{"title":"安全可逆图像数据隐藏在一个加密的环境回顾","authors":"J. Lakshmi, J. Rajeshwari","doi":"10.1109/ICCMC.2017.8282687","DOIUrl":null,"url":null,"abstract":"Reversible image data hiding is (RIDH) is a special category of data hiding technique. This technique will ensure perfect reconstruction of the cover image upon the extraction of the embedded message. Data extraction is achieved through a mechanism, in which access to the secret encryption key is not required. The reversibility of these technique are particularly applied in the critical scenarios such as military and remote sensing, medical image sharing, copyright authentication and law forensics, where the reconstructed cover image is required in high fidelity. Many of the researchers have studied reversible image data hiding techniques in recent year. This paper mainly summarizes the existing techniques of reversible image data hiding algorithms, and it gives the basic procedure of the techniques used.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Review on safe reversible image data hiding across a enciphered environment\",\"authors\":\"J. Lakshmi, J. Rajeshwari\",\"doi\":\"10.1109/ICCMC.2017.8282687\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Reversible image data hiding is (RIDH) is a special category of data hiding technique. This technique will ensure perfect reconstruction of the cover image upon the extraction of the embedded message. Data extraction is achieved through a mechanism, in which access to the secret encryption key is not required. The reversibility of these technique are particularly applied in the critical scenarios such as military and remote sensing, medical image sharing, copyright authentication and law forensics, where the reconstructed cover image is required in high fidelity. Many of the researchers have studied reversible image data hiding techniques in recent year. This paper mainly summarizes the existing techniques of reversible image data hiding algorithms, and it gives the basic procedure of the techniques used.\",\"PeriodicalId\":163288,\"journal\":{\"name\":\"2017 International Conference on Computing Methodologies and Communication (ICCMC)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Computing Methodologies and Communication (ICCMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMC.2017.8282687\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC.2017.8282687","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Review on safe reversible image data hiding across a enciphered environment
Reversible image data hiding is (RIDH) is a special category of data hiding technique. This technique will ensure perfect reconstruction of the cover image upon the extraction of the embedded message. Data extraction is achieved through a mechanism, in which access to the secret encryption key is not required. The reversibility of these technique are particularly applied in the critical scenarios such as military and remote sensing, medical image sharing, copyright authentication and law forensics, where the reconstructed cover image is required in high fidelity. Many of the researchers have studied reversible image data hiding techniques in recent year. This paper mainly summarizes the existing techniques of reversible image data hiding algorithms, and it gives the basic procedure of the techniques used.