메뉴 건너뛰기




Volumn 46, Issue 5, 2016, Pages 1132-1143

High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation

Author keywords

Image encryption; reversible data hiding (RDH); Sparse coding

Indexed keywords

CODES (SYMBOLS); CODING ERRORS; CRYPTOGRAPHY; IMAGE CODING; IMAGE PROCESSING; PIXELS; STEGANOGRAPHY;

EID: 84928975189     PISSN: 21682267     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCYB.2015.2423678     Document Type: Article
Times cited : (356)

References (42)
  • 1
    • 13244269881 scopus 로고    scopus 로고
    • Lossless generalized-LSB data embedding
    • Feb.
    • M. U. Celik, G. Sharma, A. M. Tekalp, "Lossless generalized-LSB data embedding," IEEE Trans. Image Process., vol. 14, no. 2, pp. 253-266, Feb. 2005.
    • (2005) IEEE Trans. Image Process. , vol.14 , Issue.2 , pp. 253-266
    • Celik, M.U.1    Sharma, G.2    Tekalp, A.M.3
  • 2
    • 84961844573 scopus 로고    scopus 로고
    • Invertible authentication watermark for JPEG images
    • Las Vegas, NV, USA, Apr.
    • J. Fridrich, M. Goljan, R. Du, "Invertible authentication watermark for JPEG images," in Proc. Inf. Technol. Coding Comput., Las Vegas, NV, USA, Apr. 2001, pp. 223-227.
    • (2001) Proc. Inf. Technol. Coding Comput. , pp. 223-227
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 3
    • 49549108193 scopus 로고    scopus 로고
    • A novel difference expansion transform for reversible data embedding
    • Sep.
    • H. J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, H. G. Choo, "A novel difference expansion transform for reversible data embedding," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 456-465, Sep. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.3 , pp. 456-465
    • Kim, H.J.1    Sachnev, V.2    Shi, Y.Q.3    Nam, J.4    Choo, H.G.5
  • 4
    • 80051745146 scopus 로고    scopus 로고
    • Improved embedding for prediction based reversible watermarking
    • Sep.
    • D. Coltuc, "Improved embedding for prediction based reversible watermarking," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 873-882, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 873-882
    • Coltuc, D.1
  • 5
    • 82055163044 scopus 로고    scopus 로고
    • Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection
    • Dec.
    • X. Li, B. Ying, T. Zeng, "Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection," IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524-3533, Dec. 2011.
    • (2011) IEEE Trans. Image Process. , vol.20 , Issue.12 , pp. 3524-3533
    • Li, X.1    Ying, B.2    Zeng, T.3
  • 6
    • 57849168054 scopus 로고    scopus 로고
    • Difference expansion based reversible data hiding using two embedding directions
    • Dec.
    • Y. Hu, H. K. Lee, K. Chen, J. Li, "Difference expansion based reversible data hiding using two embedding directions," IEEE Trans. Multimedia, vol. 10, no. 8, pp. 1500-1511, Dec. 2008.
    • (2008) IEEE Trans. Multimedia , vol.10 , Issue.8 , pp. 1500-1511
    • Hu, Y.1    Lee, H.K.2    Chen, K.3    Li, J.4
  • 7
    • 84885637866 scopus 로고    scopus 로고
    • Pairwise predictionerror expansion for efficient reversible data hiding
    • Dec.
    • B. Ou, X. Li, Y. Zhao, R. Ni, Y.-Q. Shi, "Pairwise predictionerror expansion for efficient reversible data hiding," IEEE Trans. Image Process., vol. 22, no. 12, pp. 5010-5021, Dec. 2013.
    • (2013) IEEE Trans. Image Process. , vol.22 , Issue.12 , pp. 5010-5021
    • Ou, B.1    Li, X.2    Zhao, Y.3    Ni, R.4    Shi, Y.-Q.5
  • 8
    • 67649552769 scopus 로고    scopus 로고
    • Reversible data hiding based on histogram modification of pixel differences
    • Jun.
