Jen-Chun Chang, Yun-Hong Chou, Cheng-Huai Ni, H. Wu
{"title":"可逆数据隐藏在对加密图像","authors":"Jen-Chun Chang, Yun-Hong Chou, Cheng-Huai Ni, H. Wu","doi":"10.1109/CMCSN.2016.22","DOIUrl":null,"url":null,"abstract":"This work proposes a novel separable method for encrypted images. The input image is encrypted first via a pairwise encryption scheme. Then the data bits can be embedded into the pairwisely encrypted image by the well-known difference-expansion technique. When the receiver gets the marked encrypted, he can extract the secret data bits by the data-hiding key and obtain an image which is similar to the original input image by the encryption key. Furthermore, he can recover the original image and extract the secret data bits once he owns both encryption and data-hiding keys. To compare the existing separable methods which do not pre-reserve space for embedding secret data, experimental result shows that the proposed scheme obtains much better embedding capacity.","PeriodicalId":153377,"journal":{"name":"2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Reversible Data Hiding in Pairwisely Encrypted Images\",\"authors\":\"Jen-Chun Chang, Yun-Hong Chou, Cheng-Huai Ni, H. Wu\",\"doi\":\"10.1109/CMCSN.2016.22\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This work proposes a novel separable method for encrypted images. The input image is encrypted first via a pairwise encryption scheme. Then the data bits can be embedded into the pairwisely encrypted image by the well-known difference-expansion technique. When the receiver gets the marked encrypted, he can extract the secret data bits by the data-hiding key and obtain an image which is similar to the original input image by the encryption key. Furthermore, he can recover the original image and extract the secret data bits once he owns both encryption and data-hiding keys. To compare the existing separable methods which do not pre-reserve space for embedding secret data, experimental result shows that the proposed scheme obtains much better embedding capacity.\",\"PeriodicalId\":153377,\"journal\":{\"name\":\"2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CMCSN.2016.22\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMCSN.2016.22","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Reversible Data Hiding in Pairwisely Encrypted Images
This work proposes a novel separable method for encrypted images. The input image is encrypted first via a pairwise encryption scheme. Then the data bits can be embedded into the pairwisely encrypted image by the well-known difference-expansion technique. When the receiver gets the marked encrypted, he can extract the secret data bits by the data-hiding key and obtain an image which is similar to the original input image by the encryption key. Furthermore, he can recover the original image and extract the secret data bits once he owns both encryption and data-hiding keys. To compare the existing separable methods which do not pre-reserve space for embedding secret data, experimental result shows that the proposed scheme obtains much better embedding capacity.