Sign Up to like & get
recommendations!
0
Published in 2017 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-017-5065-3
Abstract: Encrypted image-based reversible data hiding methods have recently been introduced to conduct research on data encryption. In these methods, an image provider generates encrypted images that are supplied to a data sender. The data sender…
read more here.
Keywords:
image;
encrypted images;
method;
secret data ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6598-9
Abstract: In recent years, reversible data hiding in encrypted images (RDH-EI) has attracted more and more attention, and many RDH-EI algorithms have been proposed. Scholars focus on improving embedded capacity and decreasing bit error rate, but…
read more here.
Keywords:
algorithm;
encrypted images;
security analysis;
reversible watermarking ... See more keywords
Photo by nci from unsplash
Sign Up to like & get
recommendations!
2
Published in 2023 at "Chaos"
DOI: 10.1063/5.0130538
Abstract: Multiscale versions of weighted (and non-weighted) permutation entropy for two dimensions are considered in order to compare and analyze the results when different experiments are conducted. We propose the application of these measures to analyze…
read more here.
Keywords:
analyze encrypted;
permutation entropy;
encrypted images;
multiscale two ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3071819
Abstract: In this paper, we propose a reversible data hiding scheme for the encrypted images (RDHEI) based on vector quantization (VQ) prediction and parametric binary tree labeling (PBTL). VQ compression is a lossy image compression method,…
read more here.
Keywords:
encrypted images;
data hiding;
reversible data;
hiding scheme ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Signal Processing Letters"
DOI: 10.1109/lsp.2022.3143038
Abstract: Data hiding in encrypted images (DHEI) embeds data in the cipher state, which not only protects the confidentiality of the cover image content, but also hides the existence of the secret information, and has a…
read more here.
Keywords:
robust watermarking;
encrypted images;
scheme;
kronecker ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Circuits and Systems for Video Technology"
DOI: 10.1109/tcsvt.2022.3172226
Abstract: Reversible data hiding in encrypted images (RDHEI), an essential branch of reversible data hiding (RDH), has been in development for more than a decade. For most existing stream-cipher-based RDHEI algorithms, encryption schemes are often not…
read more here.
Keywords:
encrypted images;
rdhei algorithms;
stream cipher;
data hiding ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Cybernetics"
DOI: 10.1109/tcyb.2022.3163245
Abstract: Reversible data hiding in ciphertext has potential applications for privacy protection and transmitting extra data in a cloud environment. For instance, an original plain-text image can be recovered from the encrypted image generated after data…
read more here.
Keywords:
hiding encrypted;
encrypted images;
homomorphic processing;
lossless data ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2023 at "Applied Sciences"
DOI: 10.3390/app13095696
Abstract: With the increasing requirements for the security of medical data, military data, and other data transmission, data hiding technology has gradually developed from only protecting the security of secret data to all transmission data. As…
read more here.
Keywords:
encrypted images;
multi bit;
bit layer;
data hiding ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "Symmetry"
DOI: 10.3390/sym15010189
Abstract: Reversible data hiding in encrypted images (RDHEI) is commonly used for privacy protection in images stored on cloud storage. Currently, block permutation and co-modulation (BPCM) encryption is commonly utilized in most existing RDHEI schemes to…
read more here.
Keywords:
encrypted images;
image;
method;
cryptanalysis ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "Symmetry"
DOI: 10.3390/sym9120308
Abstract: Due to the increased digital media on the Internet, data security and privacy protection issue have attracted the attention of data communication. Data hiding has become a topic of considerable importance. Nowadays, a new challenge…
read more here.
Keywords:
based division;
encrypted images;
method;
block based ... See more keywords