Separable reversible data hiding in encrypted images based on Paillier cryptosystem
Many researchers pay attention on performing reversible data hiding in encrypted images; after extracting the embedded secret information, the objective is not only to perfectly recover the original image but to also protect the privacy of content. This paper proposes a separable and reversible data...
Saved in:
Published in | Multimedia tools and applications Vol. 81; no. 13; pp. 18807 - 18827 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.05.2022
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Many researchers pay attention on performing reversible data hiding in encrypted images; after extracting the embedded secret information, the objective is not only to perfectly recover the original image but to also protect the privacy of content. This paper proposes a separable and reversible data hiding in encrypted images scheme based on histogram shifting and the Paillier cryptosystem. The proposed scheme is divided into three parts: the image owner, data hider and receiver. First, the image owner takes the receiver’s public key to encrypt the cover image using the Paillier cryptosystem. According to the difference between two adjacent pixels, the data hider collects all the differences to generate the differencing distribution, and then, embeds secret data into differencing using the histogram shifting and hiding key. Finally, the receiver can simultaneously extract the secret information and recover the original image if the receiver has the hiding key and private key. In the experimental results, it is completely shown that compared to other scheme, the proposed scheme has better performance of image quality at the same number of embedded bits. |
---|---|
AbstractList | Many researchers pay attention on performing reversible data hiding in encrypted images; after extracting the embedded secret information, the objective is not only to perfectly recover the original image but to also protect the privacy of content. This paper proposes a separable and reversible data hiding in encrypted images scheme based on histogram shifting and the Paillier cryptosystem. The proposed scheme is divided into three parts: the image owner, data hider and receiver. First, the image owner takes the receiver’s public key to encrypt the cover image using the Paillier cryptosystem. According to the difference between two adjacent pixels, the data hider collects all the differences to generate the differencing distribution, and then, embeds secret data into differencing using the histogram shifting and hiding key. Finally, the receiver can simultaneously extract the secret information and recover the original image if the receiver has the hiding key and private key. In the experimental results, it is completely shown that compared to other scheme, the proposed scheme has better performance of image quality at the same number of embedded bits. |
Author | Tsai, Chwei-Shyong Zhang, Yung-Sung Weng, Chi-Yao |
Author_xml | – sequence: 1 givenname: Chwei-Shyong surname: Tsai fullname: Tsai, Chwei-Shyong organization: Department of Management Information Systems, National Chung Hsing University – sequence: 2 givenname: Yung-Sung surname: Zhang fullname: Zhang, Yung-Sung organization: Department of Management Information Systems, National Chung Hsing University – sequence: 3 givenname: Chi-Yao orcidid: 0000-0002-0619-1966 surname: Weng fullname: Weng, Chi-Yao email: cyweng@mail.nptu.edu.tw organization: Department of Computer Science, National Pingtung University |
