Reversible Information Hiding Algorithm Based on Multikey Encryption

This paper proposes a scheme of reversible data hiding in encrypted images based on multikey encryption. There are only two parties that are involved in this framework, including the content owner and the recipient. The content owner encrypts the original image with a key set which is composed by a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless communications and mobile computing 2020, Vol.2020 (2020), p.1-10
Hauptverfasser: Zhang, Jian, Liu, Zheli, Wang, Zhi, Wang, Yiqing, Li, Zhaohui, Li, Min
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 10
container_issue 2020
container_start_page 1
container_title Wireless communications and mobile computing
container_volume 2020
creator Zhang, Jian
Liu, Zheli
Wang, Zhi
Wang, Yiqing
Li, Zhaohui
Li, Min
description This paper proposes a scheme of reversible data hiding in encrypted images based on multikey encryption. There are only two parties that are involved in this framework, including the content owner and the recipient. The content owner encrypts the original image with a key set which is composed by a selection method according to the additional message. Thus, the image can be encrypted and embedded at the same time. Additional message can be extracted given that the recipient side could perform decryption strategy by exploiting spatial correlation; then, original image can be recovered without any loss. Compare with other current information hiding mechanism, the proposed approach provides higher embedding capacity and is also able to perfectly reconstruct the original image as well as the embedded message. Rate distortion of the proposed method outperforms the previously published ones.
doi_str_mv 10.1155/2020/8847559
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2465234171</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2465234171</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-5e08f9a8bdd54df0b6df409b3271d4b47afefa5b898456f07c6ffd4a962a39be3</originalsourceid><addsrcrecordid>eNqF0E1Lw0AQBuBFFKzVm2cJeNTY2e_kWGu1hYogeg6b7G67NU3qbqL035uSokdPMzAPM8OL0CWGO4w5HxEgMEoSJjlPj9AAcwpxIqQ8_u1FeorOQlgDAAWCB-jh1XwZH1xemmhe2dpvVOPqKpo57aplNC6XtXfNahPdq2B01E2e27JxH2YXTavC77Z7fY5OrCqDuTjUIXp_nL5NZvHi5Wk-GS_iggpoYm4gsalKcq050xZyoS2DNKdEYs1yJpU1VvE8SRPGhQVZCGs1U6kgiqa5oUN03e_d-vqzNaHJ1nXrq-5kRpjghDIscadue1X4OgRvbLb1bqP8LsOQ7XPK9jllh5w6ftPzlau0-nb_6atem8503_5pgpkEQX8AxcVxsQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2465234171</pqid></control><display><type>article</type><title>Reversible Information Hiding Algorithm Based on Multikey Encryption</title><source>Wiley Online Library Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Zhang, Jian ; Liu, Zheli ; Wang, Zhi ; Wang, Yiqing ; Li, Zhaohui ; Li, Min</creator><contributor>Das, Ashok Kumar ; Ashok Kumar Das</contributor><creatorcontrib>Zhang, Jian ; Liu, Zheli ; Wang, Zhi ; Wang, Yiqing ; Li, Zhaohui ; Li, Min ; Das, Ashok Kumar ; Ashok Kumar Das</creatorcontrib><description>This paper proposes a scheme of reversible data hiding in encrypted images based on multikey encryption. There are only two parties that are involved in this framework, including the content owner and the recipient. The content owner encrypts the original image with a key set which is composed by a selection method according to the additional message. Thus, the image can be encrypted and embedded at the same time. Additional message can be extracted given that the recipient side could perform decryption strategy by exploiting spatial correlation; then, original image can be recovered without any loss. Compare with other current information hiding mechanism, the proposed approach provides higher embedding capacity and is also able to perfectly reconstruct the original image as well as the embedded message. Rate distortion of the proposed method outperforms the previously published ones.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2020/8847559</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Algorithms ; Cloud computing ; Data encryption ; Embedding ; Encryption ; Image reconstruction ; Methods ; Privacy ; Wavelet transforms</subject><ispartof>Wireless communications and mobile computing, 2020, Vol.2020 (2020), p.1-10</ispartof><rights>Copyright © 2020 Zhaohui Li et al.</rights><rights>Copyright © 2020 Zhaohui Li et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-5e08f9a8bdd54df0b6df409b3271d4b47afefa5b898456f07c6ffd4a962a39be3</citedby><cites>FETCH-LOGICAL-c360t-5e08f9a8bdd54df0b6df409b3271d4b47afefa5b898456f07c6ffd4a962a39be3</cites><orcidid>0000-0002-1291-3603 ; 0000-0002-3252-9254 ; 0000-0002-6076-8367</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,4024,27923,27924,27925</link.rule.ids></links><search><contributor>Das, Ashok Kumar</contributor><contributor>Ashok Kumar Das</contributor><creatorcontrib>Zhang, Jian</creatorcontrib><creatorcontrib>Liu, Zheli</creatorcontrib><creatorcontrib>Wang, Zhi</creatorcontrib><creatorcontrib>Wang, Yiqing</creatorcontrib><creatorcontrib>Li, Zhaohui</creatorcontrib><creatorcontrib>Li, Min</creatorcontrib><title>Reversible Information Hiding Algorithm Based on Multikey Encryption</title><title>Wireless communications and mobile computing</title><description>This paper proposes a scheme of reversible data hiding in encrypted images based on multikey encryption. There are only two parties that are involved in this framework, including the content owner and the recipient. The content owner encrypts the original image with a key set which is composed by a selection method according to the additional message. Thus, the image can be encrypted and embedded at the same time. Additional message can be extracted given that the recipient side could perform decryption strategy by exploiting spatial correlation; then, original image can be recovered without any loss. Compare with other current information hiding mechanism, the proposed approach provides higher embedding capacity and is also able to perfectly reconstruct the original image as well as the embedded message. Rate distortion of the proposed method outperforms the previously published ones.