Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation
For reversible data hiding in encrypted images (RDHEI), the private information in the original image content is protected and the embedded secret data can be used to manage the encrypted image. Up to now, many RDHEI algorithms have been reported, however, these reported RDHEI algorithms cannot achi...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on dependable and secure computing 2022-03, Vol.19 (2), p.1382-1394 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1394 |
---|---|
container_issue | 2 |
container_start_page | 1382 |
container_title | IEEE transactions on dependable and secure computing |
container_volume | 19 |
creator | Liu, Zi-Long Pun, Chi-Man |
description | For reversible data hiding in encrypted images (RDHEI), the private information in the original image content is protected and the embedded secret data can be used to manage the encrypted image. Up to now, many RDHEI algorithms have been reported, however, these reported RDHEI algorithms cannot achieve a high embedding capacity. Therefore, this article proposes a new RDHEI scheme, which will have improved performance. The main contributions of the proposed scheme include two points: chunk encryption (CE) and redundancy matrix representation (RMR). First, different from the encryption method of pixel-by-pixel encryption used in the previous RDHEI algorithms, CE is the method that uses the traditional exclusive-or (XOR) method to encrypt the original image in chunks. By using the CE method, redundancy will be retained in the encrypted chunks. Second, the RMR method is designed to generate available room for accommodating secret data in redundancy matrices, which are existed in some encrypted chunks. Experimental results show that the proposed scheme achieves a high embedding capacity and the directly decrypted images retain high quality. |
doi_str_mv | 10.1109/TDSC.2020.3011838 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2638124648</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9147013</ieee_id><sourcerecordid>2638124648</sourcerecordid><originalsourceid>FETCH-LOGICAL-c223t-4a6f81546888d169514d684b3f2a370b55d44324bc4d0fb56ddec1c4e58081d3</originalsourceid><addsrcrecordid>eNo9kM1OwzAQhC0EEqXwAIiLJc4pXv-kzhGlQCsVIZXeLSd2ikvrBDtB9O1J1MJpVzszu6sPoVsgEwCSPaxn7_mEEkomjABIJs_QCDIOCSEgz_tecJGIbAqX6CrGLSGUy4yPULWy3zZEV-wsnulW47kzzm-w8_jJl-HQtNbgxV5vbMRdHJT8o_Off6KrPdbe4JU1nTfalwf8qtvgfvpJE2y0vtWD6RpdVHoX7c2pjtH6-Wmdz5Pl28sif1wmJaWsTbhOK9m_mkopDaSZAG5SyQtWUc2mpBDCcM4oL0puSFWI1BhbQsmtkESCYWN0f1zbhPqrs7FV27oLvr-oaMokUJ5y2bvg6CpDHWOwlWqC2-twUEDUQFMNNNVAU51o9pm7Y8ZZa__9GfApAcZ-AWVXcNI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2638124648</pqid></control><display><type>article</type><title>Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation</title><source>IEEE Electronic Library (IEL)</source><creator>Liu, Zi-Long ; Pun, Chi-Man</creator><creatorcontrib>Liu, Zi-Long ; Pun, Chi-Man</creatorcontrib><description>For reversible data hiding in encrypted images (RDHEI), the private information in the original image content is protected and the embedded secret data can be used to manage the encrypted image. Up to now, many RDHEI algorithms have been reported, however, these reported RDHEI algorithms cannot achieve a high embedding capacity. Therefore, this article proposes a new RDHEI scheme, which will have improved performance. The main contributions of the proposed scheme include two points: chunk encryption (CE) and redundancy matrix representation (RMR). First, different from the encryption method of pixel-by-pixel encryption used in the previous RDHEI algorithms, CE is the method that uses the traditional exclusive-or (XOR) method to encrypt the original image in chunks. By using the CE method, redundancy will be retained in the encrypted chunks. Second, the RMR method is designed to generate available room for accommodating secret data in redundancy matrices, which are existed in some encrypted chunks. Experimental results show that the proposed scheme achieves a high embedding capacity and the directly decrypted images retain high quality.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2020.3011838</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Algorithms ; chunk encryption ; Classification algorithms ; Data mining ; Embedding ; encrypted image ; Encryption ; Histograms ; Image quality ; Matrix representation ; Pixels ; Prediction algorithms ; Redundancy ; redundancy matrix representation ; Reversible data hiding</subject><ispartof>IEEE transactions on dependable and secure computing, 2022-03, Vol.19 (2), p.1382-1394</ispartof><rights>Copyright IEEE Computer Society 2022</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c223t-4a6f81546888d169514d684b3f2a370b55d44324bc4d0fb56ddec1c4e58081d3</citedby><cites>FETCH-LOGICAL-c223t-4a6f81546888d169514d684b3f2a370b55d44324bc4d0fb56ddec1c4e58081d3</cites><orcidid>0000-0003-1788-3746 ; 0000-0003-0268-7400</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9147013$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9147013$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Liu, Zi-Long</creatorcontrib><creatorcontrib>Pun, Chi-Man</creatorcontrib><title>Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>For reversible data hiding in encrypted images (RDHEI), the private information in the original image content is protected and the embedded secret data can be used to manage the encrypted image. Up to now, many RDHEI algorithms have been reported, however, these reported RDHEI algorithms cannot achieve a high embedding capacity. Therefore, this article proposes a new RDHEI scheme, which will have improved performance. The main contributions of the proposed scheme include two points: chunk encryption (CE) and redundancy matrix representation (RMR). First, different from the encryption method of pixel-by-pixel encryption used in the previous RDHEI algorithms, CE is the method that uses the traditional exclusive-or (XOR) method to encrypt the original image in chunks. By using the CE method, redundancy will be retained in the encrypted chunks. Second, the RMR method is designed to generate available room for accommodating secret data in redundancy matrices, which are existed in some encrypted chunks. Experimental results show that the proposed scheme achieves a high embedding capacity and the directly decrypted images retain high quality.