BookMark | eNp9kE9LAzEQxYNUsK1-AU8Bz9FMkk12j1L8BwWF6jlkd2frlm22Jluh3960K3jzNG_g92Z4b0YmvvdIyDXwW-Dc3EUArgTjQjAQOlcsPyNTyIxkxgiYJC1zzkzG4YLMYtxwDjoTakpWK9y54MoOacBvDLE9ytoNjn62devXtPUUfRUOuwFr2m7dGiMtXUxL7-mba7uuxUBPQB8PccDtJTlvXBfx6nfOycfjw_vimS1fn14W90tWSSgGBnUpoXSmgEqKDDQoZbiuZG4kVnkDhSqMThkyXWcGM6F1pRGbPE9MgbWRc3Iz3t2F_muPcbCbfh98emkTzAWXClSixEhVoY8xYGN3IcUIBwvcHsuzY3k2lWdP5dk8meRoign2awx_p_9x_QD7t3MS |
CitedBy_id | crossref_primary_10_1016_j_dsp_2023_104365 crossref_primary_10_1007_s11042_023_17242_4 crossref_primary_10_1007_s11042_023_15514_7 crossref_primary_10_1155_2022_4671799 crossref_primary_10_1007_s11042_023_16984_5 crossref_primary_10_1007_s10044_024_01220_z crossref_primary_10_1007_s11760_024_03275_1 |
Cites_doi | 10.1109/TCSVT.2009.2017409 10.1007/s11042-019-07874-w 10.1016/j.image.2015.09.014 10.1109/TCSVT.2006.869964 10.1016/j.jvcir.2014.12.007 10.1016/j.jvcir.2014.04.003 10.1016/j.image.2015.10.001 10.1016/j.sigpro.2014.04.032 10.1016/j.ijleo.2016.11.059 10.1016/j.dsp.2013.11.002 10.1109/TCSVT.2003.815962 10.1016/j.patcog.2003.08.007 10.1109/TCSVT.2006.882380 10.1109/TSP.2005.855393 10.1016/j.sigpro.2016.07.002 10.1109/TMM.2014.2316154 10.1109/TCSVT.2008.2009252 10.1007/s11042-019-08079-x 10.1109/TIFS.2013.2248725 10.1007/s11042-018-6567-3 10.1016/j.sigpro.2019.05.036 10.1109/LSP.2012.2187334 10.1109/LSP.2011.2114651 10.1016/j.sigpro.2012.07.025 10.1109/TIP.2004.828418 10.1016/j.jvcir.2017.02.001 10.1109/TCSVT.2015.2433194 10.1145/2000486.2000489 10.1109/TIFS.2013.2261062 10.1016/j.jvcir.2016.08.021 10.1109/TCSVT.2015.2418611 10.4218/etrij.14.0213.0449 10.1016/j.jvcir.2016.09.005 10.1186/s13634-017-0496-6 |
ContentType | Journal Article |
Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022. |
Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022. |
DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8AO 8FD 8FE 8FG 8FK 8FL 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ GUQSH HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N M2O MBDVC P5Z P62 PQBIZ PQBZA PQEST PQQKQ PQUKI Q9U |
DOI | 10.1007/s11042-022-12684-8 |
DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni Edition) Research Library (Alumni Edition) ProQuest Central (Alumni) ProQuest Central Advanced Technologies & Aerospace Database (1962 - current) ProQuest Central Essentials ProQuest Central ProQuest Business Premium Collection Technology Collection ProQuest One Community College ProQuest Central Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student Research Library Prep SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Research Library Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection One Business (ProQuest) ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central Basic |
DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Research Library Prep Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Pharma Collection ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest Central Korea ProQuest Research Library Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest Central (Alumni) Business Premium Collection (Alumni) |
DatabaseTitleList | ABI/INFORM Global (Corporate) |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1573-7721 |
EndPage | 18827 |
ExternalDocumentID | 10_1007_s11042_022_12684_8 |
GrantInformation_xml | – fundername: ministry of science and technology, taiwan grantid: MOST 110-2221-E-153 -002 -MY2; MOST 108-2221-E-153-004-MY2 funderid: http://dx.doi.org/10.13039/501100004663 |
GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29M 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3EH 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 8AO 8FE 8FG 8FL 8G5 8UJ 95- 95. 95~ 96X AAAVM AABHQ AABYN AAFGU AAHNG AAIAL AAJKR AANZL AAOBN AAPBV AARHV AARTL AATNV AATVU AAUYE AAWCG AAWWR AAYFA AAYIU AAYQN AAYTO ABBBX ABBXA ABDZT ABECU ABFGW ABFTV ABHLI ABHQN ABJNI ABJOX ABKAS ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACBMV ACBRV ACBXY ACBYP ACGFO ACGFS ACHSB ACHXU ACIGE ACIPQ ACKNC ACMDZ ACMLO ACOKC ACOMO ACREN ACSNA ACTTH ACVWB ACWMK ADGRI ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMDM ADOXG ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEEQQ AEFIE AEFTE AEGAL AEGNC AEJHL AEJRE AEKMD AENEX AEOHA AEPYU AESKC AESTI AETLH AEVLU AEVTX AEXYK AEYWE AFEXP AFGCZ AFKRA AFLOW AFNRJ AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGBP AGGDS AGJBK AGMZJ AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIIXL AILAN AIMYW AITGF AJBLW AJDOV AJRNO AJZVZ AKQUC ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GUQSH GXS HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW LAK LLZTM M0C M0N M2O M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQQKQ PROAC PT4 PT5 Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TH9 TSG TSK TSV TUC TUS U2A UG4 UNUBA UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z5O Z7R Z7S Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8P Z8Q Z8R Z8S Z8T Z8U Z8W Z92 ZMTXR ~EX AACDK AAEOY AAJBT AASML AAYXX ABAKF ACAOD ACDTI ACZOJ AEFQL AEMSY AFBBN AGQEE AGRTI AIGIU CITATION H13 PQBZA 7SC 7XB 8AL 8FD 8FK AAYZH JQ2 L.- L7M L~C L~D MBDVC PQEST PQUKI Q9U |
ID | FETCH-LOGICAL-c319t-1db31ba791c32516144706c3873ec8f19497615756d57e5266c6eef886c39ed73 |
IEDL.DBID | BENPR |
ISSN | 1380-7501 |
IngestDate | Mon Nov 04 11:09:39 EST 2024 Thu Sep 12 16:44:42 EDT 2024 Sat Dec 16 12:08:33 EST 2023 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 13 |
Keywords | Encrypted image Reversible data hiding Histogram shifting Paillier cryptosystem |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c319t-1db31ba791c32516144706c3873ec8f19497615756d57e5266c6eef886c39ed73 |
ORCID | 0000-0002-0619-1966 |
PQID | 2660203414 |
PQPubID | 54626 |
PageCount | 21 |
ParticipantIDs | proquest_journals_2660203414 crossref_primary_10_1007_s11042_022_12684_8 springer_journals_10_1007_s11042_022_12684_8 |
PublicationCentury | 2000 |
PublicationDate | 2022-05-01 |
PublicationDateYYYYMMDD | 2022-05-01 |
PublicationDate_xml | – month: 05 year: 2022 text: 2022-05-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York – name: Dordrecht |
PublicationSubtitle | An International Journal |
PublicationTitle | Multimedia tools and applications |
PublicationTitleAbbrev | Multimed Tools Appl |
PublicationYear | 2022 |
Publisher | Springer US Springer Nature B.V |
Publisher_xml | – name: Springer US – name: Springer Nature B.V |
References | Fridrich, Goljan, Lisonek, Soukal (CR7) 2005; 53 Zhang, Long, Wang, Cheng (CR35) 2016; 26 Liao, Shu (CR15) 2015; 28 Shiu, Chen, Hong (CR25) 2015; 39 Ni, Shi, Ansari, Su (CR19) 2006; 16 Qian, Zhang, Wang (CR23) 2014; 16 Lin, Lee, Chang (CR16) 2011; 7 Sharma (CR24) 2020; 79 Agrawal, Kumar (CR1) 2017; 130 Chen, Wu, Lu, Ren (CR5) 2019; 164 CR32 Peng, Li, Yang (CR20) 2013; 93 Tang, Xu, Yao, Qin, Zhang (CR27) 2019; 78 Chan, Cheng (CR3) 2004; 37 Ma, Zhang, Zhao, Yu, Li (CR17) 2013; 8 Hu, Lee, Li (CR9) 2009; 19 Li, Xiao, Zhang, Nan (CR13) 2015; 39 Zhang (CR34) 2011; 18 Li, Li (CR11) 2017; 130 Tian (CR28) 2013; 13 Jiang, Pang (CR10) 2020; 79 Malik, Wang, Chen, Yang, Khan, Wu, Chen, Hu (CR18) 2019; 48 Alattar (CR2) 2004; 13 Qian, Zhang (CR22) 2016; 26 Hong, Chen, Wu (CR8) 2012; 19 Tai, Yeh, Chang (CR26) 2009; 19 Wu, Cheung, Huang (CR29) 2016; 40 Xiao, Xiang, Zheng, Wang (CR33) 2017; 45 Wu, Chen, Weng (CR31) 2016; 41 Wu, Sun (CR30) 2014; 104 Li, Xiao, Peng, Nan (CR12) 2014; 36 Li, Zhang, Yang (CR14) 2013; 8 Peng, Li, Yang (CR21) 2014; 25 Chang, Tai, Lin (CR4) 2006; 16 Chen, Shiu, Horng (CR6) 2014; 25 12684_CR32 J Fridrich (12684_CR7) 2005; 53 X Wu (12684_CR31) 2016; 41 CW Shiu (12684_CR25) 2015; 39 B Chen (12684_CR5) 2019; 164 D