    • W. L. Tai, C. M. Yeh, C. C. Chang, "Reversible data hiding based on histogram modification of pixel differences," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp. 906-910, Jun. 2009.
    • (2009) IEEE Trans. Circuits Syst. Video Technol. , vol.19 , Issue.6 , pp. 906-910
    • Tai, W.L.1    Yeh, C.M.2    Chang, C.C.3
  • 9
    • 49449101106 scopus 로고    scopus 로고
    • Multilevel reversible data hiding based on histogram modification of difference images
    • Dec.
    • C. C. Lin, W. L. Tai, C. C. Chang, "Multilevel reversible data hiding based on histogram modification of difference images," Pattern Recognit., vol. 41, no. 12, pp. 3582-3591, Dec. 2008.
    • (2008) Pattern Recognit. , vol.41 , Issue.12 , pp. 3582-3591
    • Lin, C.C.1    Tai, W.L.2    Chang, C.C.3
  • 10
    • 60749112009 scopus 로고    scopus 로고
    • Reversible image hiding scheme using predictive coding and histogram shifting
    • Jun.
    • P. Tsai, Y. C. Hu, H. L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Process., vol. 89, no. 6, pp. 1129-1143, Jun. 2009.
    • (2009) Signal Process. , vol.89 , Issue.6 , pp. 1129-1143
    • Tsai, P.1    Hu, Y.C.2    Yeh, H.L.3
  • 11
    • 84871342023 scopus 로고    scopus 로고
    • Improving histogram-based reversible information hiding by an optimal weightbased prediction scheme
    • Jan.
    • S. L. Lin, C. F. Huang, M. H. Liou, C. Y. Chen, "Improving histogram-based reversible information hiding by an optimal weightbased prediction scheme," J. Inf. Hiding Multimedia Signal Process., vol. 4, no. 1, pp. 19-33, Jan. 2013.
    • (2013) J. Inf. Hiding Multimedia Signal Process. , vol.4 , Issue.1 , pp. 19-33
    • Lin, S.L.1    Huang, C.F.2    Liou, M.H.3    Chen, C.Y.4
  • 12
    • 70349501741 scopus 로고    scopus 로고
    • Parity-invariabilitybased reversible watermarking
    • Sep.
    • S. W. Weng, Y. Zhao, R. R. Ni, J. S. Pan, "Parity-invariabilitybased reversible watermarking," Electron. Lett., vol. 45, no. 20, pp. 1022-1023, Sep. 2009.
    • (2009) Electron. Lett. , vol.45 , Issue.20 , pp. 1022-1023
    • Weng, S.W.1    Zhao, Y.2    Ni, R.R.3    Pan, J.S.4
  • 13
    • 67650157209 scopus 로고    scopus 로고
    • Reversible watermarking based on invariability and adjustment on pixel pairs
    • Dec.
    • S. Weng, Y. Zhao, J. S. Pan, R. Ni, "Reversible watermarking based on invariability and adjustment on pixel pairs," IEEE Signal Process. Lett., vol. 15, no. 20, pp. 721-724, Dec. 2008.
    • (2008) IEEE Signal Process. Lett. , vol.15 , Issue.20 , pp. 721-724
    • Weng, S.1    Zhao, Y.2    Pan, J.S.3    Ni, R.4
  • 14
    • 84879977620 scopus 로고    scopus 로고
    • Reversible data hiding scheme based on dual stegano-images using orientation combinations
    • C. F. Lee and Y. L. Huang, "Reversible data hiding scheme based on dual stegano-images using orientation combinations," J. Telecommun. Syst., vol. 52, no. 4, pp. 2237-2247, 2013.
