2017 IEEE Third International Conference on Multimedia Big Data (BigMM) 2017
DOI: 10.1109/bigmm.2017.48
|View full text |Cite
|
Sign up to set email alerts
|

Separable Reversible Data Hiding in Encrypted Image with Classification Permutation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Based on the analysis of available RDHEI literature, the RDHEI techniques can be classified into three major categories, namely, vacating room after encryption (VRAE) [12,15,21,22], vacating room by encryption (VRBE) [32,34,35], and reserving room before encryption (RRBE) [23,[29][30][31]33]. The VRAE techniques create vacancies for secret data hiding in encrypted data whereas techniques that fall into the VRBE category create vacancies for secret data hiding during encryption.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the analysis of available RDHEI literature, the RDHEI techniques can be classified into three major categories, namely, vacating room after encryption (VRAE) [12,15,21,22], vacating room by encryption (VRBE) [32,34,35], and reserving room before encryption (RRBE) [23,[29][30][31]33]. The VRAE techniques create vacancies for secret data hiding in encrypted data whereas techniques that fall into the VRBE category create vacancies for secret data hiding during encryption.…”
Section: Introductionmentioning
confidence: 99%
“…TheseRDHEI techniques are known as non-separable techniques. In [19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34][35], another variant of RDHEI techniques, i.e., separable RDHEI techniques, was introduced to overcome the limitation of non-separability. These techniques allow separate restoration of subscriber data and extraction of auxiliary information from the marked encrypted information.…”
Section: Introductionmentioning
confidence: 99%
“…Wu (2017) did not confine gray-scale images, but proposed a new RDH scheme for encrypted color images. In order to improve the security and quality of decrypted and restored images, a separable reversible data hiding method for encrypted images based on classified arrangement was proposed (Yin et al, 2017). The quality of decrypted and restored images could be significantly improved by utilizing spatial correlation.…”
Section: Introductionmentioning
confidence: 99%