메뉴 건너뛰기




Volumn 7, Issue 2, 2012, Pages 826-832

Separable reversible data hiding in encrypted image

Author keywords

Image encryption; image recovery; reversible data hiding

Indexed keywords

DATA-HIDING; ENCRYPTION KEY; IMAGE CONTENT; IMAGE ENCRYPTIONS; IMAGE RECOVERY; LEAST SIGNIFICANT BITS; NATURAL IMAGES; REVERSIBLE DATA HIDING; SPATIAL CORRELATIONS;

EID: 84863379693     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2176120     Document Type: Conference Paper
Times cited : (679)

References (19)
  • 2
    • 77949668515 scopus 로고    scopus 로고
    • Efficient compression of encrypted grayscale images
    • Apr.
    • W. Liu, W. Zeng, L. Dong, and Q. Yao, "Efficient compression of encrypted grayscale images," IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097-1102, Apr. 2010.
    • (2010) IEEE Trans. Image Process. , vol.19 , Issue.4 , pp. 1097-1102
    • Liu, W.1    Zeng, W.2    Dong, L.3    Yao, Q.4
  • 3
    • 79951839282 scopus 로고    scopus 로고
    • Lossy compression and iterative reconstruction for encrypted image
    • Feb.
    • X. Zhang, "Lossy compression and iterative reconstruction for encrypted image," IEEE Trans. Inform. Forensics Security, vol. 6, no. 1, pp. 53-58, Feb. 2011.
    • (2011) IEEE Trans. Inform. Forensics Security , vol.6 , Issue.1 , pp. 53-58
    • Zhang, X.1
  • 4
    • 60449095773 scopus 로고    scopus 로고
    • On the implementation of the discrete Fourier transform in the encrypted domain
    • Feb.
    • T. Bianchi, A. Piva, and M. Barni, "On the implementation of the discrete Fourier transform in the encrypted domain," IEEE Trans. Inform. Forensics Security, vol. 4, no. 1, pp. 86-97, Feb. 2009.
    • (2009) IEEE Trans. Inform. Forensics Security , vol.4 , Issue.1 , pp. 86-97
    • Bianchi, T.1    Piva, A.2    Barni, M.3
  • 5
    • 77249117753 scopus 로고    scopus 로고
    • Composite signal representation for fast and storage-efficient processing of encrypted signals
    • Feb.
    • T. Bianchi, A. Piva, and M. Barni, "Composite signal representation for fast and storage-efficient processing of encrypted signals," IEEE Trans. Inform. Forensics Security, vol. 5, no. 1, pp. 180-187, Feb. 2010.
    • (2010) IEEE Trans. Inform. Forensics Security , vol.5 , Issue.1 , pp. 180-187
    • Bianchi, T.1    Piva, A.2    Barni, M.3
  • 6
    • 0035307977 scopus 로고    scopus 로고
    • A buyer-seller watermarking protocol
    • Apr.
    • N. Memon and P. W. Wong, "A buyer-seller watermarking protocol," IEEE Trans. Image Process., vol. 10, no. 4, pp. 643-649, Apr. 2001.
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.4 , pp. 643-649
    • Memon, N.1    Wong, P.W.2
  • 7
    • 28844473947 scopus 로고    scopus 로고
    • Fingerprinting protocol for images based on additive homomorphic property
    • Dec.
    • M. Kuribayashi and H. Tanaka, "Fingerprinting protocol for images based on additive homomorphic property," IEEE Trans. Image Process., vol. 14, no. 12, pp. 2129-2139, Dec. 2005.
    • (2005) IEEE Trans. Image Process. , vol.14 , Issue.12 , pp. 2129-2139
    • Kuribayashi, M.1    Tanaka, H.2
  • 9
    • 34250017964 scopus 로고    scopus 로고
    • Commutative encryption and watermarking in video compression
    • Jun.
    • S. Lian, Z. Liu, Z. Ren, and H. Wang, "Commutative encryption and watermarking in video compression," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774-778, Jun. 2007.