    • (2013) J. Telecommun. Syst. , vol.52 , Issue.4 , pp. 2237-2247
    • Lee, C.F.1    Huang, Y.L.2
  • 16
    • 77956684084 scopus 로고    scopus 로고
    • An analysis of random projection for changeable and privacy-preserving biometric verification
    • Oct.
    • Y. Wang and K. N. Plataniotis, "An analysis of random projection for changeable and privacy-preserving biometric verification," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 40, no. 5, pp. 1280-1293, Oct. 2010.
    • (2010) IEEE Trans. Syst., Man, Cybern. B, Cybern. , vol.40 , Issue.5 , pp. 1280-1293
    • Wang, Y.1    Plataniotis, K.N.2
  • 17
    • 84893621796 scopus 로고    scopus 로고
    • Framework based on privacy policy hiding for preventing unauthorized face image processing
    • Manchester, U.K., Oct.
    • A. Dabrowski, E. R. Weippl, I. Echizen, "Framework based on privacy policy hiding for preventing unauthorized face image processing," in Proc. IEEE Int. Conf. Syst. Man Cybern. (SMC), Manchester, U.K., Oct. 2013, pp. 455-461.
    • (2013) Proc IEEE Int. Conf. Syst. Man Cybern. (SMC) , pp. 455-461
    • Dabrowski, A.1    Weippl, E.R.2    Echizen, I.3
  • 18
    • 31744433507 scopus 로고    scopus 로고
    • Genetic algorithm based methodology for breaking the steganalytic systems
    • Feb.
    • Y. T. Wu and F. Y. Shih, "Genetic algorithm based methodology for breaking the steganalytic systems," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 36, no. 1, pp. 24-31, Feb. 2006.
    • (2006) IEEE Trans. Syst., Man, Cybern. B, Cybern. , vol.36 , Issue.1 , pp. 24-31
    • Wu, Y.T.1    Shih, F.Y.2
  • 19
    • 77951206069 scopus 로고    scopus 로고
    • Geometric distortion insensitive image watermarking in affine covariant regions
    • May
    • X. Gao, C. Deng, X. Li, D. Tao, "Geometric distortion insensitive image watermarking in affine covariant regions," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 40, no. 3, pp. 278-286, May 2010.
    • (2010) IEEE Trans. Syst., Man, Cybern. C, Appl. Rev. , vol.40 , Issue.3 , pp. 278-286
    • Gao, X.1    Deng, C.2    Li, X.3    Tao, D.4
  • 20
    • 0038321303 scopus 로고    scopus 로고
    • Image subband coding using fuzzy inference and adaptive quantization
    • Jun.
    • M. S. Hsieh and D. C. Tseng, "Image subband coding using fuzzy inference and adaptive quantization," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 33, no. 3, pp. 509-513, Jun. 2003.
    • (2003) IEEE Trans. Syst., Man, Cybern. B, Cybern. , vol.33 , Issue.3 , pp. 509-513
    • Hsieh, M.S.1    Tseng, D.C.2
  • 21
    • 34250017964 scopus 로고    scopus 로고
    • Commutative encryption and watermarking in video compression
    • Jun.
    • S. Lian, Z. Liu, Z. Ren, H. Wang, "Commutative encryption and watermarking in video compression," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774-778, Jun. 2007.
    • (2007) IEEE Trans. Circuits Syst. Video Technol. , vol.17 , Issue.6 , pp. 774-778
    • Lian, S.1    Liu, Z.2    Ren, Z.3    Wang, H.4
  • 22
    • 78651086488 scopus 로고    scopus 로고
    • A commutative digital image watermarking and encryption method in the tree structured Haar transform domain
    • Jan.
    • M. Cancellaro et al., "A commutative digital image watermarking and encryption method in the tree structured Haar transform domain," Signal Process. Image Commun., vol. 26, no. 1, pp. 1-12, Jan. 2011.
