{"title":"Reversible data hiding in encrypted images using reformed JPEG compression","authors":"Xiao-zhu Xie, Chinchen Chang","doi":"10.1109/IWBF.2017.7935100","DOIUrl":null,"url":null,"abstract":"A scheme of reversible data hiding in encrypted image (RDH-EI) with high embedding capacity is proposed in this paper. First, cover image is transformed to the quantized discrete cosine transform (DCT) coefficients, which are reformed and encrypted to generate the encrypted image. Then the secret message is embedded into the encrypted image in the location of zero alternating current (ac) coefficients to generate the marked encrypted image. The JPEG image can be recovered by using the encryption key. The secret message can be extracted using the embedding key. The experimental results showed that the proposed scheme can obtain a high embedding ratio while ensuring that the recovered image will have good quality.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWBF.2017.7935100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
A scheme of reversible data hiding in encrypted image (RDH-EI) with high embedding capacity is proposed in this paper. First, cover image is transformed to the quantized discrete cosine transform (DCT) coefficients, which are reformed and encrypted to generate the encrypted image. Then the secret message is embedded into the encrypted image in the location of zero alternating current (ac) coefficients to generate the marked encrypted image. The JPEG image can be recovered by using the encryption key. The secret message can be extracted using the embedding key. The experimental results showed that the proposed scheme can obtain a high embedding ratio while ensuring that the recovered image will have good quality.