Encrypted images-based reversible data hiding in Paillier cryptosystem
Homomorphic public key technology effectively protects privacy, allowing algebraic operations directly in the cipher-text. Therefore, it has been extensively studied in the field of cloud computing. In this study, an encrypted image-based data hiding (EIRDH) algorithm with homomorphic public key cry...
Saved in:
Published in: | Multimedia tools and applications Vol. 79; no. 1-2; pp. 693 - 711 |
---|---|
Main Authors: | , |
Format: | Journal Article |
Language: | English |
Published: |
New York
Springer US
2020
Springer Nature B.V |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Homomorphic public key technology effectively protects privacy, allowing algebraic operations directly in the cipher-text. Therefore, it has been extensively studied in the field of cloud computing. In this study, an encrypted image-based data hiding (EIRDH) algorithm with homomorphic public key cryptosystem is presented. The key contributions are these two sides. (1) An improved fast Paillier homomorphic public key cryptosystem system is proposed for encrypting image. It improves the efficiency of encryption operations greatly. (2) A difference expansion (DE) scheme is developed by exploiting the cover pixel to construct a new pair of pixels for data hiding. Compared with other methods, the experimental results show that, the proposed method has larger payload and higher stego-image quality. It accomplishes the image quality’s increasing instead of general decreasing. |
---|---|
AbstractList | Homomorphic public key technology effectively protects privacy, allowing algebraic operations directly in the cipher-text. Therefore, it has been extensively studied in the field of cloud computing. In this study, an encrypted image-based data hiding (EIRDH) algorithm with homomorphic public key cryptosystem is presented. The key contributions are these two sides. (1) An improved fast Paillier homomorphic public key cryptosystem system is proposed for encrypting image. It improves the efficiency of encryption operations greatly. (2) A difference expansion (DE) scheme is developed by exploiting the cover pixel to construct a new pair of pixels for data hiding. Compared with other methods, the experimental results show that, the proposed method has larger payload and higher stego-image quality. It accomplishes the image quality’s increasing instead of general decreasing. |
Author | Jiang, Cuiling Pang, Yilin |
Author_xml | – sequence: 1 givenname: Cuiling surname: Jiang fullname: Jiang, Cuiling email: cuilingjiang@ecust.edu.cn organization: School of Information Science and Engineering, East China University of Science and Technology – sequence: 2 givenname: Yilin surname: Pang fullname: Pang, Yilin organization: School of Information Science and Engineering, East China University of Science and Technology |
BookMark | eNp9kEFLw0AQhRepYFv9A54CnldndpPd5CiltUJBD3peNtlpTUmTupta-u9dG8Gbp5kH73vDvAkbtV1LjN0i3COAfgiIkAoOWHDQuU758YKNMdOSay1wFHeZA9cZ4BWbhLAFQJWJdMwW87byp31PLql3dkOBlzZE4emLfKjLhhJne5t81K5uN0ndJq-2bpqafHLmunAKPe2u2eXaNoFufueUvS_mb7MlX708Pc8eV7ySWPTcKV1pqaGQTmChqiKv1iWWpUuVAystFiWi0JmtiArUonRa5VaqKBSBVXLK7obcve8-DxR6s-0Ovo0njRC5gjTLUx1dYnBVvgvB09rsffzOnwyC-enLDH2Z2Jc592WOEZIDFKK53ZD_i_6H-gZh4XAy |