</description><subject>Algorithms</subject><subject>chunk encryption</subject><subject>Classification algorithms</subject><subject>Data mining</subject><subject>Embedding</subject><subject>encrypted image</subject><subject>Encryption</subject><subject>Histograms</subject><subject>Image quality</subject><subject>Matrix representation</subject><subject>Pixels</subject><subject>Prediction algorithms</subject><subject>Redundancy</subject><subject>redundancy matrix representation</subject><subject>Reversible data hiding</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kM1OwzAQhC0EEqXwAIiLJc4pXv-kzhGlQCsVIZXeLSd2ikvrBDtB9O1J1MJpVzszu6sPoVsgEwCSPaxn7_mEEkomjABIJs_QCDIOCSEgz_tecJGIbAqX6CrGLSGUy4yPULWy3zZEV-wsnulW47kzzm-w8_jJl-HQtNbgxV5vbMRdHJT8o_Off6KrPdbe4JU1nTfalwf8qtvgfvpJE2y0vtWD6RpdVHoX7c2pjtH6-Wmdz5Pl28sif1wmJaWsTbhOK9m_mkopDaSZAG5SyQtWUc2mpBDCcM4oL0puSFWI1BhbQsmtkESCYWN0f1zbhPqrs7FV27oLvr-oaMokUJ5y2bvg6CpDHWOwlWqC2-twUEDUQFMNNNVAU51o9pm7Y8ZZa__9GfApAcZ-AWVXcNI</recordid><startdate>20220301</startdate><enddate>20220301</enddate><creator>Liu, Zi-Long</creator><creator>Pun, Chi-Man</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope><orcidid>https://orcid.org/0000-0003-1788-3746</orcidid><orcidid>https://orcid.org/0000-0003-0268-7400</orcidid></search><sort><creationdate>20220301</creationdate><title>Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation</title><author>Liu, Zi-Long ; Pun, Chi-Man</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c223t-4a6f81546888d169514d684b3f2a370b55d44324bc4d0fb56ddec1c4e58081d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>chunk encryption</topic><topic>Classification algorithms</topic><topic>Data mining</topic><topic>Embedding</topic><topic>encrypted image</topic><topic>Encryption</topic><topic>Histograms</topic><topic>Image quality</topic><topic>Matrix representation</topic><topic>Pixels</topic><topic>Prediction algorithms</topic><topic>Redundancy</topic><topic>redundancy matrix representation</topic><topic>Reversible data hiding</topic><toplevel>online_resources</toplevel><creatorcontrib>Liu, Zi-Long</creatorcontrib><creatorcontrib>Pun, Chi-Man</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Liu, Zi-Long</au><au>Pun, Chi-Man</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2022-03-01</date><risdate>2022</risdate><volume>19</volume><issue>2</issue><spage>1382</spage><epage>1394</epage><pages>1382-1394</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>For reversible data hiding in encrypted images (RDHEI), the private information in the original image content is protected and the embedded secret data can be used to manage the encrypted image. Up to now, many RDHEI algorithms have been reported, however, these reported RDHEI algorithms cannot achieve a high embedding capacity. Therefore, this article proposes a new RDHEI scheme, which will have improved performance. The main contributions of the proposed scheme include two points: chunk encryption (CE) and redundancy matrix representation (RMR). First, different from the encryption method of pixel-by-pixel encryption used in the previous RDHEI algorithms, CE is the method that uses the traditional exclusive-or (XOR) method to encrypt the original image in chunks. By using the CE method, redundancy will be retained in the encrypted chunks. Second, the RMR method is designed to generate available room for accommodating secret data in redundancy matrices, which are existed in some encrypted chunks. Experimental results show that the proposed scheme achieves a high embedding capacity and the directly decrypted images retain high quality.</abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2020.3011838</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0003-1788-3746</orcidid><orcidid>https://orcid.org/0000-0003-0268-7400</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1545-5971 |
ispartof | IEEE transactions on dependable and secure computing, 2022-03, Vol.19 (2), p.1382-1394 |
issn | 1545-5971 1941-0018 |
language | eng |
recordid | cdi_proquest_journals_2638124648 |
source | IEEE Electronic Library (IEL) |
subjects | Algorithms chunk encryption Classification algorithms Data mining Embedding encrypted image Encryption Histograms Image quality Matrix representation Pixels Prediction algorithms Redundancy redundancy matrix representation Reversible data hiding |
title | Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T08%3A46%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Reversible%20Data%20Hiding%20in%20Encrypted%20Images%20using%20Chunk%20Encryption%20and%20Redundancy%20Matrix%20Representation&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Liu,%20Zi-Long&rft.date=2022-03-01&rft.volume=19&rft.issue=2&rft.spage=1382&rft.epage=1394&rft.pages=1382-1394&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2020.3011838&rft_dat=%3Cproquest_RIE%3E2638124648%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2638124648&rft_id=info:pmid/&rft_ieee_id=9147013&rfr_iscdi=true |