{"title":"利用压缩和可逆数据隐藏技术进行加密图像处理","authors":"Yasmina Zine, M. Boumehed, N. H. Said","doi":"10.11591/ijeecs.v34.i3.pp1593-1602","DOIUrl":null,"url":null,"abstract":"Reversible data hiding within encrypted images reversible data hiding in encrypted images (RDH-EI) is a highly effective technique for image processing in the field of encryption. This paper, propose a RDH-EI technique, which utilizes bit-plane compression and various image scanning directions to generate vacant space for data embedding, referred to as vacating room. Initially, the prediction error of the pre-processed image is computed. Subsequently, each bit-plane image is converted into a bit-stream by following the pixel scan order employed before compression. The compressed image is then encrypted employing a stream cipher. Through the process of substitution, the secret data and additional information are incorporated into the acquired image without any knowledge of the original content or the encrypted key. Finally, the generated image is transmitted or archived. The experiments provide evidence that the proposed method surpasses the most advanced methods currently available.","PeriodicalId":13480,"journal":{"name":"Indonesian Journal of Electrical Engineering and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Encrypted image processing using compression and reversible data hiding\",\"authors\":\"Yasmina Zine, M. Boumehed, N. H. Said\",\"doi\":\"10.11591/ijeecs.v34.i3.pp1593-1602\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Reversible data hiding within encrypted images reversible data hiding in encrypted images (RDH-EI) is a highly effective technique for image processing in the field of encryption. This paper, propose a RDH-EI technique, which utilizes bit-plane compression and various image scanning directions to generate vacant space for data embedding, referred to as vacating room. Initially, the prediction error of the pre-processed image is computed. Subsequently, each bit-plane image is converted into a bit-stream by following the pixel scan order employed before compression. The compressed image is then encrypted employing a stream cipher. Through the process of substitution, the secret data and additional information are incorporated into the acquired image without any knowledge of the original content or the encrypted key. Finally, the generated image is transmitted or archived. The experiments provide evidence that the proposed method surpasses the most advanced methods currently available.\",\"PeriodicalId\":13480,\"journal\":{\"name\":\"Indonesian Journal of Electrical Engineering and Computer Science\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Indonesian Journal of Electrical Engineering and Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.11591/ijeecs.v34.i3.pp1593-1602\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Mathematics\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Indonesian Journal of Electrical Engineering and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11591/ijeecs.v34.i3.pp1593-1602","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Mathematics","Score":null,"Total":0}
Encrypted image processing using compression and reversible data hiding
Reversible data hiding within encrypted images reversible data hiding in encrypted images (RDH-EI) is a highly effective technique for image processing in the field of encryption. This paper, propose a RDH-EI technique, which utilizes bit-plane compression and various image scanning directions to generate vacant space for data embedding, referred to as vacating room. Initially, the prediction error of the pre-processed image is computed. Subsequently, each bit-plane image is converted into a bit-stream by following the pixel scan order employed before compression. The compressed image is then encrypted employing a stream cipher. Through the process of substitution, the secret data and additional information are incorporated into the acquired image without any knowledge of the original content or the encrypted key. Finally, the generated image is transmitted or archived. The experiments provide evidence that the proposed method surpasses the most advanced methods currently available.
期刊介绍:
The aim of Indonesian Journal of Electrical Engineering and Computer Science (formerly TELKOMNIKA Indonesian Journal of Electrical Engineering) is to publish high-quality articles dedicated to all aspects of the latest outstanding developments in the field of electrical engineering. Its scope encompasses the applications of Telecommunication and Information Technology, Applied Computing and Computer, Instrumentation and Control, Electrical (Power), Electronics Engineering and Informatics which covers, but not limited to, the following scope: Signal Processing[...] Electronics[...] Electrical[...] Telecommunication[...] Instrumentation & Control[...] Computing and Informatics[...]