2019
DOI: 10.1109/tmm.2018.2844679
|View full text |Cite
|
Sign up to set email alerts
|

Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
176
0
7

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 172 publications
(184 citation statements)
references
References 37 publications
1
176
0
7
Order By: Relevance
“…In this paper, we propose an efficient method of reversible data hiding in encrypted images using parametric binary tree labeling, which is an improved method based on Yi et al's works [18]. A higher embedding rate can be achieved and during the decoding phase, the secret information must be extracted without error using data-hiding key and the original content of the image must be restored losslessly using the encryption key.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this paper, we propose an efficient method of reversible data hiding in encrypted images using parametric binary tree labeling, which is an improved method based on Yi et al's works [18]. A higher embedding rate can be achieved and during the decoding phase, the secret information must be extracted without error using data-hiding key and the original content of the image must be restored losslessly using the encryption key.…”
Section: Resultsmentioning
confidence: 99%
“…In order to achieve a better performance, we set the length of fixed-length codewords to 3 and block size to 4 × 4 in [21]. In [18] the block size is set to 3 × 3, α and β are also set to 5 and 2. Fig.…”
Section: B Comparisons With Related Methods and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Generally, existing RDH-EI methods can be classified into three categories, namely, methods by vacating room after encryption (VRAE) [12][13][14][15][16][17][18][19][20][21][22], methods by reserving room before encryption (RRBE) [23][24][25], and methods based on homomorphic encryption [26][27][28][29][30][31][32][33]. The early VRAE framework is proposed by Zhang [12,13] and Hong et al [14].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, a high capacity reversible data hiding approach based on MSB (most significant bit) prediction is presented in [19]. In addition, several other VRAE schemes are reported in [20][21][22].…”
Section: Introductionmentioning
confidence: 99%