CitedBy_id | crossref_primary_10_1007_s11042_022_12684_8 crossref_primary_10_1007_s11042_020_09522_0 crossref_primary_10_1007_s11277_023_10298_3 crossref_primary_10_1007_s11042_021_11122_5 crossref_primary_10_1007_s11042_021_11341_w crossref_primary_10_1142_S0218126622500931 crossref_primary_10_1109_ACCESS_2020_3001385 crossref_primary_10_1109_MMUL_2020_2985973 crossref_primary_10_1007_s10489_021_02789_2 crossref_primary_10_1007_s11042_022_12350_z crossref_primary_10_1016_j_jvcir_2021_103085 crossref_primary_10_1109_TCSVT_2022_3140974 |
Cites_doi | 10.1049/el.2014.4476 10.1007/s11042-017-5293-6 10.4218/etrij.14.0213.0449 10.1049/iet-cdt:20060183 10.1007/s11042-016-3476-1 10.1109/TIFS.2011.2176120 10.1016/j.jvcir.2014.04.003 10.1016/j.image.2015.09.014 10.1016/j.sigpro.2016.07.002 10.1109/LSP.2011.2114651 10.1109/TCSVT.2015.2433194 10.1109/LSP.2012.2187334 10.1007/3-540-48910-X_16 10.1109/TIFS.2013.2248725 10.1016/j.sigpro.2013.06.023 10.1109/TIFS.2010.2099114 10.1016/j.jss.2013.05.077 10.1007/s11554-018-0838-0 10.1049/el.2013.3806 10.1109/TCSVT.2003.815962 10.1007/s11042-018-6567-3 10.1109/MSP.2012.2219653 10.1186/s13634-017-0496-6 10.1007/s11042-018-6801-z 10.1109/TCSVT.2017.2742023 10.1007/978-3-319-59463-7_14 10.1155/2014/604876 10.1155/2014/861782 10.1007/978-3-319-59463-7_15 10.1109/TCSVT.2015.2418611 10.1155/2010/134546 |
ContentType | Journal Article |
Copyright | Springer Science+Business Media, LLC, part of Springer Nature 2019 Multimedia Tools and Applications is a copyright of Springer, (2019). All Rights Reserved. |
Copyright_xml | – notice: Springer Science+Business Media, LLC, part of Springer Nature 2019 – notice: Multimedia Tools and Applications is a copyright of Springer, (2019). All Rights Reserved. |
DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8AO 8FD 8FE 8FG 8FK 8FL 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ GUQSH HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N M2O MBDVC P5Z P62 PQBIZ PQBZA PQEST PQQKQ PQUKI PRINS Q9U |
DOI | 10.1007/s11042-019-07874-w |
DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI-INFORM Complete ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni Edition) Research Library (Alumni Edition) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials AUTh Library subscriptions: ProQuest Central Business Premium Collection Technology Collection ProQuest One Community College ProQuest Central Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student Research Library Prep SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Collection Computing Database ProQuest Research Library Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection One Business (ProQuest) ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic |
DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Research Library Prep Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Pharma Collection ProQuest Central China ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest Central Korea ProQuest Research Library Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest Central (Alumni) Business Premium Collection (Alumni) |
DatabaseTitleList | ABI/INFORM Global (Corporate) |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1573-7721 |
EndPage | 711 |
ExternalDocumentID | 10_1007_s11042_019_07874_w |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61371150 funderid: http://dx.doi.org/10.13039/501100001809 |
GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29M 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3EH 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 8AO 8FE 8FG 8FL 8G5 8UJ 95- 95. 95~ 96X AAAVM AABHQ AABYN AAFGU AAHNG AAIAL AAJKR AANZL AAOBN AAPBV AARHV AARTL AATNV AATVU AAUYE AAWCG AAWWR AAYFA AAYIU AAYQN AAYTO ABBBX ABBXA ABDZT ABECU ABFGW ABFTV ABHLI ABHQN ABJNI ABJOX ABKAS ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACBMV ACBRV ACBXY ACBYP ACGFO ACGFS ACHSB ACHXU ACIGE ACIPQ ACKNC ACMDZ ACMLO ACOKC ACOMO ACREN ACSNA ACTTH ACVWB ACWMK ADGRI ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMDM ADOXG ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEEQQ AEFIE AEFTE AEGAL AEGNC AEJHL AEJRE AEKMD AENEX AEOHA AEPYU AESKC AESTI AETLH AEVLU AEVTX AEXYK AEYWE AFEXP AFGCZ AFKRA AFLOW AFNRJ AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGBP AGGDS AGJBK AGMZJ AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIIXL AILAN AIMYW AITGF AJBLW AJDOV AJRNO AJZVZ AKQUC ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GUQSH GXS HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW LAK LLZTM M0C M0N M2O M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQQKQ PROAC PT4 PT5 Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TH9 TSG TSK TSV TUC TUS U2A UG4 UNUBA UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z5O Z7R Z7S Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8P Z8Q Z8R Z8S Z8T Z8U Z8W Z92 ZMTXR ~EX AACDK AAEOY AAGNY AAJBT AASML AAYXX AAYZH ABAKF ACAOD ACDTI ACZOJ AEFQL AEMSY AFBBN AGQEE AGRTI AIGIU CITATION H13 PQBZA 7SC 7XB 8AL 8FD 8FK JQ2 L.- L7M L~C L~D MBDVC PQEST PQUKI PRINS Q9U |
ID | FETCH-LOGICAL-c319t-d67c737093d2196c98cfb1bbd46d0a3a19b11275acee9172bd768a36e916e0a63 |
IEDL.DBID | AEJHL |
ISSN | 1380-7501 |
IngestDate | Wed Nov 06 08:21:27 EST 2024 Fri Nov 22 00:09:51 EST 2024 Sat Dec 16 12:03:56 EST 2023 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1-2 |
Keywords | Image encryption Reversible data hiding Difference expansion Homomorphic public key cryptosystem |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c319t-d67c737093d2196c98cfb1bbd46d0a3a19b11275acee9172bd768a36e916e0a63 |
PQID | 2286045847 |
PQPubID | 54626 |
PageCount | 19 |
ParticipantIDs | proquest_journals_2286045847 crossref_primary_10_1007_s11042_019_07874_w springer_journals_10_1007_s11042_019_07874_w |
PublicationCentury | 2000 |
PublicationDate | 1-2020 2020-01-00 20200101 |
PublicationDateYYYYMMDD | 2020-01-01 |
PublicationDate_xml | – year: 2020 text: 1-2020 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York – name: Dordrecht |
PublicationSubtitle | An International Journal |
PublicationTitle | Multimedia tools and applications |
PublicationTitleAbbrev | Multimed Tools Appl |
PublicationYear | 2020 |
Publisher | Springer US Springer Nature B.V |
Publisher_xml | – name: Springer US – name: Springer Nature B.V |
References | Lagendijk, Zekeriya, Barni (CR13) 2013; 30 Ma, Zhang, Zhao, Yu, Li (CR18) 2013; 8 Janani, P Poorani (CR12) 2014; 3 CR38 Gutub, Al-Juaid, Khan (CR10) 2017; 78 Hong, Chen, Wu (CR11) 2011; 9 Li, Li (CR14) 2017; 130 Zhang (CR34) 2011; 6 Zhang, Long, Wang, Cheng (CR39) 2016; 26 Xiang, Luo (CR29) 2017; 2017 CR32 Zhang, Ma, Yu (CR37) 2014; 94 Xiao, Chen (CR31) 2014; 50 Alassaf, Gutub, Parah, Al Ghamdi (CR1) 2018; 78 Di, Duan, Zhang, Zhang, Liu (CR5) 2017 Gutub (CR6) 2007; 1 Tang, Xu, Yao, Qin, Zhang (CR25) 2018; 78 CR2 Li, Xiao, Kulsoom, Zhang (CR16) 2015; 51 CR8 CR7 CR9 CR27 Zhang (CR36) 2014; 94 Ou, Li, Zhao, Ni (CR19) 2013; 86 Chen, Shiu, Horng (CR3) 2014; 25 CR21 Tang, Xu, Ye, Wang, Zhang, Yu (CR24) 2018; 16 Tian (CR26) 2003; 3 Zhang (CR35) 2012; 7 Li, Xiao, Peng, Nan (CR15) 2014; 36 Di, Duan, Zhang, Zhang, Liu (CR4) 2017 Xiang, Luo (CR28) 2016; 27 Tang, Wang, Zhang (CR23) 2017; 76 Li, Xiao, Zhang, Nan (CR17) 2015; 39 Paillier (CR20) 1999; 1592 Shiu, Chen, Hong (CR22) 2015; 39 Xiang, Luo (CR30) 