A Contemplator on Reversible Data Hiding in Encrypted Domain

Subarna Sen, A. Mukherjee, J. Mondal, Anil Saroliya
{"title":"A Contemplator on Reversible Data Hiding in Encrypted Domain","authors":"Subarna Sen, A. Mukherjee, J. Mondal, Anil Saroliya","doi":"10.1109/ICONC345789.2020.9117341","DOIUrl":null,"url":null,"abstract":"Reversible Data Hiding (RDH) has proved itself to be the best technique for providing security to sensitive datasets. RDH provides confidentiality, preserves privacy of secret and personal data and ensures reversibility. Several working principles are adhered for different RDH techniques for encryption and data embedding, in the past two decades. RDH covers all the basics of a proper cryptographic algorithm, i.e. confidentiality, integrity and availability. Furthermore, it works better for sensitive images. Based on the working methodologies and implementation area RDH schemes can be categorically divided into 4 types: (i) RDH in compressed domain, (ii) RDH in spatial domain, (iii) RDH for contrast enhancement and (iv) RDH in encrypted domain. This work presents a survey on the some recent RDH mechanisms working on encrypted domain. RDH schemes achieve different outcomes based on the intension and implementation. This review, shows the different services that RDH provides and the best base-methodologies to achieve high security along with maximum reversibility.","PeriodicalId":155813,"journal":{"name":"2020 International Conference on Emerging Trends in Communication, Control and Computing (ICONC3)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Emerging Trends in Communication, Control and Computing (ICONC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICONC345789.2020.9117341","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Reversible Data Hiding (RDH) has proved itself to be the best technique for providing security to sensitive datasets. RDH provides confidentiality, preserves privacy of secret and personal data and ensures reversibility. Several working principles are adhered for different RDH techniques for encryption and data embedding, in the past two decades. RDH covers all the basics of a proper cryptographic algorithm, i.e. confidentiality, integrity and availability. Furthermore, it works better for sensitive images. Based on the working methodologies and implementation area RDH schemes can be categorically divided into 4 types: (i) RDH in compressed domain, (ii) RDH in spatial domain, (iii) RDH for contrast enhancement and (iv) RDH in encrypted domain. This work presents a survey on the some recent RDH mechanisms working on encrypted domain. RDH schemes achieve different outcomes based on the intension and implementation. This review, shows the different services that RDH provides and the best base-methodologies to achieve high security along with maximum reversibility.
加密域可逆数据隐藏的研究
可逆数据隐藏(RDH)已被证明是为敏感数据集提供安全性的最佳技术。RDH负责保密,保护机密及个人资料的私隐,并确保可撤销性。在过去二十年中,用于加密和数据嵌入的不同RDH技术遵循了几个工作原则。RDH涵盖了正确加密算法的所有基础,即机密性、完整性和可用性。此外,它对敏感图像效果更好。根据工作方法和实现区域,RDH方案可分为4种类型:(i)压缩域RDH, (ii)空间域RDH, (iii)对比度增强RDH和(iv)加密域RDH。本文介绍了最近在加密域上工作的一些RDH机制。RDH方案的内涵和实施方式不同,效果也不同。本文介绍了RDH提供的不同服务,以及实现高安全性和最大可逆性的最佳基本方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信