Xiao (12684_CR33) 2017; 45 C Jiang (12684_CR10) 2020; 79 Z Qian (12684_CR22) 2016; 26 CC Chang (12684_CR4) 2006; 16 F Peng (12684_CR20) 2013; 93 AM Alattar (12684_CR2) 2004; 13 M Li (12684_CR11) 2017; 130 Z Ni (12684_CR19) 2006; 16 M Sharma (12684_CR24) 2020; 79 Z Qian (12684_CR23) 2014; 16 Z Tang (12684_CR27) 2019; 78 M Li (12684_CR12) 2014; 36 S Agrawal (12684_CR1) 2017; 130 Y Hu (12684_CR9) 2009; 19 M Li (12684_CR13) 2015; 39 HT Wu (12684_CR29) 2016; 40 X Li (12684_CR14) 2013; 8 F Peng (12684_CR21) 2014; 25 J Tian (12684_CR28) 2013; 13 X Zhang (12684_CR34) 2011; 18 W Hong (12684_CR8) 2012; 19 A Malik (12684_CR18) 2019; 48 X Wu (12684_CR30) 2014; 104 PY Lin (12684_CR16) 2011; 7 CK Chan (12684_CR3) 2004; 37 YC Chen (12684_CR6) 2014; 25 X Liao (12684_CR15) 2015; 28 K Ma (12684_CR17) 2013; 8 WL Tai (12684_CR26) 2009; 19 X Zhang (12684_CR35) 2016; 26 |
References_xml | – volume: 19 start-page: 906 year: 2009 end-page: 910 ident: CR26 article-title: Reversible data hiding based on histogram modification of pixel differences publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2009.2017409 contributor: fullname: Chang – volume: 79 start-page: 693 year: 2020 end-page: 711 ident: CR10 article-title: Encrypted images-based reversible data hiding in Paillier cryptosystem publication-title: Multimed Tools Appl doi: 10.1007/s11042-019-07874-w contributor: fullname: Pang – volume: 39 start-page: 226 year: 2015 end-page: 233 ident: CR25 article-title: Encrypted image-based reversible data hiding with public key cryptography from difference expansion publication-title: Signal Process Image Commun doi: 10.1016/j.image.2015.09.014 contributor: fullname: Hong – volume: 16 start-page: 354 year: 2006 end-page: 362 ident: CR19 article-title: Reversible data hiding publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2006.869964 contributor: fullname: Su – volume: 28 start-page: 21 year: 2015 end-page: 27 ident: CR15 article-title: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2014.12.007 contributor: fullname: Shu – volume: 48 start-page: 102374 year: 2019 ident: CR18 article-title: Reversible data hiding in homomorphically encrypted image using interpolation technique publication-title: J Inform Secur Appl contributor: fullname: Hu – volume: 25 start-page: 1164 year: 2014 end-page: 1170 ident: CR6 article-title: Encrypted signal-based reversible data hiding with public key cryptosystem publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2014.04.003 contributor: fullname: Horng – volume: 39 start-page: 234 year: 2015 end-page: 248 ident: CR13 article-title: Reversible data hiding in encrypted images using cross division and additive homomorphism publication-title: Signal Process Image Commun doi: 10.1016/j.image.2015.10.001 contributor: fullname: Nan – volume: 104 start-page: 387 year: 2014 end-page: 400 ident: CR30 article-title: High-capacity reversible data hiding in encrypted images by prediction error publication-title: Signal Process doi: 10.1016/j.sigpro.2014.04.032 contributor: fullname: Sun – volume: 130 start-page: 922 year: 2017 end-page: 934 ident: CR1 article-title: Mean value based reversible data hiding in encrypted images publication-title: Optik - Int J Light Electron Optics doi: 10.1016/j.ijleo.2016.11.059 contributor: fullname: Kumar – volume: 25 start-page: 255 year: 2014 end-page: 265 ident: CR21 article-title: Improved PVO-based reversible data hiding publication-title: Digital Signal Process doi: 10.1016/j.dsp.2013.11.002 contributor: fullname: Yang – volume: 13 start-page: 890 year: 2013 end-page: 896 ident: CR28 article-title: Reversible data embedding using a difference expansion publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2003.815962 contributor: