Javascript must be enabled to continue!
A Novel Separable Scheme for Encryption and Reversible Data Hiding
View through CrossRef
With the increasing emphasis on security and privacy, video in the cloud sometimes needs to be stored and processed in an encrypted format. To facilitate the indexing and tampering detection of encrypted videos, data hiding is performed in encrypted videos. This paper proposes a novel separable scheme for encryption and reversible data hiding. In terms of encryption method, intra-prediction mode and motion vector difference are encrypted by XOR encryption, and quantized discrete cosine transform block is permutated based on logistic chaotic mapping. In terms of the reversible data hiding algorithm, difference expansion is applied in encrypted video for the first time in this paper. The encryption method and the data hiding algorithm are separable, and the embedded information can be accurately extracted in both encrypted video bitstream and decrypted video bitstream. The experimental results show that the proposed encryption method can resist sketch attack and has higher security than other schemes, keeping the bit rate unchanged. The embedding algorithm used in the proposed scheme can provide higher capacity in the video with lower quantization parameter and good visual quality of the labeled decrypted video, maintaining low bit rate variation. The video encryption and the reversible data hiding are separable and the scheme can be applied in more scenarios.
Title: A Novel Separable Scheme for Encryption and Reversible Data Hiding
Description:
With the increasing emphasis on security and privacy, video in the cloud sometimes needs to be stored and processed in an encrypted format.
To facilitate the indexing and tampering detection of encrypted videos, data hiding is performed in encrypted videos.
This paper proposes a novel separable scheme for encryption and reversible data hiding.
In terms of encryption method, intra-prediction mode and motion vector difference are encrypted by XOR encryption, and quantized discrete cosine transform block is permutated based on logistic chaotic mapping.
In terms of the reversible data hiding algorithm, difference expansion is applied in encrypted video for the first time in this paper.
The encryption method and the data hiding algorithm are separable, and the embedded information can be accurately extracted in both encrypted video bitstream and decrypted video bitstream.
The experimental results show that the proposed encryption method can resist sketch attack and has higher security than other schemes, keeping the bit rate unchanged.
The embedding algorithm used in the proposed scheme can provide higher capacity in the video with lower quantization parameter and good visual quality of the labeled decrypted video, maintaining low bit rate variation.
The video encryption and the reversible data hiding are separable and the scheme can be applied in more scenarios.
Related Results
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu
An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu
The massive Internet of Things (IoT) connecting various types of intelligent sensors for goods tracking in logistics, environmental monitoring and smart grid management is a crucia...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force
Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force
The purpose of this study is to test the relationship between abusive supervision and employee’s knowledge hiding behavior (evasive hiding, playing dumb, rationalized hiding) among...
Knowledge Hiding Behaviors and Team Creativity: The Contingent Role of Perceived Mastery Motivational Climate
Knowledge Hiding Behaviors and Team Creativity: The Contingent Role of Perceived Mastery Motivational Climate
The present study explains how different factors of knowledge hiding (e.g., evasive, playing dumb, and rationalized) influence on team creativity. Drawn on social exchange theory, ...
On Frobenius and separable algebra extensions in monoidal categories: applications to wreaths
On Frobenius and separable algebra extensions in monoidal categories: applications to wreaths
We characterize Frobenius and separable monoidal algebra extensions
i: R \to S
in terms given by...

