Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
Citations
432 citations
Cites methods from "Reversible Data Hiding in Encrypted..."
...In [158], the embedding room is created in digital images by embedding LSBs of certain pixels into other pixels using a traditional RDH method....
[...]
..., vacating embedding room before encryption [158]–[161]....
[...]
323 citations
Cites methods or result from "Reversible Data Hiding in Encrypted..."
...To overcome this drawback, the methods of reserving room before encryption (RRBE) are proposed [28], [29]....
[...]
...For RRBE, two major proposed methods are [28] and [29]....
[...]
...PSNR comparison for the directly decrypted images with the methods [23]–[29]....
[...]
...In [29], the reserving room is obtained by embedding LSBs of some pixels into other pixels....
[...]
...Specifically, in the most state-of-the-art RRBE method [29], the spare space emptied out is limited to at most three LSB-planes....
[...]
258 citations
Cites background or methods from "Reversible Data Hiding in Encrypted..."
...were the first to describe a RRBE technique [12]....
[...]
...The space to embed the message may be vacated after or before the encryption phase and, during the decoding phase, image reconstruction and data extraction can be processed at the same time [17], [27] or separately [12], [27], [28]....
[...]
241 citations
Cites background or methods from "Reversible Data Hiding in Encrypted..."
...Comparison of approximately recovered image quality in (a) [11] and (b) [13]....
[...]
...Although VRBE can achieve a higher payload, it requires that the sender must perform an extra RDH before image encryption....
[...]
...For example, the method in [11] creates embedding room in the plaintext image by embedding LSBs of certain pixels into other pixels using a traditional RDH method....
[...]
...When comparing with VRBE methods, embedding payload of the proposed method is not as large as that of [11], which...
[...]
...As to the embedding payload, VRBE substantially outperforms the previous VRAE method because VRBE has the advantage of handling the plaintext image by the sender....
[...]
230 citations
Cites background from "Reversible Data Hiding in Encrypted..."
...If the creation of sparse data space or the compression is implemented before encryption, a better performance can be achieved [18], [19]....
[...]
References
13,597 citations
"Reversible Data Hiding in Encrypted..." refers background in this paper
...K. Ma, W. Zhang, and N. Yu are with the School of Information Science and Technology, University of Science and Technology of China, Hefei, 230026, China (e-mail: k29ma@uwaterloo.ca; weimingzhang@yahoo.cn; ynh@ustc.edu.cn)....
[...]
...This work was supported in part by the Natural Science Foundation of China under Grant 61170234 and Grant 60803155, and in part by the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant XDA06030601....
[...]
...X. Zhao and F. Li are with the State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China (e-mail: zhaoxianfeng@iie.ac.cn; lifenghua@iie.ac.cn)....
[...]
2,739 citations
"Reversible Data Hiding in Encrypted..." refers methods in this paper
...This work was supported in part by the Natural Science Foundation of China under Grant 61170234 and Grant 60803155, and in part by the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant XDA06030601....
[...]
2,240 citations
1,229 citations
"Reversible Data Hiding in Encrypted..." refers background in this paper
...K. Ma, W. Zhang, and N. Yu are with the School of Information Science and Technology, University of Science and Technology of China, Hefei, 230026, China (e-mail: k29ma@uwaterloo.ca; weimingzhang@yahoo.cn; ynh@ustc.edu.cn)....
[...]
1,126 citations
"Reversible Data Hiding in Encrypted..." refers background in this paper
...K. Ma, W. Zhang, and N. Yu are with the School of Information Science and Technology, University of Science and Technology of China, Hefei, 230026, China (e-mail: k29ma@uwaterloo.ca; weimingzhang@yahoo.cn; ynh@ustc.edu.cn)....
[...]