2018; 28 Zhang (CR33) 2011; 18 Zhenjun Tang (7874_CR25) 2018; 78 7874_CR2 Adnan Gutub (7874_CR10) 2017; 78 M Li (7874_CR17) 2015; 39 X Zhang (7874_CR34) 2011; 6 7874_CR7 7874_CR9 7874_CR8 X Zhang (7874_CR35) 2012; 7 M Li (7874_CR14) 2017; 130 C-W Shiu (7874_CR22) 2015; 39 Fuqiang Di (7874_CR4) 2017 7874_CR21 X Zhang (7874_CR33) 2011; 18 M Li (7874_CR15) 2014; 36 AA-A Gutub (7874_CR6) 2007; 1 W Hong (7874_CR11) 2011; 9 M Li (7874_CR16) 2015; 51 XP Zhang (7874_CR39) 2016; 26 7874_CR27 W Zhang (7874_CR37) 2014; 94 P Paillier (7874_CR20) 1999; 1592 X Zhang (7874_CR36) 2014; 94 Fuqiang Di (7874_CR5) 2017 K Ma (7874_CR18) 2013; 8 S Xiang (7874_CR29) 2017; 2017 D Xiao (7874_CR31) 2014; 50 S Janani (7874_CR12) 2014; 3 RL Lagendijk (7874_CR13) 2013; 30 7874_CR32 YC Chen (7874_CR3) 2014; 25 Z Tang (7874_CR23) 2017; 76 Norah Alassaf (7874_CR1) 2018; 78 S Xiang (7874_CR30) 2018; 28 7874_CR38 Zhenjun Tang (7874_CR24) 2018; 16 J Tian (7874_CR26) 2003; 3 B Ou (7874_CR19) 2013; 86 SJ Xiang (7874_CR28) 2016; 27 |
References_xml | – volume: 51 start-page: 690 issue: 9 year: 2015 end-page: 691 ident: CR16 article-title: Improved reversible data hiding for encrypted images using full embedding strategy publication-title: Electron Lett doi: 10.1049/el.2014.4476 contributor: fullname: Zhang – volume: 27 start-page: 1592 issue: 6 year: 2016 end-page: 1601 ident: CR28 article-title: Reversible data hiding in encrypted image based on homomorphic public key cryptosystem publication-title: Ruan Jian Xue Bao/Journal of Software contributor: fullname: Luo – volume: 78 start-page: 5591 issue: 5 year: 2017 end-page: 5619 ident: CR10 article-title: Counting-based secret sharing technique for multimedia applications publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-017-5293-6 contributor: fullname: Khan – volume: 36 start-page: 325 issue: 2 year: 2014 end-page: 328 ident: CR15 article-title: Modified reversible data hiding in encrypted images using random diffusion and accurate prediction [J] publication-title: ETRI J doi: 10.4218/etrij.14.0213.0449 contributor: fullname: Nan – volume: 3 start-page: 223 issue: 2 year: 2014 end-page: 225 ident: CR12 article-title: In-dependable data hiding in an encrypted image using FCM-DH algorithm[J] publication-title: IJRCCT contributor: fullname: P Poorani – start-page: 138 year: 2017 end-page: 149 ident: CR4 article-title: Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Interpolation-Error Expansion publication-title: Advances in Internetworking, Data & Web Technologies contributor: fullname: Liu – volume: 1 start-page: 389 issue: 4 year: 2007 end-page: 396 ident: CR6 article-title: High speed hardware architecture to compute galois fields GF(p) Montgomery inversion with scalability features publication-title: IET Comput Digit Technol doi: 10.1049/iet-cdt:20060183 contributor: fullname: Gutub – volume: 76 start-page: 8257 issue: 6 year: 2017 end-page: 8283 ident: CR23 article-title: Image encryption based on random projection partition and chaotic system publication-title: Multimed Tools Applic doi: 10.1007/s11042-016-3476-1 contributor: fullname: Zhang – volume: 7 start-page: 826 issue: 2 year: 2012 end-page: 832 ident: CR35 article-title: Separable reversible data hiding in encrypted image publication-title: IEEE Trans Inform Forensics Sec doi: 10.1109/TIFS.2011.2176120 contributor: fullname: Zhang – ident: CR2 – volume: 25 start-page: 1164 year: 2014 end-page: 1170 ident: CR3 article-title: Encrypted signal-based reversible data hiding with public key cryptosystem publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2014.04.003 contributor: fullname: Horng – volume: 39 start-page: 226 year: 2015 end-page: 233 ident: CR22 article-title: Encrypted image-based reversible data hiding with public key cryptography from difference expansion publication-title: Signal Process Image Commun doi: 10.1016/j.image.2015.09.014 contributor: fullname: Hong – volume: 130 start-page: 190 year: 2017 end-page: 196 ident: CR14 article-title: Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding publication-title: Signal Process doi: 10.1016/j.sigpro.2016.07.002 contributor: fullname: Li – volume: 18 start-page: 255 issue: 4 year: 2011 end-page: 258 ident: CR33 article-title: Reversible data hiding in encrypted image publication-title: IEEE Signal Process Lett doi: 10.1109/LSP.2011.2114651 contributor: fullname: Zhang – volume: 26 start-page: 1622 issue: 9 year: 2016 end-page: 1631 ident: CR39 article-title: Lossless and reversible data hiding in encrypted images with public key cryptography publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2015.2433194 contributor: fullname: Cheng – volume: 9 start-page: 199 issue: 4 year: 2011 end-page: 202 ident: CR11 article-title: An improved reversible data hiding in encrypted images using side match publication-title: IEEE Signal Process Lett doi: 10.1109/LSP.2012.2187334 contributor: fullname: Wu – volume: 1592 start-page: 223 year: 1999 end-page: 238 ident: CR20 article-title: Public-key cryptosystems based on composite degree residuosity classes publication-title: Proceeding of the Advances Cryptology, EUROCRYPT99,LNCS doi: 10.1007/3-540-48910-X_16 contributor: fullname: Paillier – start-page: 150 year: 2017 end-page: 159 ident: CR5 article-title: Reversible Image Data Hiding with Homomorphic Encryption and Contrast Enhancement publication-title: Advances in Internetworking, Data & Web Technologies contributor: fullname: Liu – ident: CR8 – volume: 8 start-page: 553 issue: 3 year: 2013 end-page: 562 ident: CR18 article-title: Reversible data hiding in encrypted images by reserving room before encryption publication-title: IEEE Trans Inform Forensics Sec doi: 10.1109/TIFS.2013.2248725 contributor: fullname: Li – ident: CR27 – volume: 94 start-page: 118 issue: 0 year: 2014 end-page: 127 ident: CR36 article-title: Reversibility improved data hiding in encrypted images publication-title: Signal Process doi: 10.1016/j.sigpro.2013.06.023 contributor: fullname: Zhang – volume: 6 start-page: 53 issue: 1 year: 2011 end-page: 58 ident: CR34 article-title: Lossy compression and iterative reconstruction for encrypted image publication-title: IEEE Trans Inform Forensics Sec doi: 10.1109/TIFS.2010.2099114 contributor: fullname: Zhang – volume: 94 start-page: 118 year: 2014 end-page: 127 ident: CR37 article-title: Reversibility improved data hiding in encrypted images publication-title: Signal Process doi: 10.1016/j.sigpro.2013.06.023 contributor: fullname: Yu – ident: CR21 – volume: 39 start-page: 234 year: 2015 end-page: 248 ident: CR17 article-title: Reversible data hiding in encrypted images using cross division and additive homomorphism publication-title: Signal Process: Image Commun contributor: fullname: Nan – volume: 86 start-page: 2700 issue: 10 year: 2013 end-page: 2709 ident: CR19 article-title: Reversible data hiding based on PDE predictor publication-title: J Syst Softw doi: 10.1016/j.jss.2013.05.077 contributor: fullname: Ni – ident: CR38 – volume: 16 start-page: 709 issue: 3 year: 2018 end-page: 724 ident: CR24 