2020
DOI: 10.1109/access.2020.2972736
|View full text |Cite
|
Sign up to set email alerts
|

Separable Reversible Data Hiding in Encrypted Images With High Capacity Based on Median-Edge Detector Prediction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…A possible strategy is to make compromises on security by utilising bespoke encryption schemes in exchange for the redundancy and compressibility of encrypted objects [28][29][30][31][32]. Another strategy is to preprocess the cover objects prior to encryption in order to create space for the subsequent data embedding in the cryptospace [33][34][35][36][37][38][39]. From our perspective, both strategies have limitations and their practicality might be open to dispute.…”
Section: Introductionmentioning
confidence: 99%
“…A possible strategy is to make compromises on security by utilising bespoke encryption schemes in exchange for the redundancy and compressibility of encrypted objects [28][29][30][31][32]. Another strategy is to preprocess the cover objects prior to encryption in order to create space for the subsequent data embedding in the cryptospace [33][34][35][36][37][38][39]. From our perspective, both strategies have limitations and their practicality might be open to dispute.…”
Section: Introductionmentioning
confidence: 99%
“…To do this, a location map is generated, which is compressed using arithmetic coding and embedded in the cover image along with the encrypted message. A similar method is presented in [65]. It is based on a median-edge detector, which predicts image pixels.…”
Section: A Reversible Embeddingmentioning
confidence: 99%
“…Data hiding methods can also be divided into two kinds: reversible and irreversible, depending on the receiver’s ability to recover the cover digital image. Reversible data hiding (RDH) [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 ] can recover the primary digital image after reading the embedded secret messages. While irreversible data hiding (IRDH) [ 14 , 15 ] cannot recover the primary digital image from the message-embedded confidential image completely without loss.…”
Section: Introductionmentioning
confidence: 99%