Jen-Chun Chang, Yun-Hong Chou, Cheng-Huai Ni, H. Wu
{"title":"Reversible Data Hiding in Pairwisely Encrypted Images","authors":"Jen-Chun Chang, Yun-Hong Chou, Cheng-Huai Ni, H. Wu","doi":"10.1109/CMCSN.2016.22","DOIUrl":null,"url":null,"abstract":"This work proposes a novel separable method for encrypted images. The input image is encrypted first via a pairwise encryption scheme. Then the data bits can be embedded into the pairwisely encrypted image by the well-known difference-expansion technique. When the receiver gets the marked encrypted, he can extract the secret data bits by the data-hiding key and obtain an image which is similar to the original input image by the encryption key. Furthermore, he can recover the original image and extract the secret data bits once he owns both encryption and data-hiding keys. To compare the existing separable methods which do not pre-reserve space for embedding secret data, experimental result shows that the proposed scheme obtains much better embedding capacity.","PeriodicalId":153377,"journal":{"name":"2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMCSN.2016.22","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This work proposes a novel separable method for encrypted images. The input image is encrypted first via a pairwise encryption scheme. Then the data bits can be embedded into the pairwisely encrypted image by the well-known difference-expansion technique. When the receiver gets the marked encrypted, he can extract the secret data bits by the data-hiding key and obtain an image which is similar to the original input image by the encryption key. Furthermore, he can recover the original image and extract the secret data bits once he owns both encryption and data-hiding keys. To compare the existing separable methods which do not pre-reserve space for embedding secret data, experimental result shows that the proposed scheme obtains much better embedding capacity.