    • (2011) Signal Process. Image Commun. , vol.26 , Issue.1 , pp. 1-12
    • Cancellaro, M.1
  • 23
    • 79952179059 scopus 로고    scopus 로고
    • Reversible data hiding in encrypted image
    • Apr.
    • X. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011.
    • (2011) IEEE Signal Process. Lett. , vol.18 , Issue.4 , pp. 255-258
    • Zhang, X.1
  • 24
    • 84863169800 scopus 로고    scopus 로고
    • An improved reversible data hiding in encrypted images using side match
    • Apr.
    • W. Hong, T. S. Chen, H. Wu, "An improved reversible data hiding in encrypted images using side match," IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199-202, Apr. 2012.
    • (2012) IEEE Signal Process. Lett. , vol.19 , Issue.4 , pp. 199-202
    • Hong, W.1    Chen, T.S.2    Wu, H.3
  • 25
    • 84863379693 scopus 로고    scopus 로고
    • Separable reversible data hiding in encrypted image
    • Apr.
    • X. Zhang, "Separable reversible data hiding in encrypted image," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826-832, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 826-832
    • Zhang, X.1
  • 26
    • 84891293531 scopus 로고    scopus 로고
    • Efficient reversible data hiding in encrypted images
    • Feb.
    • X. Zhang, Z. Qian, G. Feng, Y. Ren, "Efficient reversible data hiding in encrypted images," J. Vis. Commun. Image Represent., vol. 25, no. 2, pp. 322-328, Feb. 2014.
    • (2014) J. Vis. Commun. Image Represent. , vol.25 , Issue.2 , pp. 322-328
    • Zhang, X.1    Qian, Z.2    Feng, G.3    Ren, Y.4
  • 27
    • 84899996558 scopus 로고    scopus 로고
    • Separable and error-free reversible data hiding in encrypted image with high payload
    • Mar. 2014
    • Z. Yin, B. Luo, W. Hong, "Separable and error-free reversible data hiding in encrypted image with high payload," Sci. World J., vol. 2014, Mar. 2014, Art. ID 604876.
    • (2014) Sci. World J.
    • Yin, Z.1    Luo, B.2    Hong, W.3
  • 28
    • 84880868167 scopus 로고    scopus 로고
    • Reversibility improved data hiding in encrypted images
    • Jan.
    • W. Zhang, K. Ma, N. Yu, "Reversibility improved data hiding in encrypted images," Signal Process., vol. 94, pp. 118-127, Jan. 2014.
    • (2014) Signal Process. , vol.94 , pp. 118-127
    • Zhang, W.1    Ma, K.2    Yu, N.3
  • 29
    • 84875018020 scopus 로고    scopus 로고
    • Reversible data hiding in encrypted images by reserving room before encryption
    • Mar.
    • K. Ma, W. Zhang, X. Zhao, N. Yu, F. Li, "Reversible data hiding in encrypted images by reserving room before encryption," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553-562, Mar. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.3 , pp. 553-562
    • Ma, K.1    Zhang, W.2    Zhao, X.3    Yu, N.4    Li, F.5
  • 30
    • 22244452348 scopus 로고    scopus 로고
    • Fast block-based image restoration employing the improved best neighborhood matching approach
    • Jul.
    • W. Li, D. Zhang, Z. Liu, X. Qiao, "Fast block-based image restoration employing the improved best neighborhood matching approach," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 35, no. 4, pp. 546-555, Jul. 2005.
    • (2005) IEEE Trans. Syst., Man, Cybern. A, Syst., Humans , vol.35 , Issue.4 , pp. 546-555
    • Li, W.1    Zhang, D.2    Liu, Z.3    Qiao, X.4
  • 32
    • 77949668515 scopus 로고    scopus 로고
    • Efficient compression of encrypted grayscale images
    • Apr.
    • W. Liu, W. Zeng, L. Dong, Q. Yao, "Efficient compression of encrypted grayscale images," IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097-1102, Apr. 2010.
    • (2010) IEEE Trans. Image Process. , vol.19 , Issue.4 , pp. 1097-1102
    • Liu, W.1    Zeng, W.2    Dong, L.3    Yao, Q.4
  • 33
    • 33750383209 scopus 로고    scopus 로고
    • K-SVD: An algorithm for designing overcomplete dictionaries for sparse representation
    • Nov.
    • M. Aharon, M. Elad, A. Bruckstein, "K-SVD: An algorithm for designing overcomplete dictionaries for sparse representation," IEEE Trans. Signal Process., vol. 54, no. 11, pp. 4311-4322, Nov. 2006.
    • (2006) IEEE Trans. Signal Process. , vol.54 , Issue.11 , pp. 4311-4322
    • Aharon, M.1    Elad, M.2    Bruckstein, A.3
  • 34
    • 84897584301 scopus 로고    scopus 로고
    • Analysis K-SVD: A dictionarylearning algorithm for the analysis sparse model
    • Feb.
    • R. Rubinstein, T. Peleg, M. Elad, "Analysis K-SVD: A dictionarylearning algorithm for the analysis sparse model," IEEE Trans. Signal Process., vol. 61, no. 3, pp. 661-677, Feb. 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.3 , pp. 661-677
    • Rubinstein, R.1    Peleg, T.2    Elad, M.3
  • 36
    • 20744456892 scopus 로고    scopus 로고
    • Video compression-From concepts to the H.264/AVC standard
    • Jan.
    • G. Sullivan and T. Wiegand, "Video compression-From concepts to the H.264/AVC standard," Proc. IEEE, vol. 93, no. 1, pp. 18-31, Jan. 2005.
    • (2005) Proc IEEE , vol.93 , Issue.1 , pp. 18-31
    • Sullivan, G.1    Wiegand, T.2
  • 37
    • 77249169798 scopus 로고    scopus 로고
    • Reversible image watermarking using interpolation technique
    • Mar.
    • L. Luo, Z. Chen, M. Chen, X. Zeng, Z. Xiong, "Reversible image watermarking using interpolation technique," IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187-193, Mar. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.1 , pp. 187-193
    • Luo, L.1    Chen, Z.2    Chen, M.3    Zeng, X.4    Xiong, Z.5
  • 39
    • 80053005547 scopus 로고    scopus 로고
    • Break our steganographic system': The ins and outs of organizing BOSS
    • Czech Republic, May
    • P. Bas, T. Filler, T. Pevny, "'Break our steganographic system': The ins and outs of organizing BOSS," in Proc. 13th Int. Conf. Inf. Hiding Conf., Prague, Czech Republic, May 2011, pp. 59-70.
    • (2011) Proc. 13th Int. Conf. Inf. Hiding Conf., Prague , pp. 59-70
    • Bas, P.1    Filler, T.2    Pevny, T.3
  • 41
    • 56749104169 scopus 로고    scopus 로고
    • Hamming embedding and weak geometric consistency for large scale image search
    • (ECCV), Marseille, France, Oct.
    • H. Jegou, M. Douze, C. Schmid, "Hamming embedding and weak geometric consistency for large scale image search," in Proc. 10th Eur. Conf. Comput. Vis. I (ECCV), Marseille, France, Oct. 2008, pp. 304-317.
    • (2008) Proc. 10th Eur. Conf. Comput. Vis. , vol.1 , pp. 304-317
    • Jegou, H.1    Douze, M.2    Schmid, C.3
  • 42
    • 42649102287 scopus 로고    scopus 로고
    • Compression of facial images using the K-SVD algorithm
    • May
    • O. Bryt and M. Elad, "Compression of facial images using the K-SVD algorithm," J. Vis. Commun. Image Represent., vol. 19, no. 4, pp. 270-282, May 2008.
    • (2008) J. Vis. Commun. Image Represent. , vol.19 , Issue.4 , pp. 270-282
    • Bryt, O.1    Elad, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.