fullname: Tian – volume: 37 start-page: 469 year: 2004 end-page: 474 ident: CR3 article-title: Hiding data in images by simple LSB substitution publication-title: Pattern Recogn doi: 10.1016/j.patcog.2003.08.007 contributor: fullname: Cheng – volume: 16 start-page: 1301 year: 2006 end-page: 1308 ident: CR4 article-title: A reversible data hiding scheme based on side match vector quantization publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2006.882380 contributor: fullname: Lin – volume: 53 start-page: 3923 year: 2005 end-page: 3935 ident: CR7 article-title: Writing on wet paper publication-title: IEEE Trans Signal Process doi: 10.1109/TSP.2005.855393 contributor: fullname: Soukal – volume: 130 start-page: 190 year: 2017 end-page: 196 ident: CR11 article-title: Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding publication-title: Signal Process doi: 10.1016/j.sigpro.2016.07.002 contributor: fullname: Li – volume: 16 start-page: 1486 year: 2014 end-page: 1491 ident: CR23 article-title: Reversible data hiding in encrypted JPEG bitstream publication-title: IEEE Transac Multimedia doi: 10.1109/TMM.2014.2316154 contributor: fullname: Wang – volume: 19 start-page: 250 year: 2009 end-page: 260 ident: CR9 article-title: DE-based reversible data hiding with improved overflow location map publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2008.2009252 contributor: fullname: Li – volume: 79 start-page: 355 year: 2020 end-page: 374 ident: CR24 article-title: Image encryption based on a new 2D logistic adjusted logistic map publication-title: Multimed Tools Appl doi: 10.1007/s11042-019-08079-x contributor: fullname: Sharma – volume: 8 start-page: 553 year: 2013 end-page: 562 ident: CR17 article-title: Reversible data hiding in encrypted images by reserving room before encryption publication-title: IEEE Trans Inform Forensics Secur doi: 10.1109/TIFS.2013.2248725 contributor: fullname: Li – volume: 78 start-page: 9691 year: 2019 end-page: 9715 ident: CR27 article-title: Reversible data hiding with differential compression in encrypted image publication-title: Multimedia Tools Appl doi: 10.1007/s11042-018-6567-3 contributor: fullname: Zhang – volume: 164 start-page: 48 year: 2019 end-page: 57 ident: CR5 article-title: Reversible data hiding in encrypted images with additive and multiplicative public-key homomorphism publication-title: Signal Process doi: 10.1016/j.sigpro.2019.05.036 contributor: fullname: Ren – volume: 19 start-page: 199 year: 2012 end-page: 202 ident: CR8 article-title: An improved reversible data hiding in encrypted images using side match publication-title: IEEE Signal Process Lett doi: 10.1109/LSP.2012.2187334 contributor: fullname: Wu – volume: 18 start-page: 255 year: 2011 end-page: 258 ident: CR34 article-title: Reversible data hiding in encrypted image publication-title: IEEE Signal Process Lett doi: 10.1109/LSP.2011.2114651 contributor: fullname: Zhang – volume: 93 start-page: 198 year: 2013 end-page: 205 ident: CR20 article-title: High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion publication-title: Signal Process doi: 10.1016/j.sigpro.2012.07.025 contributor: fullname: Yang – volume: 13 start-page: 1147 year: 2004 end-page: 1156 ident: CR2 article-title: Reversible watermark using the difference expansion of a generalized integer transform publication-title: IEEE Trans Image Process doi: 10.1109/TIP.2004.828418 contributor: fullname: Alattar – volume: 45 start-page: 1 year: 2017 end-page: 10 ident: CR33 article-title: Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2017.02.001 contributor: fullname: Wang – volume: 26 start-page: 1622 year: 2016 end-page: 1631 ident: CR35 article-title: Lossless and reversible data hiding in encrypted