Reference Hub3
An Efficient Reversible Data Hiding Scheme for Encrypted Images

An Efficient Reversible Data Hiding Scheme for Encrypted Images

Kai Chen, Dawen Xu
Copyright: © 2018 |Volume: 10 |Issue: 2 |Pages: 22
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781522543619|DOI: 10.4018/IJDCF.2018040101
Cite Article Cite Article

MLA

Chen, Kai, and Dawen Xu. "An Efficient Reversible Data Hiding Scheme for Encrypted Images." IJDCF vol.10, no.2 2018: pp.1-22. http://doi.org/10.4018/IJDCF.2018040101

APA

Chen, K. & Xu, D. (2018). An Efficient Reversible Data Hiding Scheme for Encrypted Images. International Journal of Digital Crime and Forensics (IJDCF), 10(2), 1-22. http://doi.org/10.4018/IJDCF.2018040101

Chicago

Chen, Kai, and Dawen Xu. "An Efficient Reversible Data Hiding Scheme for Encrypted Images," International Journal of Digital Crime and Forensics (IJDCF) 10, no.2: 1-22. http://doi.org/10.4018/IJDCF.2018040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Reversible data hiding in the encrypted domain is an emerging technology, as it can preserve the confidentiality. In this article, an efficient method of reversible data hiding in encrypted images is proposed. The cover image is first partitioned into non-overlapping blocks. A specific modulo addition operation and block-scrambling operation are applied to obtain the encrypted image. The data-hider, who does not know the original image content, may reversibly embed secret data based on the homomorphic property of the cryptosystem. A scale factor is utilized for selecting embedding zone, which is scalable for different capacity requirements. At the receiving end, the additional data can be extracted if the receiver has the data-hiding key only. If the receiver has the encryption key only, he/she can recover the original image approximately. If the receiver has both the data-hiding key and the encryption key, he can extract the additional data and recover the original content without any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.