article-title: Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image publication-title: Journal of Real-Time Image Processing doi: 10.1007/s11554-018-0838-0 contributor: fullname: Yu – volume: 50 start-page: 598 issue: 8 year: 2014 end-page: 600 ident: CR31 article-title: Separable data hiding in encrypted image based on compressive sensing [J] publication-title: Electron Lett doi: 10.1049/el.2013.3806 contributor: fullname: Chen – ident: CR9 – volume: 3 start-page: 890 issue: 8 year: 2003 end-page: 896 ident: CR26 article-title: Reversible data embedding using a difference expansion publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2003.815962 contributor: fullname: Tian – ident: CR32 – volume: 78 start-page: 9691 issue: 8 year: 2018 end-page: 9715 ident: CR25 article-title: Reversible data hiding with differential compression in encrypted image publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-018-6567-3 contributor: fullname: Zhang – ident: CR7 – volume: 30 start-page: 82 issue: 1 year: 2013 end-page: 105 ident: CR13 article-title: Encrypted signal processing for privacy protection: conveying the utility of homomorphic encryption and multiparty computation publication-title: IEEE Signal Process doi: 10.1109/MSP.2012.2219653 contributor: fullname: Barni – volume: 2017 start-page: 59 year: 2017 ident: CR29 article-title: Efficient reversible data hiding in encrypted image with public key cryptosystem publication-title: EURASIP J Adv Signal Process doi: 10.1186/s13634-017-0496-6 contributor: fullname: Luo – volume: 78 start-page: 32633 issue: 23 year: 2018 end-page: 32657 ident: CR1 article-title: Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-018-6801-z contributor: fullname: Al Ghamdi – volume: 28 start-page: 3099 issue: 11 year: 2018 end-page: 3110 ident: CR30 article-title: Reversible data hiding in homomorphic encrypted domain by mirroring Ciphertext group publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2017.2742023 contributor: fullname: Luo – volume: 7 start-page: 826 issue: 2 year: 2012 ident: 7874_CR35 publication-title: IEEE Trans Inform Forensics Sec doi: 10.1109/TIFS.2011.2176120 contributor: fullname: X Zhang – start-page: 138 volume-title: Advances in Internetworking, Data & Web Technologies year: 2017 ident: 7874_CR4 doi: 10.1007/978-3-319-59463-7_14 contributor: fullname: Fuqiang Di – volume: 1 start-page: 389 issue: 4 year: 2007 ident: 7874_CR6 publication-title: IET Comput Digit Technol doi: 10.1049/iet-cdt:20060183 contributor: fullname: AA-A Gutub – volume: 78 start-page: 9691 issue: 8 year: 2018 ident: 7874_CR25 publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-018-6567-3 contributor: fullname: Zhenjun Tang – volume: 27 start-page: 1592 issue: 6 year: 2016 ident: 7874_CR28 publication-title: Ruan Jian Xue Bao/Journal of Software contributor: fullname: SJ Xiang – ident: 7874_CR32 doi: 10.1155/2014/604876 – volume: 86 start-page: 2700 issue: 10 year: 2013 ident: 7874_CR19 publication-title: J Syst Softw doi: 10.1016/j.jss.2013.05.077 contributor: fullname: B Ou – volume: 1592 start-page: 223 year: 1999 ident: 7874_CR20 publication-title: Proceeding of the Advances Cryptology, EUROCRYPT99,LNCS doi: 10.1007/3-540-48910-X_16 contributor: fullname: P Paillier – volume: 6 start-page: 53 issue: 1 year: 2011 ident: 7874_CR34 publication-title: IEEE Trans Inform Forensics Sec doi: 10.1109/TIFS.2010.2099114 contributor: fullname: X Zhang – volume: 25 start-page: 1164 year: 2014 ident: 7874_CR3 publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2014.04.003 