images with public-key cryptography publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2015.2433194 contributor: fullname: Cheng – volume: 7 start-page: 1 year: 2011 end-page: 20 ident: CR16 article-title: Protecting the content integrity of digital imagery with fidelity preservation publication-title: ACM Trans Multimed Comput Commun Appl doi: 10.1145/2000486.2000489 contributor: fullname: Chang – ident: CR32 – volume: 8 start-page: 1091 year: 2013 end-page: 1100 ident: CR14 article-title: A novel reversible data hiding scheme based on two-dimensional difference-histogram modification publication-title: IEEE Trans Inform Forensics Secur doi: 10.1109/TIFS.2013.2261062 contributor: fullname: Yang – volume: 40 start-page: 765 year: 2016 end-page: 771 ident: CR29 article-title: Reversible data hiding in Paillier cryptosystem publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2016.08.021 contributor: fullname: Huang – volume: 26 start-page: 636 year: 2016 end-page: 646 ident: CR22 article-title: Reversible data hiding in encrypted images with distributed source encoding publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2015.2418611 contributor: fullname: Zhang – volume: 36 start-page: 325 year: 2014 end-page: 328 ident: CR12 article-title: A modified reversible data hiding in encrypted images using random diffusion and accurate prediction publication-title: ETRI J doi: 10.4218/etrij.14.0213.0449 contributor: fullname: Nan – volume: 41 start-page: 58 year: 2016 end-page: 64 ident: CR31 article-title: Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2016.09.005 contributor: fullname: Weng – volume: 93 start-page: 198 year: 2013 ident: 12684_CR20 publication-title: Signal Process doi: 10.1016/j.sigpro.2012.07.025 contributor: fullname: F Peng – volume: 79 start-page: 355 year: 2020 ident: 12684_CR24 publication-title: Multimed Tools Appl doi: 10.1007/s11042-019-08079-x contributor: fullname: M Sharma – volume: 16 start-page: 1301 year: 2006 ident: 12684_CR4 publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2006.882380 contributor: fullname: CC Chang – volume: 19 start-page: 199 year: 2012 ident: 12684_CR8 publication-title: IEEE Signal Process Lett doi: 10.1109/LSP.2012.2187334 contributor: fullname: W Hong – volume: 18 start-page: 255 year: 2011 ident: 12684_CR34 publication-title: IEEE Signal Process Lett doi: 10.1109/LSP.2011.2114651 contributor: fullname: X Zhang – volume: 25 start-page: 1164 year: 2014 ident: 12684_CR6 publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2014.04.003 contributor: fullname: YC Chen – ident: 12684_CR32 doi: 10.1186/s13634-017-0496-6 – volume: 79 start-page: 693 year: 2020 ident: 12684_CR10 publication-title: Multimed Tools Appl doi: 10.1007/s11042-019-07874-w contributor: fullname: C Jiang – volume: 19 start-page: 906 year: 2009 ident: 12684_CR26 publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2009.2017409 contributor: fullname: WL Tai – volume: 8 start-page: 553 year: 2013 ident: 12684_CR17 publication-title: IEEE Trans Inform Forensics Secur doi: 10.1109/TIFS.2013.2248725 contributor: fullname: K Ma – volume: 7 start-page: 1 year: 2011 ident: 12684_CR16 publication-title: ACM Trans Multimed Comput Commun Appl doi: 10.1145/2000486.2000489 contributor: fullname: PY Lin – volume: 104 start-page: 387 year: 2014 ident: 12684_CR30 publication-title: Signal Process doi: 10.1016/j.sigpro.2014.04.032 contributor: fullname: X Wu – volume: 13 start-page: 890 year: 2013 ident: 12684_CR28 publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2003.815962 contributor: fullname: J Tian – volume: 164 start-page: 48 year: 2019 ident: 12684_CR5 publication-title: Signal Process doi: 10.1016/j.sigpro.2019.05.036 contributor: