Full text

Turn on search term navigation

Copyright © 2020 Xi-Yan Li et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/

Abstract

With the development of cloud computing, high-capacity reversible data hiding in an encrypted image (RDHEI) has attracted increasing attention. The main idea of RDHEI is that an image owner encrypts a cover image, and then a data hider embeds secret information in the encrypted image. With the information hiding key, a receiver can extract the embedded data from the hidden image; with the encryption key, the receiver reconstructs the original image. In this paper, we can embed data in the form of random bits or scanned documents. The proposed method takes full advantage of the spatial correlation in the original images to vacate the room for embedding information before image encryption. By jointly using Sudoku and Arnold chaos encryption, the encrypted images retain the vacated room. Before the data hiding phase, the secret information is preprocessed by a halftone, quadtree, and S-BOX transformation. The experimental results prove that the proposed method not only realizes high-capacity reversible data hiding in encrypted images but also reconstructs the original image completely.

Details

Title
High-Capacity Reversible Data Hiding in Encrypted Images by Information Preprocessing
Author
Xi-Yan, Li 1   VIAFID ORCID Logo  ; Xia-Bing, Zhou 2   VIAFID ORCID Logo  ; Qing-Lei, Zhou 3   VIAFID ORCID Logo  ; Shi-Jing, Han 4   VIAFID ORCID Logo  ; Liu, Zheng 5   VIAFID ORCID Logo 

 State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University, Zhengzhou 450001, China 
 School of Computer Science and Technology, Soochow University, Suzhou 215006, China 
 State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University, Zhengzhou 450001, China; School of Information Engineering of, Zhengzhou University, Zhengzhou 450001, China 
 State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University, Zhengzhou 450001, China; Nanning Normal University, Nanning 530000, China 
 State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University, Zhengzhou 450001, China; Henan University of Animal Husbandry and Economy, School of Information on Engineering, Zhengzhou 450001, China 
Editor
Toshikazu Kuniya
Publication year
2020
Publication date
2020
Publisher
John Wiley & Sons, Inc.
ISSN
10762787
e-ISSN
10990526
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
2456403930
Copyright
Copyright © 2020 Xi-Yan Li et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/