contributor: fullname: YC Chen – volume: 130 start-page: 190 year: 2017 ident: 7874_CR14 publication-title: Signal Process doi: 10.1016/j.sigpro.2016.07.002 contributor: fullname: M Li – volume: 3 start-page: 890 issue: 8 year: 2003 ident: 7874_CR26 publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2003.815962 contributor: fullname: J Tian – ident: 7874_CR38 doi: 10.1155/2014/861782 – volume: 9 start-page: 199 issue: 4 year: 2011 ident: 7874_CR11 publication-title: IEEE Signal Process Lett doi: 10.1109/LSP.2012.2187334 contributor: fullname: W Hong – volume: 8 start-page: 553 issue: 3 year: 2013 ident: 7874_CR18 publication-title: IEEE Trans Inform Forensics Sec doi: 10.1109/TIFS.2013.2248725 contributor: fullname: K Ma – ident: 7874_CR8 – volume: 39 start-page: 234 year: 2015 ident: 7874_CR17 publication-title: Signal Process: Image Commun contributor: fullname: M Li – volume: 76 start-page: 8257 issue: 6 year: 2017 ident: 7874_CR23 publication-title: Multimed Tools Applic doi: 10.1007/s11042-016-3476-1 contributor: fullname: Z Tang – volume: 94 start-page: 118 issue: 0 year: 2014 ident: 7874_CR36 publication-title: Signal Process doi: 10.1016/j.sigpro.2013.06.023 contributor: fullname: X Zhang – volume: 26 start-page: 1622 issue: 9 year: 2016 ident: 7874_CR39 publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2015.2433194 contributor: fullname: XP Zhang – volume: 2017 start-page: 59 year: 2017 ident: 7874_CR29 publication-title: EURASIP J Adv Signal Process doi: 10.1186/s13634-017-0496-6 contributor: fullname: S Xiang – volume: 16 start-page: 709 issue: 3 year: 2018 ident: 7874_CR24 publication-title: Journal of Real-Time Image Processing doi: 10.1007/s11554-018-0838-0 contributor: fullname: Zhenjun Tang – volume: 28 start-page: 3099 issue: 11 year: 2018 ident: 7874_CR30 publication-title: IEEE Trans Circ Syst Video Technol doi: 10.1109/TCSVT.2017.2742023 contributor: fullname: S Xiang – start-page: 150 volume-title: Advances in Internetworking, Data & Web Technologies year: 2017 ident: 7874_CR5 doi: 10.1007/978-3-319-59463-7_15 contributor: fullname: Fuqiang Di – volume: 78 start-page: 5591 issue: 5 year: 2017 ident: 7874_CR10 publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-017-5293-6 contributor: fullname: Adnan Gutub – volume: 30 start-page: 82 issue: 1 year: 2013 ident: 7874_CR13 publication-title: IEEE Signal Process doi: 10.1109/MSP.2012.2219653 contributor: fullname: RL Lagendijk – volume: 18 start-page: 255 issue: 4 year: 2011 ident: 7874_CR33 publication-title: IEEE Signal Process Lett doi: 10.1109/LSP.2011.2114651 contributor: fullname: X Zhang – volume: 78 start-page: 32633 issue: 23 year: 2018 ident: 7874_CR1 publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-018-6801-z contributor: fullname: Norah Alassaf – ident: 7874_CR9 – ident: 7874_CR7 – ident: 7874_CR21 doi: 10.1109/TCSVT.2015.2418611 – ident: 7874_CR2 doi: 10.1155/2010/134546 – volume: 94 start-page: 118 year: 2014 ident: 7874_CR37 publication-title: Signal Process doi: 10.1016/j.sigpro.2013.06.023 contributor: fullname: W Zhang – volume: 3 start-page: 223 issue: 2 year: 2014 ident: 7874_CR12 publication-title: IJRCCT contributor: fullname: S Janani – volume: 50 start-page: 598 issue: 8 year: 2014 ident: 7874_CR31 publication-title: Electron Lett doi: 10.1049/el.2013.3806 contributor: fullname: D Xiao – volume: 51 start-page: 690 issue: 9 year: 2015 ident: 7874_CR16 publication-title: Electron Lett doi: 10.1049/el.2014.4476 contributor: fullname: M Li – volume: 39 start-page: 226 year: 2015 ident: 7874_CR22 publication-title: Signal Process Image Commun doi: 10.1016/j.image.2015.09.014 contributor: fullname: C-W Shiu – ident: 7874_CR27 – volume: 36 start-page: 325 issue: 2 year: 2014 ident: 7874_CR15 publication-title: ETRI J doi: 10.4218/etrij.14.0213.0449 contributor: fullname: M Li |
