Javascript must be enabled to continue!
Reversible Data Hiding in Encrypted Domain Based on the Error-Correction Redundancy of Encryption Process
View through CrossRef
The existing reversible data hiding methods in encrypted domain separate image encryption from information embedding and do not make full use of the redundant space in the process of image encryption. In order to improve the performance of reversible data hiding by using the technical characteristics of image encryption, a reversible data hiding method based on McEliece error correction is proposed. Firstly, the segmentation position of bit plane is determined according to the embedding requirement and texture characteristic, and the image is divided into high and low significant bits. Secondly, because of the error-correcting characteristic of McEliece encryption, reversible data embedding can be realized while encrypting low significant bits. Then, the high significant bits are compressed to reserve space for the ciphertext extension of the low significant bits. Finally, the whole high significant bits information is stream-encrypted. As long as the image receiver has the decryption key, the image can be restored without distortion. By concealing the relationship between error correction and secret information mapping, the concealment of secret information transmission can be realized. In addition, due to different processing for different pixels, it can be efficiently transmitted with low computational complexity for applications that only need general images. The simulation results show that this scheme can not only realize the separable operation of information extraction and image recovery but also resist the noise attack to a certain extent. The maximum embedding rates of 10 standard images from USC-SIPI and 50 standard images from BOSS-BASE are 2.228 and 2.323 bpp, respectively.
Title: Reversible Data Hiding in Encrypted Domain Based on the Error-Correction Redundancy of Encryption Process
Description:
The existing reversible data hiding methods in encrypted domain separate image encryption from information embedding and do not make full use of the redundant space in the process of image encryption.
In order to improve the performance of reversible data hiding by using the technical characteristics of image encryption, a reversible data hiding method based on McEliece error correction is proposed.
Firstly, the segmentation position of bit plane is determined according to the embedding requirement and texture characteristic, and the image is divided into high and low significant bits.
Secondly, because of the error-correcting characteristic of McEliece encryption, reversible data embedding can be realized while encrypting low significant bits.
Then, the high significant bits are compressed to reserve space for the ciphertext extension of the low significant bits.
Finally, the whole high significant bits information is stream-encrypted.
As long as the image receiver has the decryption key, the image can be restored without distortion.
By concealing the relationship between error correction and secret information mapping, the concealment of secret information transmission can be realized.
In addition, due to different processing for different pixels, it can be efficiently transmitted with low computational complexity for applications that only need general images.
The simulation results show that this scheme can not only realize the separable operation of information extraction and image recovery but also resist the noise attack to a certain extent.
The maximum embedding rates of 10 standard images from USC-SIPI and 50 standard images from BOSS-BASE are 2.
228 and 2.
323 bpp, respectively.
Related Results
A Novel Separable Scheme for Encryption and Reversible Data Hiding
A Novel Separable Scheme for Encryption and Reversible Data Hiding
With the increasing emphasis on security and privacy, video in the cloud sometimes needs to be stored and processed in an encrypted format. To facilitate the indexing and tampering...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
A Multiparty Homomorphic Encryption Approach to Confidential Federated Kaplan–Meier Survival Analysis
A Multiparty Homomorphic Encryption Approach to Confidential Federated Kaplan–Meier Survival Analysis
Abstract
The proliferation of real-world healthcare data has substantially expanded opportunities for collaborative research, yet stringent privacy regulations hinder the p...
Research on Video Encryption Technology Based on Cross Coupled Map Lattices System
Research on Video Encryption Technology Based on Cross Coupled Map Lattices System
<p>The traditional video encryption algorithm only encrypts video images, which has the problems of an extended time-consuming algorithm and poor format retention. To improve...
Automatic Selective Encryption of DICOM Images
Automatic Selective Encryption of DICOM Images
Securing DICOM images is essential to protect the privacy of patients, especially in the era of telemedicine and eHealth/mHealth. This increases the demand for rapid security. Neve...
A novel pattern-based reversible data hiding technique for video steganography
A novel pattern-based reversible data hiding technique for video steganography
Abstract
This paper explains a novel pattern based color video data hiding technique based on moving regions detection. In the proposed system first the video gets separate...
Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force
Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force
The purpose of this study is to test the relationship between abusive supervision and employee’s knowledge hiding behavior (evasive hiding, playing dumb, rationalized hiding) among...