</description><subject>Algorithms</subject><subject>Cloud computing</subject><subject>Data encryption</subject><subject>Embedding</subject><subject>Encryption</subject><subject>Image reconstruction</subject><subject>Methods</subject><subject>Privacy</subject><subject>Wavelet transforms</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqF0E1Lw0AQBuBFFKzVm2cJeNTY2e_kWGu1hYogeg6b7G67NU3qbqL035uSokdPMzAPM8OL0CWGO4w5HxEgMEoSJjlPj9AAcwpxIqQ8_u1FeorOQlgDAAWCB-jh1XwZH1xemmhe2dpvVOPqKpo57aplNC6XtXfNahPdq2B01E2e27JxH2YXTavC77Z7fY5OrCqDuTjUIXp_nL5NZvHi5Wk-GS_iggpoYm4gsalKcq050xZyoS2DNKdEYs1yJpU1VvE8SRPGhQVZCGs1U6kgiqa5oUN03e_d-vqzNaHJ1nXrq-5kRpjghDIscadue1X4OgRvbLb1bqP8LsOQ7XPK9jllh5w6ftPzlau0-nb_6atem8503_5pgpkEQX8AxcVxsQ</recordid><startdate>2020</startdate><enddate>2020</enddate><creator>Zhang, Jian</creator><creator>Liu, Zheli</creator><creator>Wang, Zhi</creator><creator>Wang, Yiqing</creator><creator>Li, Zhaohui</creator><creator>Li, Min</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-1291-3603</orcidid><orcidid>https://orcid.org/0000-0002-3252-9254</orcidid><orcidid>https://orcid.org/0000-0002-6076-8367</orcidid></search><sort><creationdate>2020</creationdate><title>Reversible Information Hiding Algorithm Based on Multikey Encryption</title><author>Zhang, Jian ; Liu, Zheli ; Wang, Zhi ; Wang, Yiqing ; Li, Zhaohui ; Li, Min</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-5e08f9a8bdd54df0b6df409b3271d4b47afefa5b898456f07c6ffd4a962a39be3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Cloud computing</topic><topic>Data encryption</topic><topic>Embedding</topic><topic>Encryption</topic><topic>Image reconstruction</topic><topic>Methods</topic><topic>Privacy</topic><topic>Wavelet transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Jian</creatorcontrib><creatorcontrib>Liu, Zheli</creatorcontrib><creatorcontrib>Wang, Zhi</creatorcontrib><creatorcontrib>Wang, Yiqing</creatorcontrib><creatorcontrib>Li, Zhaohui</creatorcontrib><creatorcontrib>Li, Min</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, Jian</au><au>Liu, Zheli</au><au>Wang, Zhi</au><au>Wang, Yiqing</au><au>Li, Zhaohui</au><au>Li, Min</au><au>Das, Ashok Kumar</au><au>Ashok Kumar Das</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Reversible Information Hiding Algorithm Based on Multikey Encryption</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2020</date><risdate>2020</risdate><volume>2020</volume><issue>2020</issue><spage>1</spage><epage>10</epage><pages>1-10</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>This paper proposes a scheme of reversible data hiding in encrypted images based on multikey encryption. There are only two parties that are involved in this framework, including the content owner and the recipient. The content owner encrypts the original image with a key set which is composed by a selection method according to the additional message. Thus, the image can be encrypted and embedded at the same time. Additional message can be extracted given that the recipient side could perform decryption strategy by exploiting spatial correlation; then, original image can be recovered without any loss. Compare with other current information hiding mechanism, the proposed approach provides higher embedding capacity and is also able to perfectly reconstruct the original image as well as the embedded message. Rate distortion of the proposed method outperforms the previously published ones.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2020/8847559</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-1291-3603</orcidid><orcidid>https://orcid.org/0000-0002-3252-9254</orcidid><orcidid>https://orcid.org/0000-0002-6076-8367</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1530-8669
ispartof Wireless communications and mobile computing, 2020, Vol.2020 (2020), p.1-10
issn 1530-8669
1530-8677
language eng
recordid cdi_proquest_journals_2465234171
source Wiley Online Library Open Access; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection
subjects Algorithms
Cloud computing
Data encryption
Embedding
Encryption
Image reconstruction
Methods
Privacy
Wavelet transforms
title Reversible Information Hiding Algorithm Based on Multikey Encryption
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T07%3A11%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Reversible%20Information%20Hiding%20Algorithm%20Based%20on%20Multikey%20Encryption&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Zhang,%20Jian&rft.date=2020&rft.volume=2020&rft.issue=2020&rft.spage=1&rft.epage=10&rft.pages=1-10&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2020/8847559&rft_dat=%3Cproquest_cross%3E2465234171%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2465234171&rft_id=info:pmid/&rfr_iscdi=true