SSID | ssj0016524 |
Score | 2.340385 |
Snippet | Homomorphic public key technology effectively protects privacy, allowing algebraic operations directly in the cipher-text. Therefore, it has been extensively... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Publisher |
StartPage | 693 |
SubjectTerms | Algorithms Cloud computing Computer Communication Networks Computer Science Data Structures and Information Theory Encryption Image quality Multimedia Information Systems Pixels Public Key Infrastructure Special Purpose and Application-Based Systems |
Title | Encrypted images-based reversible data hiding in Paillier cryptosystem |
URI | https://link.springer.com/article/10.1007/s11042-019-07874-w https://www.proquest.com/docview/2286045847 |
Volume | 79 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwED90e9EHp1NxOiUPvmkkadqkfRxuY4iIoML2VNokxaF2Yx8M_3uTfqwq-qBPpbQN5Xp3v9xd73cA517iGRCKs6yNwq4mAgeuYFjwmCfK84TDbDfy4EHcDf1uz9LksHXqIn25KiuSmaOuet2o7SQhWc-NL1y82oS6wR7PKHe907sZ3K6LB9wrZtn6BBtApEWvzM-rfMWjapP5rS6awU2_8a8X3YWdYneJOrk67MGGTpvQKCc3oMKQm7D9iYZwH_q9VM7ep2bvicZvxr_MscU2hSy708yYzKtG9kdS9Dy2QIfGKbqPbJrGrJg9N8npoA_gqd97vB7gYr4ClsbwFlhxIQUTJGDK-C0uA18mMY1j5XJFIhbRIKaW_z0yQGqiOidWJjaJGDcnXJOIs0OopZNUHwFKHIckTEVUMelSR0eE6kQyzQSVShK_BRellMNpTqMRVoTJVmChEViYCSxctaBdfoiwMKl56Dg-z6u6LbgsJV9d_n2147_dfgJbjo2pszRLG2qL2VKfwuZcLc8KRbPH4WjU_QDXws6M |
link.rule.ids | 315,782,786,27933,27934,41073,42142,48344,48347,49649,49652,52153 |
linkProvider | Springer Nature |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60PagH6xOrVXPwpoE8tsnusdiWirUIKrSnZTfJYkFX6YPivzfZh1XRgx73NSyTTL5JJt8XgLNm0rQgFGerNhp7hkgceJJjKWKR6GZTMu7YyL07ORj67Y6TyfFKLky2270sSWYj9ZLsRh2VhGSkG196eLEKVad2zipQbQ1Ho_ZH9cDeyw-z9Qm2iEgLsszPVr4C0jLL_FYYzfCmW_vfn27BZpFfolbeIbZhxaQ7UCvPbkBFKO_Axichwl3odlI1eXu12ScaP9sRZoodumnk9J0mNmieDHJbSdHj2EEdGqfoNnILNdZi9t1LLgi9Bw_dzv1lDxcnLGBlQ2-GtZBKckkCru3IJVTgqySmcaw9oUnEIxrE1CnARxZK7byOxdrOTiIu7IUwJBJ8HyrpS2oOACWMkYTriGquPMpMRKhJFDdcUqUV8etwXro5fM2FNMKlZLJzWGgdFmYOCxd1aJQtERZBNQ0Z80Ve163DRen55ePfrR3-7fVTWOvd3_TD_tXg-gjWmZthZ4suDajMJnNzDKtTPT8pet07FO7RDA |
linkToPdf | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bS8MwFD7oBqIPTqfivObBNw0mTZt0j8OtbigycIJvpU1SHGg3dmH470162VT0QXwsbUI5ycmXnJPvOwAXXuIZEIqzqI3CriYCN13BsOAxT5TnCYdZNnL3UTw8--2OlclZsviz2-5lSjLnNFiVpnR2PVbJ9Yr4Ri2thGQEHF-4eLEOVRsWcytQbfUGt8Eyk8C9orCtT7BBR1oQZ37u5Ss4rXac35KkGfYEtf__9Q5sF_tO1Monyi6s6bQOtbKmAypcvA5bnwQK9yDopHLyPja7UjR8MyvPFFvUU8jqPk2MM71qZK-YopehhUA0TFE_sgEc02PWbpQLRe_DU9AZ3HRxUXkBS-OSM6y4kIIJ0mTKrGhcNn2ZxDSOlcsViVhEmzG1yvCRgVhz3nNiZU4tEePmgWsScXYAlXSU6kNAieOQhKmIKiZd6uiIUJ1IppmgUkniN-CyNHk4zgU2wpWUsjVYaAwWZgYLFw04KUclLJxtGjqOz_N8bwOuylFYvf69t6O_fX4OG_12EN73Hu6OYdOxB-8sFnMCldlkrk9hfarmZ8UE_ABjE9mj |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Encrypted+images-based+reversible+data+hiding+in+Paillier+cryptosystem&rft.jtitle=Multimedia+tools+and+applications&rft.au=Jiang%2C+Cuiling&rft.au=Pang%2C+Yilin&rft.date=2020-01-01&rft.pub=Springer+US&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=79&rft.issue=1-2&rft.spage=693&rft.epage=711&rft_id=info:doi/10.1007%2Fs11042-019-07874-w&rft.externalDocID=10_1007_s11042_019_07874_w |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon |