A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Reversible Data Hiding In Encrypted Images by Reserving Room before Encryption
2014
International Journal of Engineering Research
Here, a novel method is proposed so as to reserve room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. ...
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded ...
to manipulate data in encrypted domain. ...
doi:10.17950/ijer/v3s7/705
fatcat:2gq4ubg3trg27jcc3o2dhtxxwq
A Multi-Domain Embedding Framework for Robust Reversible Data Hiding Scheme in Encrypted Videos
2022
Electronics
For easier cloud management, reversible data hiding is performed in an encrypted domain to embed label information. ...
Enhancing robustness while maintaining reversibility in data hiding is a challenge. ...
In Section 2, the proposed framework is described and anti-recompression reversible data hiding in encrypted videos based on multi-domain embedding is proposed. ...
doi:10.3390/electronics11162552
fatcat:lxihahstx5eafh5clmyb4v72su
Reversible knowledge activity in encrypted pictures by reserving space before cryptography
IARJSET - Science, Engineering and Technology
2014
IARJSET
IARJSET - Science, Engineering and Technology
In this paper, we propose a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. ...
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded ...
hiding key and have to manipulate data in encrypted domain. ...
doi:10.17148/iarjset.2014.1406
fatcat:g6uqsfniifho5h2w7u5pmyiqc4
Reversible Data Hiding in Encrypted Environment: A Review
2020
International Journal for Research in Applied Science and Engineering Technology
In recent years a huge attention is given to the technique called Reversible Data Hiding In Encrypted Images (RDHEI) due to the demand for high security requirement. ...
RDHEI is a type of data hiding that supports the lossless recovery of the host image following the extraction of secret hidden data. ...
In [8] Huang, Fangjun, Jiwu Huang, and Yun-Qing Shi. proposed a new framework for reversible data hiding in encrypted domain. ...
doi:10.22214/ijraset.2020.2098
fatcat:lafrvkxwefgcrese5modcb6g4y
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hiding in Cloud Over-Lay Network
2014
IOSR Journal of Computer Engineering
In this paper, we propose a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. ...
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be lossless recovered after embedded ...
Conclusion Reversible data hiding in encrypted images is a new topic drawing attention because of the privacypreserving requirements from cloud data management. ...
doi:10.9790/0661-16130812
fatcat:oz4ym47bfrennekn7gvcppr2gy
An Algorithm Extracting Hidden Data from Encrypted Images using IWT
2015
International Journal of Engineering Research and
Reversible data hiding technique in which the hidden data property is maintained even after processing on the image. ...
The image is used to embed additional information in the encrypted images, applies in many fields of security which can be recoverable with original media and the hided data without loss. ...
By wishing to remove the embedded data before the image decryption, a new idea is to apply reversible data hiding algorithm on encrypted images [8] . ...
doi:10.17577/ijertv4is051282
fatcat:bbp6xug6hnh57ma6lyiiqdg5ku
Separable Reversible Watermarking in Encrypted Images for Privacy Preservation
2022
Symmetry
We propose a separable, reversible watermarking scheme in encrypted images for privacy preservation. The Paillier cryptosystem is used for separable detection and decryption. ...
Even though the cloud service providers do not know the original image content, they can use the data-hiding key to detect the watermark from the encrypted image for authentication. ...
Proposed Method In this section, a new separable framework for reversible watermarking in encrypted images is proposed. The watermarking flowchart is shown in Figure 3 . ...
doi:10.3390/sym14071336
fatcat:74372suetjf3rhvkcfkwstl7cy
A Reversible Data Hiding Method in Encrypted Images for Controlling Trade-Off between Hiding Capacity and Compression Efficiency
2021
Journal of Imaging
In this paper, we propose a new framework for reversible data hiding in encrypted images, where both the hiding capacity and lossless compression efficiency are flexibly controlled. ...
Two different methods for reversible data hiding in encrypted images (RDH-EI) are used in our method, and each one is used for either region. ...
