Reversible Information Hiding Algorithm Based on Multikey Encryption
This paper proposes a scheme of reversible data hiding in encrypted images based on multikey encryption. There are only two parties that are involved in this framework, including the content owner and the recipient. The content owner encrypts the original image with a key set which is composed by a...
Gespeichert in:
Veröffentlicht in: | Wireless communications and mobile computing 2020, Vol.2020 (2020), p.1-10 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 10 |
---|---|
container_issue | 2020 |
container_start_page | 1 |
container_title | Wireless communications and mobile computing |
container_volume | 2020 |
creator | Zhang, Jian Liu, Zheli Wang, Zhi Wang, Yiqing Li, Zhaohui Li, Min |
description | This paper proposes a scheme of reversible data hiding in encrypted images based on multikey encryption. There are only two parties that are involved in this framework, including the content owner and the recipient. The content owner encrypts the original image with a key set which is composed by a selection method according to the additional message. Thus, the image can be encrypted and embedded at the same time. Additional message can be extracted given that the recipient side could perform decryption strategy by exploiting spatial correlation; then, original image can be recovered without any loss. Compare with other current information hiding mechanism, the proposed approach provides higher embedding capacity and is also able to perfectly reconstruct the original image as well as the embedded message. Rate distortion of the proposed method outperforms the previously published ones. |
doi_str_mv | 10.1155/2020/8847559 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2465234171</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2465234171</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-5e08f9a8bdd54df0b6df409b3271d4b47afefa5b898456f07c6ffd4a962a39be3</originalsourceid><addsrcrecordid>eNqF0E1Lw0AQBuBFFKzVm2cJeNTY2e_kWGu1hYogeg6b7G67NU3qbqL035uSokdPMzAPM8OL0CWGO4w5HxEgMEoSJjlPj9AAcwpxIqQ8_u1FeorOQlgDAAWCB-jh1XwZH1xemmhe2dpvVOPqKpo57aplNC6XtXfNahPdq2B01E2e27JxH2YXTavC77Z7fY5OrCqDuTjUIXp_nL5NZvHi5Wk-GS_iggpoYm4gsalKcq050xZyoS2DNKdEYs1yJpU1VvE8SRPGhQVZCGs1U6kgiqa5oUN03e_d-vqzNaHJ1nXrq-5kRpjghDIscadue1X4OgRvbLb1bqP8LsOQ7XPK9jllh5w6ftPzlau0-nb_6atem8503_5pgpkEQX8AxcVxsQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2465234171</pqid></control><display><type>article</type><title>Reversible Information Hiding Algorithm Based on Multikey Encryption</title><source>Wiley Online Library Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Zhang, Jian ; Liu, Zheli ; Wang, Zhi ; Wang, Yiqing ; Li, Zhaohui ; Li, Min</creator><contributor>Das, Ashok Kumar ; Ashok Kumar Das</contributor><creatorcontrib>Zhang, Jian ; Liu, Zheli ; Wang, Zhi ; Wang, Yiqing ; Li, Zhaohui ; Li, Min ; Das, Ashok Kumar ; Ashok Kumar Das</creatorcontrib><description>This paper proposes a scheme of reversible data hiding in encrypted images based on multikey encryption. There are only two parties that are involved in this framework, including the content owner and the recipient. The content owner encrypts the original image with a key set which is composed by a selection method according to the additional message. Thus, the image can be encrypted and embedded at the same time. Additional message can be extracted given that the recipient side could perform decryption strategy by exploiting spatial correlation; then, original image can be recovered without any loss. Compare with other current information hiding mechanism, the proposed approach provides higher embedding capacity and is also able to perfectly reconstruct the original image as well as the embedded message. Rate distortion of the proposed method outperforms the previously published ones.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2020/8847559</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Algorithms ; Cloud computing ; Data encryption ; Embedding ; Encryption ; Image reconstruction ; Methods ; Privacy ; Wavelet transforms</subject><ispartof>Wireless communications and mobile computing, 2020, Vol.2020 (2020), p.1-10</ispartof><rights>Copyright © 2020 Zhaohui Li et al.</rights><rights>Copyright © 2020 Zhaohui Li et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-5e08f9a8bdd54df0b6df409b3271d4b47afefa5b898456f07c6ffd4a962a39be3</citedby><cites>FETCH-LOGICAL-c360t-5e08f9a8bdd54df0b6df409b3271d4b47afefa5b898456f07c6ffd4a962a39be3</cites><orcidid>0000-0002-1291-3603 ; 0000-0002-3252-9254 ; 0000-0002-6076-8367</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,4024,27923,27924,27925</link.rule.ids></links><search><contributor>Das, Ashok Kumar</contributor><contributor>Ashok Kumar Das</contributor><creatorcontrib>Zhang, Jian</creatorcontrib><creatorcontrib>Liu, Zheli</creatorcontrib><creatorcontrib>Wang, Zhi</creatorcontrib><creatorcontrib>Wang, Yiqing</creatorcontrib><creatorcontrib>Li, Zhaohui</creatorcontrib><creatorcontrib>Li, Min</creatorcontrib><title>Reversible Information Hiding Algorithm Based on Multikey Encryption</title><title>Wireless communications and mobile computing</title><description>This paper proposes a scheme of reversible data hiding in encrypted images based on multikey encryption. There are only two parties that are involved in this framework, including the content owner and the recipient. The content owner encrypts the original image with a key set which is composed by a selection method according to the additional message. Thus, the image can be encrypted and embedded at the same time. Additional message can be extracted given that the recipient side could perform decryption strategy by exploiting spatial correlation; then, original image can be recovered without any loss. Compare with other current information hiding mechanism, the proposed approach provides higher embedding capacity and is also able to perfectly reconstruct the original image as well as the embedded message. Rate distortion of the proposed method outperforms the previously published ones.