Reversible Data Hiding In Encrypted Images
Citations
245 citations
Cites background or methods from "Reversible Data Hiding In Encrypted..."
...And we elaborate the experimental results and compare the performances among Zhang’s, Hong et al.’s and the proposed one in Section 4....
[...]
...Experimental comparisons among the proposed method and these methods in [15,16] are shown in Fig....
[...]
...In this paper, we propose an improved method based on Zhang’s and Hong et al.’s works....
[...]
...Here we adopt the image encryption algorithm identical to Zhang’s [15] and Hong et al.’s [16], in order to compare them conveniently and impartially....
[...]
...Section 2 introduces some related works such as Zhang’s and Hong et al.’s method briefly....
[...]
114 citations
Cites background or methods from "Reversible Data Hiding In Encrypted..."
...In [17], Zhang divided the encrypted image into several blocks....
[...]
...In fact, in some application cases, the cloud server does not need to consider the quality of marked image as done in all previous RDH-EI schemes [14], [17]–[23], only if the cloud server can losslessly restore the encrypted image E(I) and send it back to the users....
[...]
...For both methods in [17] and [18], decrypting image and extracting data must be jointly executed....
[...]
...1(a), such as schemes in [17] and [18], the image owner (the sender) encrypts the imageI into E(I) with a keyK....
[...]
95 citations
Cites background or methods from "Reversible Data Hiding In Encrypted..."
...Many approaches have been proposed for different applications, for example, compressing encrypted images [3], signal transformation in ciphertexts [4], pattern recognition in encrypted domain [5], watermarking in encrypted multimedia [6], data searching in encrypted dataset [7], etc. Reversible data hiding in encrypted images (RDH-EI) is another topic of SPED [8]....
[...]
...[8], [9], [10], [11], [12], [13], [14], [15], [14], [17], [18], [19], [20], [21], [22]....
[...]
...Reversible data hiding in encrypted images (RDH-EI) is another topic of SPED [8]....
[...]
...To find the achievable payload, we compare the proposed methods with [8] and [9] designed for uncompressed images....
[...]
...Experimental results listed in Table 5 show that payloads of the proposed method for JPEG are close to [8] and [9]....
[...]
83 citations
Cites methods from "Reversible Data Hiding In Encrypted..."
...AC CE PT ED M AN US CR IP T In general, the above RDHEI algorithms can be divided into two categories: algorithms based on vacating space after encryption (VRAE) based algorithms [11, 18, 28-30] and algorithms based on reserving room before encryption (RRBE) based algorithms [7, 16, 31]....
[...]
73 citations
Cites background from "Reversible Data Hiding In Encrypted..."
...In terms of separability, algorithms [9], [10] and [12] are separable, whereas algorithms [7] and [8] are non-separable....
[...]
...In terms of blindness, algorithms [7], [8], [9] and [12] are blind, whereas algorithm [10] is a non-blind algorithm....
[...]
...[7] [8] [9] [10] [12] Proposed Algorithm...
[...]
...Therefore, and due to the importance of hiding data in encrypted images, reversible data hiding in encrypted domain methods have recently become a very important research area [7-18]....
[...]
References
245 citations
114 citations
95 citations
83 citations
73 citations