fullname: B Chen – volume: 78 start-page: 9691 year: 2019 ident: 12684_CR27 publication-title: Multimedia Tools Appl doi: 10.1007/s11042-018-6567-3 contributor: fullname: Z Tang – volume: 19 start-page: 250 year: 2009 ident: 12684_CR9 publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2008.2009252 contributor: fullname: Y Hu – volume: 39 start-page: 226 year: 2015 ident: 12684_CR25 publication-title: Signal Process Image Commun doi: 10.1016/j.image.2015.09.014 contributor: fullname: CW Shiu – volume: 41 start-page: 58 year: 2016 ident: 12684_CR31 publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2016.09.005 contributor: fullname: X Wu – volume: 37 start-page: 469 year: 2004 ident: 12684_CR3 publication-title: Pattern Recogn doi: 10.1016/j.patcog.2003.08.007 contributor: fullname: CK Chan – volume: 130 start-page: 190 year: 2017 ident: 12684_CR11 publication-title: Signal Process doi: 10.1016/j.sigpro.2016.07.002 contributor: fullname: M Li – volume: 48 start-page: 102374 year: 2019 ident: 12684_CR18 publication-title: J Inform Secur Appl contributor: fullname: A Malik – volume: 40 start-page: 765 year: 2016 ident: 12684_CR29 publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2016.08.021 contributor: fullname: HT Wu – volume: 53 start-page: 3923 year: 2005 ident: 12684_CR7 publication-title: IEEE Trans Signal Process doi: 10.1109/TSP.2005.855393 contributor: fullname: J Fridrich – volume: 130 start-page: 922 year: 2017 ident: 12684_CR1 publication-title: Optik - Int J Light Electron Optics doi: 10.1016/j.ijleo.2016.11.059 contributor: fullname: S Agrawal – volume: 16 start-page: 1486 year: 2014 ident: 12684_CR23 publication-title: IEEE Transac Multimedia doi: 10.1109/TMM.2014.2316154 contributor: fullname: Z Qian – volume: 16 start-page: 354 year: 2006 ident: 12684_CR19 publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2006.869964 contributor: fullname: Z Ni – volume: 13 start-page: 1147 year: 2004 ident: 12684_CR2 publication-title: IEEE Trans Image Process doi: 10.1109/TIP.2004.828418 contributor: fullname: AM Alattar – volume: 36 start-page: 325 year: 2014 ident: 12684_CR12 publication-title: ETRI J doi: 10.4218/etrij.14.0213.0449 contributor: fullname: M Li – volume: 39 start-page: 234 year: 2015 ident: 12684_CR13 publication-title: Signal Process Image Commun doi: 10.1016/j.image.2015.10.001 contributor: fullname: M Li – volume: 45 start-page: 1 year: 2017 ident: 12684_CR33 publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2017.02.001 contributor: fullname: D Xiao – volume: 26 start-page: 1622 year: 2016 ident: 12684_CR35 publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2015.2433194 contributor: fullname: X Zhang – volume: 25 start-page: 255 year: 2014 ident: 12684_CR21 publication-title: Digital Signal Process doi: 10.1016/j.dsp.2013.11.002 contributor: fullname: F Peng – volume: 8 start-page: 1091 year: 2013 ident: 12684_CR14 publication-title: IEEE Trans Inform Forensics Secur doi: 10.1109/TIFS.2013.2261062 contributor: fullname: X Li – volume: 26 start-page: 636 year: 2016 ident: 12684_CR22 publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2015.2418611 contributor: fullname: Z Qian – volume: 28 start-page: 21 year: 2015 ident: 12684_CR15 publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2014.12.007 contributor: fullname: X Liao |
SSID | ssj0016524 |
Score | 2.3873723 |
Snippet | Many researchers pay attention on performing reversible data hiding in encrypted images; after extracting the embedded secret information, the objective is not... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Publisher |
StartPage | 18807 |