</description><subject>Algorithms</subject><subject>Cloud computing</subject><subject>Data encryption</subject><subject>Embedding</subject><subject>Encryption</subject><subject>Image reconstruction</subject><subject>Methods</subject><subject>Privacy</subject><subject>Wavelet transforms</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqF0E1Lw0AQBuBFFKzVm2cJeNTY2e_kWGu1hYogeg6b7G67NU3qbqL035uSokdPMzAPM8OL0CWGO4w5HxEgMEoSJjlPj9AAcwpxIqQ8_u1FeorOQlgDAAWCB-jh1XwZH1xemmhe2dpvVOPqKpo57aplNC6XtXfNahPdq2B01E2e27JxH2YXTavC77Z7fY5OrCqDuTjUIXp_nL5NZvHi5Wk-GS_iggpoYm4gsalKcq050xZyoS2DNKdEYs1yJpU1VvE8SRPGhQVZCGs1U6kgiqa5oUN03e_d-vqzNaHJ1nXrq-5kRpjghDIscadue1X4OgRvbLb1bqP8LsOQ7XPK9jllh5w6ftPzlau0-nb_6atem8503_5pgpkEQX8AxcVxsQ</recordid><startdate>2020</startdate><enddate>2020</enddate><creator>Zhang, Jian</creator><creator>Liu, Zheli</creator><creator>Wang, Zhi</creator><creator>Wang, Yiqing</creator><creator>Li, Zhaohui</creator><creator>Li, Min</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-1291-3603</orcidid><orcidid>https://orcid.org/0000-0002-3252-9254</orcidid><orcidid>https://orcid.org/0000-0002-6076-8367</orcidid></search><sort><creationdate>2020</creationdate><title>Reversible Information Hiding Algorithm Based on Multikey Encryption</title><author>Zhang, Jian ; Liu, Zheli ; Wang, Zhi ; Wang, Yiqing ; Li, Zhaohui ; Li, Min</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-5e08f9a8bdd54df0b6df409b3271d4b47afefa5b898456f07c6ffd4a962a39be3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Cloud computing</topic><topic>Data encryption</topic><topic>Embedding</topic><topic>Encryption</topic><topic>Image reconstruction</topic><topic>Methods</topic><topic>Privacy</topic><topic>Wavelet transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Jian</creatorcontrib><creatorcontrib>Liu, Zheli</creatorcontrib><creatorcontrib>Wang, Zhi</creatorcontrib><creatorcontrib>Wang, Yiqing</creatorcontrib><creatorcontrib>Li, Zhaohui</creatorcontrib><creatorcontrib>Li, Min</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, Jian</au><au>Liu, Zheli</au><au>Wang, Zhi</au><au>Wang, Yiqing</au><au>Li, Zhaohui</au><au>Li, Min</au><au>Das, Ashok Kumar</au><au>Ashok Kumar Das</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Reversible Information Hiding Algorithm Based on Multikey Encryption</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2020</date><risdate>2020</risdate><volume>2020</volume><issue>2020</issue><spage>1</spage><epage>10</epage><pages>1-10</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>This paper proposes a scheme of reversible data hiding in encrypted images based on multikey encryption. There are only two parties that are involved in this framework, including the content owner and the recipient. The content owner encrypts the original image with a key set which is composed by a selection method according to the additional message. Thus, the image can be encrypted and embedded at the same time. Additional message can be extracted given that the recipient side could perform decryption strategy by exploiting spatial correlation; then, original image can be recovered without any loss. Compare with other current information hiding mechanism, the proposed approach provides higher embedding capacity and is also able to perfectly reconstruct the original image as well as the embedded message. Rate distortion of the proposed method outperforms the previously published ones.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2020/8847559</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-1291-3603</orcidid><orcidid>https://orcid.org/0000-0002-3252-9254</orcidid><orcidid>https://orcid.org/0000-0002-6076-8367</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1530-8669 |
ispartof | Wireless communications and mobile computing, 2020, Vol.2020 (2020), p.1-10 |
issn | 1530-8669 1530-8677 |
language | eng |
recordid | cdi_proquest_journals_2465234171 |
source | Wiley Online Library Open Access; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection |
subjects | Algorithms Cloud computing Data encryption Embedding Encryption Image reconstruction Methods Privacy Wavelet transforms |
title | Reversible Information Hiding Algorithm Based on Multikey Encryption |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T07%3A11%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Reversible%20Information%20Hiding%20Algorithm%20Based%20on%20Multikey%20Encryption&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Zhang,%20Jian&rft.date=2020&rft.volume=2020&rft.issue=2020&rft.spage=1&rft.epage=10&rft.pages=1-10&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2020/8847559&rft_dat=%3Cproquest_cross%3E2465234171%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2465234171&rft_id=info:pmid/&rfr_iscdi=true |