by encryption (VRBE) [33][34][35][36][37][38][39][40].…”
Section: Introductionmentioning
confidence: 99%
“…Due to mean value preservation, data extraction and image recovery can be performed perfectly. Yu et al [24] encrypted the pre-processed image generated by prediction and conducted data hiding with additive homomorphism. Nguyen et al [25] selected smooth pixels according to a given threshold and four neighboring pixels before encryption.…”
Section: Introductionmentioning
confidence: 99%