In this paper, we propose a new framework for RDH-EI that can control both the hiding capacity and lossless compression efficiency. ...
doi:10.3390/jimaging7120268
pmid:34940735
pmcid:PMC8703996
fatcat:gopomzp4kbgkjc3budezvrlrli
A Secure Data Transmission by Embedding Marked Encrypted Image on Cloak Image
2014
IOSR Journal of Computer Engineering
Data hiding is the method of embedding confidential information into a set of host data such as photograph, television signal or any other identity card Reversible data hiding in images is a technique, ...
To ensure security, we propose a novel method in which the marked encrypted image is embedded on a cloak image. ...
Conclusion Reversible data hiding in encrypted images is a new topic drawing attention because of the privacy preserving requirements from cloud data management. ...
doi:10.9790/0661-16272631
fatcat:wi3tnxkzdvczrfqxo7byyir3e4
A Novel Separable Scheme for Encryption and Reversible Data Hiding
2022
Electronics
This paper proposes a novel separable scheme for encryption and reversible data hiding. ...
In terms of the reversible data hiding algorithm, difference expansion is applied in encrypted video for the first time in this paper. ...
In most schemes, IPM and MVD sign are encrypted only for content distortion. The separable framework in the schemes is mainly realized by encryption and embedding in QDCT domain. ...
doi:10.3390/electronics11213505
fatcat:xz66aqsifbdw5mojlufeehhmb4
A Secure Method for Data Hiding in Encrypted Image using Progressive Recovery
2017
International Journal of Computer Applications
The existing paper explains reversible data hiding in encrypted images based on progressive recovery. ...
Three parties are involved in the framework, including the content owner, the data-hider, and the recipient. The owner encrypts the original image using an algorithm i.e. stream cipher . ...
PROPOSED SYSTEM A new Reversible Data Hiding in Encrypted Image protocol for three parties is proposed in this system. ...
doi:10.5120/ijca2017913409
fatcat:gvfwbm4vbbdgni3jcvxxxckcpq
A Review of Reversible Encrypted Data Concealment in Encrypted Images by Reserving Room approach for Data Protection System
2016
IJARCCE
The reversible encrypted data concealment in encrypted images is used to hide encrypted data in encrypted images for secret communication which has very high security. ...
The project proposes the enhancement of protection system for secret data communication through encrypted data concealment in encrypted images. ...
ACKNOWLEDGMENT The authors would like to thank the reviewers for many useful comments and suggestions which can improve the presentation of the paper. ...
doi:10.17148/ijarcce.2016.5122
fatcat:nikoyouhbjfx7h5nc7ogruw6ha
New Approach for Reversible Data Hiding Using Visual Cryptography
2014
2014 International Conference on Computational Intelligence and Communication Networks
By reversing the order of encryption and data hiding we overcome the difficulty of finding the room for data from already encrypted image. ...
This paper gives a review on various reversible data hiding techniques and also proposes a novel approach for reversible data hiding using visual cryptography. ...
Thus proposed scheme provides a completely new framework for reversible data hiding. Here in this approach we have used a new technique for reserving room before encryption of image. ...
doi:10.1109/cicn.2014.180
fatcat:7bszxdopwbgjdobjyze2enpnmq
GUI based Approach for Data Encryption and Decryption on MATLAB Platform
2018
International Journal of Computer Applications
In the era of digital technology, image (data) security has been a very vital concept for its practical applications. ...
With the use of "Steganography" a technique of hiding a special(secret) data (message) in any cover object while communicating between the transmitter and receiver, security of secret data always has been ...
INTRODUCTION A system for lossless and reversible data hiding in encrypted images proposes a lossless, a reversible, and a combined data hiding schemes. ...
doi:10.5120/ijca2018917758
fatcat:del6izwnpfa7xgccho5ksnf2py
Distinct Revocable Data Hiding In Ciphered Image
2014
IOSR Journal of Computer Engineering
Nowadays, we pay more attention to reversible data hiding in encrypted images, as the original cover can be reversibly recovered after embedded data is retrieved. ...
This scheme proposes a secure and authenticated reversible data hiding in cipher images. ...
Acknowledgements We wish to thank the Department of computer of MET BKC IOE College Nasik for providing the materials and their support during the course of this work. ...
doi:10.9790/0661-16671420
fatcat:wvvcwoxjefa2xmzcdfwnh7luya
« Previous
Showing results 1 — 15 out of 5,817 results