    • (2007) IEEE Trans. Circuits Syst. Video Technol. , vol.17 , Issue.6 , pp. 774-778
    • Lian, S.1    Liu, Z.2    Ren, Z.3    Wang, H.4
  • 10
    • 78651086488 scopus 로고    scopus 로고
    • A commutative digital image watermarking and encryption method in the tree structured Haar transform domain
    • M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. Natale, and A. Neri, "A commutative digital image watermarking and encryption method in the tree structured Haar transform domain," Signal Processing: Image Commun., vol. 26, no. 1, pp. 1-12, 2011.
    • (2011) Signal Processing: Image Commun. , vol.26 , Issue.1 , pp. 1-12
    • Cancellaro, M.1    Battisti, F.2    Carli, M.3    Boato, G.4    Natale, F.G.B.5    Neri, A.6
  • 11
    • 11144253373 scopus 로고    scopus 로고
    • Video fingerprinting and encryption principles for digital rights management
    • Jun.
    • D. Kundur and K. Karthik, "Video fingerprinting and encryption principles for digital rights management," Proceedings IEEE, vol. 92, no. 6, pp. 918-932, Jun. 2004.
    • (2004) Proceedings IEEE , vol.92 , Issue.6 , pp. 918-932
    • Kundur, D.1    Karthik, K.2
  • 12
    • 79952179059 scopus 로고    scopus 로고
    • Reversible data hiding in encrypted image
    • Apr.
    • X. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011.
    • (2011) IEEE Signal Process. Lett. , vol.18 , Issue.4 , pp. 255-258
    • Zhang, X.1
  • 13
    • 0141862029 scopus 로고    scopus 로고
    • Reversible data embedding using a difference expansion
    • Aug.
    • J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, Aug. 2003.
    • (2003) IEEE Trans. Circuits Syst. Video Technol. , vol.13 , Issue.8 , pp. 890-896
    • J. Tian1
  • 16
    • 77955307612 scopus 로고    scopus 로고
    • A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification
    • W. Hong, T.-S. Chen, Y.-P. Chang, and C.-W. Shiu, "A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification," Signal Process., vol. 90, pp. 2911-2922, 2010.
    • (2010) Signal Process. , vol.90 , pp. 2911-2922
    • Hong, W.1    Chen, T.-S.2    Chang, Y.-P.3    Shiu, C.-W.4
  • 17
    • 45749117988 scopus 로고    scopus 로고
    • Reversible data-embedding scheme using differences between original and predicted pixel values
    • C.-C. Chang, C.-C. Lin, and Y.-H. Chen, "Reversible data-embedding scheme using differences between original and predicted pixel values," IET Inform. Security, vol. 2, no. 2, pp. 35-46, 2008.
    • (2008) IET Inform. Security , vol.2 , Issue.2 , pp. 35-46
    • Chang, C.-C.1    Lin, C.-C.2    Chen, Y.-H.3
  • 18
    • 0032314376 scopus 로고    scopus 로고
    • A comparison of image quality models and metrics based on human visual sensitivity
    • Chicago, IL
    • A. Mayache, T. Eude, and H. Cherifi, "A comparison of image quality models and metrics based on human visual sensitivity," in Proc. Int. Conf. Image Processing (ICIP'98), Chicago, IL, 1998, vol. 3, pp. 409-413.
    • (1998) Proc. Int. Conf. Image Processing (ICIP'98) , vol.3 , pp. 409-413
    • Mayache, A.1    Eude, T.2    Cherifi, H.3
  • 19
    • 0036493909 scopus 로고    scopus 로고
    • A universal image quality index
    • Jan.
    • Z. Wang and A. C. Bovik, "A universal image quality index," IEEE Signal Process. Lett., vol. 9, no. 1, pp. 81-84, Jan. 2002.
    • (2002) IEEE Signal Process. Lett. , vol.9 , Issue.1 , pp. 81-84
    • Wang, Z.1    Bovik, A.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.