SubjectTerms | Computer Communication Networks Computer Science Confidentiality Cryptography Data encryption Data Structures and Information Theory Histograms Image quality Multimedia Multimedia Information Systems Privacy Special Purpose and Application-Based Systems |
SummonAdditionalLinks | – databaseName: SpringerLINK - Czech Republic Consortium dbid: AGYKE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED5BWWDgUUCUlzywgVHd2IkzVqgFgUBIUAmmyE7OogJSVMoAv55zmhCeA1ukOI7i8_n74rv7DLDnVAetM4Zrhcilk5YTDBuOHaOdNChske1-fhGeDOTpjbqp67iLZPcqIlks1HWtm_CVJD75XHiFEq5nYa4sPJ3rHt-e9T6CB6Eqz7LVbU6AKMpamd97-YpHNcn8Fhct4Ka_BNdV0c40y-T-8GViD9O3nxqO__mSZVgs6SfrTufLCsxg3oSl6mgHVnp6ExY-6RSuwtUVeolw-4DMKz6NyY3o0ieXsruhBz82zBk9OH59IgLLho-0SD0zD5AZG-Xs0vhNHeq-aDCaikevwaDfuz464eVpDDwlN51wkdlAWBPFIg2IFPkfyagdpoGOAky1E7EkZiOI_YWZilAR8KchotOa2sSYRcE6NPJRjhvArMDUKKOci53E0Ng4iNtWtoNModQGW7Bf2SR5mopuJLW8sh-9hEYvKUYv0S3YrsyWlA74nNDrfYxVCtmCg8oM9e2_e9v8X_MtmO94SxYpkNvQmIxfcIdoysTultPyHYEy3WU priority: 102 providerName: Springer Nature |
Title | Separable reversible data hiding in encrypted images based on Paillier cryptosystem |
URI | https://link.springer.com/article/10.1007/s11042-022-12684-8 https://www.proquest.com/docview/2660203414 |
Volume | 81 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1BT9swFH4a7YUdxgZMK2OVD7sxizixE-c0FdRSDVEhWCU4RXbyrFXa0q4th_37PafOCkjsFiWOD9-z_T37PX8P4LNTMVpnDNcKkUsnLScaNhxjo500KGyT7X41ScdT-e1O3YUDt1VIq2zXxGahrualPyM_JSLxQTMp5NfFb-6rRvnoaiihsQPdmHYKUQe6Z8PJ9c2_OEKqQllbHXHiRhGuzWwuzwl_NcVnswsvecL1U2ra-pvPQqQN84zewpvgMrLBxsbv4BXW-7DXlmNgYXbuw-tH2oIHcHuLXtbb_kTmVZqWNPTp0SeEsh8zT1hsVjP6cflnQU4nm_2ihWXFPKlVbF6za-MPYqj7psF8I_h8CNPR8Pv5mIcKCrykqbXmorKJsCbLRZmQI-M3f1mUlonOEiy1E7kkb0SQx5ZWKkNFGJcpotOa2uRYZcl76NTzGj8AswJLo4xyLncSU2PzJI-sjJJKodQGe3DSglcsNkIZxVYS2UNdENRFA3Whe3Dc4luESbMqtibuwZcW8-3nl3s7-n9vH2E39mZu0hSPobNePuAnciXWtg87enTRh-7g4v5y2A-jh95O48FffCzJGw |
link.rule.ids | 315,783,787,12777,21400,27936,27937,33385,33756,41093,41535,42162,42604,43612,43817,52123,52246,74369,74636 |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1NT9wwEB1ROBQOfBXUBQo-9Fasrjd24pwQqliWT1UCJG6RnYzFSjS77G4P_ffMZJ0urdTeIsXxYezxe_HMvAH4HEwPfXBOWoModdBeEgw7iT1ng3aofJPtfnObDh705aN5jBdu05hW2Z6JzUFdjUq-I_9KQMJBM630yfhFctcojq7GFhrvYEUnhNVcKd4__x1FSE1samu7kpBRxaKZeemc4sIUzmVXLHgi7Z_AtGCbfwVIG9zpb8J6JIzidL7CW7CE9TZstM0YRPTNbVh7oyz4Ae7ukEW9_TMK1mia0ManR04HFU9DhisxrAV9OPk1Jsophj_oWJkKhrRKjGrx3fE1DE3fDBjN5Z534KF_dv9tIGP_BFmSY82kqnyivMtyVSZEY_jXL-umZWKzBEsbVK6Jiyjia2llMjRk4TJFDNbSmByrLNmF5XpU40cQXmHpjDMh5EFj6nye5F2vu0llUFuHHfjSGq8Yz2UyioUgMpu6IFMXjakL24GD1r5FdJlpsVjgDhy3Nl-8_vdse_-f7QjeD-5vrovri9urfVjt8ZI3CYsHsDyb_MRPRCpm_rDZOa_14sdD |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Nb9swDCW6Fhi2Q9tlG5p-6rDbJjSKJVs-FUXbrN1HUSALkJsh2RQaYHWyJDvs35d05GYbsN0MWNaBEvVo8fER4F0wffTBOWkNotRBe0kw7CT2nQ3aofIN2_3rbXo90p_GZhz5T4tIq2zPxOagrqYl35GfEpBw0kwrfRoiLeLucnA2-yG5gxRnWmM7jWewRaiY8g63g49PGYXUxAa3ticJJVUsoFmV0SkuUmFeu2LxE2n_BKl15PlXsrTBoMEubMfgUZyvVvsVbGDdgZ22MYOIftqBl7-pDL6G4RBZ4Nt_R8F6TXNyAnpkaqi4nzB0iUkt6MP5rxmFn2LyQEfMQjC8VWJaizvHVzI0fTNgupJ-fgOjwdW3i2sZeynIkpxsKVXlE-VdlqsyoZCGfwOzXlomNkuwtEHlmuISRbFbWpkMDVm7TBGDtTQmxypL3sJmPa1xD4RXWDrjTAh50Jg6nyd5z-teUhnU1mEX3rfGK2YryYxiLY7Mpi7I1EVj6sJ24bC1bxHdZ1GsF7sLH1qbr1__e7b9_892As9p0xRfbm4_H8CLPq94w108hM3l_CceUXyx9MfNxnkEbknLgQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Separable+reversible+data+hiding+in+encrypted+images+based+on+Paillier+cryptosystem&rft.jtitle=Multimedia+tools+and+applications&rft.au=Tsai+Chwei-Shyong&rft.au=Yung-Sung%2C+Zhang&rft.au=Chi-Yao%2C+Weng&rft.date=2022-05-01&rft.pub=Springer+Nature+B.V&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=81&rft.issue=13&rft.spage=18807&rft.epage=18827&rft_id=info:doi/10.1007%2Fs11042-022-12684-8&rft.externalDBID=HAS_PDF_LINK |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon |