Encrypted images-based reversible data hiding in Paillier cryptosystem

Homomorphic public key technology effectively protects privacy, allowing algebraic operations directly in the cipher-text. Therefore, it has been extensively studied in the field of cloud computing. In this study, an encrypted image-based data hiding (EIRDH) algorithm with homomorphic public key cry...

Full description

Saved in:
Bibliographic Details
Published in:Multimedia tools and applications Vol. 79; no. 1-2; pp. 693 - 711
Main Authors: Jiang, Cuiling, Pang, Yilin
Format: Journal Article
Language:English
Published: New York Springer US 2020
Springer Nature B.V
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Homomorphic public key technology effectively protects privacy, allowing algebraic operations directly in the cipher-text. Therefore, it has been extensively studied in the field of cloud computing. In this study, an encrypted image-based data hiding (EIRDH) algorithm with homomorphic public key cryptosystem is presented. The key contributions are these two sides. (1) An improved fast Paillier homomorphic public key cryptosystem system is proposed for encrypting image. It improves the efficiency of encryption operations greatly. (2) A difference expansion (DE) scheme is developed by exploiting the cover pixel to construct a new pair of pixels for data hiding. Compared with other methods, the experimental results show that, the proposed method has larger payload and higher stego-image quality. It accomplishes the image quality’s increasing instead of general decreasing.
AbstractList Homomorphic public key technology effectively protects privacy, allowing algebraic operations directly in the cipher-text. Therefore, it has been extensively studied in the field of cloud computing. In this study, an encrypted image-based data hiding (EIRDH) algorithm with homomorphic public key cryptosystem is presented. The key contributions are these two sides. (1) An improved fast Paillier homomorphic public key cryptosystem system is proposed for encrypting image. It improves the efficiency of encryption operations greatly. (2) A difference expansion (DE) scheme is developed by exploiting the cover pixel to construct a new pair of pixels for data hiding. Compared with other methods, the experimental results show that, the proposed method has larger payload and higher stego-image quality. It accomplishes the image quality’s increasing instead of general decreasing.
Author Jiang, Cuiling
Pang, Yilin
Author_xml – sequence: 1
  givenname: Cuiling
  surname: Jiang
  fullname: Jiang, Cuiling
  email: cuilingjiang@ecust.edu.cn
  organization: School of Information Science and Engineering, East China University of Science and Technology
– sequence: 2
  givenname: Yilin
  surname: Pang
  fullname: Pang, Yilin
  organization: School of Information Science and Engineering, East China University of Science and Technology
BookMark eNp9kEFLw0AQhRepYFv9A54CnldndpPd5CiltUJBD3peNtlpTUmTupta-u9dG8Gbp5kH73vDvAkbtV1LjN0i3COAfgiIkAoOWHDQuU758YKNMdOSay1wFHeZA9cZ4BWbhLAFQJWJdMwW87byp31PLql3dkOBlzZE4emLfKjLhhJne5t81K5uN0ndJq-2bpqafHLmunAKPe2u2eXaNoFufueUvS_mb7MlX708Pc8eV7ySWPTcKV1pqaGQTmChqiKv1iWWpUuVAystFiWi0JmtiArUonRa5VaqKBSBVXLK7obcve8-DxR6s-0Ovo0njRC5gjTLUx1dYnBVvgvB09rsffzOnwyC-enLDH2Z2Jc592WOEZIDFKK53ZD_i_6H-gZh4XAy
CitedBy_id crossref_primary_10_1007_s11042_022_12684_8
crossref_primary_10_1007_s11042_020_09522_0
crossref_primary_10_1007_s11277_023_10298_3
crossref_primary_10_1007_s11042_021_11122_5
crossref_primary_10_1007_s11042_021_11341_w
crossref_primary_10_1142_S0218126622500931
crossref_primary_10_1109_ACCESS_2020_3001385
crossref_primary_10_1109_MMUL_2020_2985973
crossref_primary_10_1007_s10489_021_02789_2
crossref_primary_10_1007_s11042_022_12350_z
crossref_primary_10_1016_j_jvcir_2021_103085
crossref_primary_10_1109_TCSVT_2022_3140974
Cites_doi 10.1049/el.2014.4476
10.1007/s11042-017-5293-6
10.4218/etrij.14.0213.0449
10.1049/iet-cdt:20060183
10.1007/s11042-016-3476-1
10.1109/TIFS.2011.2176120
10.1016/j.jvcir.2014.04.003
10.1016/j.image.2015.09.014
10.1016/j.sigpro.2016.07.002
10.1109/LSP.2011.2114651
10.1109/TCSVT.2015.2433194
10.1109/LSP.2012.2187334
10.1007/3-540-48910-X_16
10.1109/TIFS.2013.2248725
10.1016/j.sigpro.2013.06.023
10.1109/TIFS.2010.2099114
10.1016/j.jss.2013.05.077
10.1007/s11554-018-0838-0
10.1049/el.2013.3806
10.1109/TCSVT.2003.815962
10.1007/s11042-018-6567-3
10.1109/MSP.2012.2219653
10.1186/s13634-017-0496-6
10.1007/s11042-018-6801-z
10.1109/TCSVT.2017.2742023
10.1007/978-3-319-59463-7_14
10.1155/2014/604876
10.1155/2014/861782
10.1007/978-3-319-59463-7_15
10.1109/TCSVT.2015.2418611
10.1155/2010/134546
ContentType Journal Article
Copyright Springer Science+Business Media, LLC, part of Springer Nature 2019
Multimedia Tools and Applications is a copyright of Springer, (2019). All Rights Reserved.
Copyright_xml – notice: Springer Science+Business Media, LLC, part of Springer Nature 2019
– notice: Multimedia Tools and Applications is a copyright of Springer, (2019). All Rights Reserved.
DBID AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8AO
8FD
8FE
8FG
8FK
8FL
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
GUQSH
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
M2O
MBDVC
P5Z
P62
PQBIZ
PQBZA
PQEST
PQQKQ
PQUKI
PRINS
Q9U
DOI 10.1007/s11042-019-07874-w
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI-INFORM Complete
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
Research Library (Alumni Edition)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
AUTh Library subscriptions: ProQuest Central
Business Premium Collection
Technology Collection
ProQuest One Community College
ProQuest Central
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
Research Library Prep
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Collection
Computing Database
ProQuest Research Library
Research Library (Corporate)
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
One Business (ProQuest)
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Pharma Collection
ProQuest Central China
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Central Korea
ProQuest Research Library
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList
ABI/INFORM Global (Corporate)
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1573-7721
EndPage 711
ExternalDocumentID 10_1007_s11042_019_07874_w
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61371150
  funderid: http://dx.doi.org/10.13039/501100001809
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29M
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3EH
3V.
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
7WY
8AO
8FE
8FG
8FL
8G5
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AABYN
AAFGU
AAHNG
AAIAL
AAJKR
AANZL
AAOBN
AAPBV
AARHV
AARTL
AATNV
AATVU
AAUYE
AAWCG
AAWWR
AAYFA
AAYIU
AAYQN
AAYTO
ABBBX
ABBXA
ABDZT
ABECU
ABFGW
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKAS
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACBMV
ACBRV
ACBXY
ACBYP
ACGFO
ACGFS
ACHSB
ACHXU
ACIGE
ACIPQ
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACREN
ACSNA
ACTTH
ACVWB
ACWMK
ADGRI
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMDM
ADOXG
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEEQQ
AEFIE
AEFTE
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AENEX
AEOHA
AEPYU
AESKC
AESTI
AETLH
AEVLU
AEVTX
AEXYK
AEYWE
AFEXP
AFGCZ
AFKRA
AFLOW
AFNRJ
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGBP
AGGDS
AGJBK
AGMZJ
AGQMX
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIIXL
AILAN
AIMYW
AITGF
AJBLW
AJDOV
AJRNO
AJZVZ
AKQUC
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GUQSH
GXS
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
KOW
LAK
LLZTM
M0C
M0N
M2O
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P62
P9O
PF0
PQBIZ
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TH9
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UNUBA
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z5O
Z7R
Z7S
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8P
Z8Q
Z8R
Z8S
Z8T
Z8U
Z8W
Z92
ZMTXR
~EX
AACDK
AAEOY
AAGNY
AAJBT
AASML
AAYXX
AAYZH
ABAKF
ACAOD
ACDTI
ACZOJ
AEFQL
AEMSY
AFBBN
AGQEE
AGRTI
AIGIU
CITATION
H13
PQBZA
7SC
7XB
8AL
8FD
8FK
JQ2
L.-
L7M
L~C
L~D
MBDVC
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c319t-d67c737093d2196c98cfb1bbd46d0a3a19b11275acee9172bd768a36e916e0a63
IEDL.DBID AEJHL
ISSN 1380-7501
IngestDate Wed Nov 06 08:21:27 EST 2024
Fri Nov 22 00:09:51 EST 2024
Sat Dec 16 12:03:56 EST 2023
IsPeerReviewed true
IsScholarly true
Issue 1-2
Keywords Image encryption
Reversible data hiding
Difference expansion
Homomorphic public key cryptosystem
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-d67c737093d2196c98cfb1bbd46d0a3a19b11275acee9172bd768a36e916e0a63
PQID 2286045847
PQPubID 54626
PageCount 19
ParticipantIDs proquest_journals_2286045847
crossref_primary_10_1007_s11042_019_07874_w
springer_journals_10_1007_s11042_019_07874_w
PublicationCentury 2000
PublicationDate 1-2020
2020-01-00
20200101
PublicationDateYYYYMMDD 2020-01-01
PublicationDate_xml – year: 2020
  text: 1-2020
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Multimedia tools and applications
PublicationTitleAbbrev Multimed Tools Appl
PublicationYear 2020
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Lagendijk, Zekeriya, Barni (CR13) 2013; 30
Ma, Zhang, Zhao, Yu, Li (CR18) 2013; 8
Janani, P Poorani (CR12) 2014; 3
CR38
Gutub, Al-Juaid, Khan (CR10) 2017; 78
Hong, Chen, Wu (CR11) 2011; 9
Li, Li (CR14) 2017; 130
Zhang (CR34) 2011; 6
Zhang, Long, Wang, Cheng (CR39) 2016; 26
Xiang, Luo (CR29) 2017; 2017
CR32
Zhang, Ma, Yu (CR37) 2014; 94
Xiao, Chen (CR31) 2014; 50
Alassaf, Gutub, Parah, Al Ghamdi (CR1) 2018; 78
Di, Duan, Zhang, Zhang, Liu (CR5) 2017
Gutub (CR6) 2007; 1
Tang, Xu, Yao, Qin, Zhang (CR25) 2018; 78
CR2
Li, Xiao, Kulsoom, Zhang (CR16) 2015; 51
CR8
CR7
CR9
CR27
Zhang (CR36) 2014; 94
Ou, Li, Zhao, Ni (CR19) 2013; 86
Chen, Shiu, Horng (CR3) 2014; 25
CR21
Tang, Xu, Ye, Wang, Zhang, Yu (CR24) 2018; 16
Tian (CR26) 2003; 3
Zhang (CR35) 2012; 7
Li, Xiao, Peng, Nan (CR15) 2014; 36
Di, Duan, Zhang, Zhang, Liu (CR4) 2017
Xiang, Luo (CR28) 2016; 27
Tang, Wang, Zhang (CR23) 2017; 76
Li, Xiao, Zhang, Nan (CR17) 2015; 39
Paillier (CR20) 1999; 1592
Shiu, Chen, Hong (CR22) 2015; 39
Xiang, Luo (CR30) 2018; 28
Zhang (CR33) 2011; 18
Zhenjun Tang (7874_CR25) 2018; 78
7874_CR2
Adnan Gutub (7874_CR10) 2017; 78
M Li (7874_CR17) 2015; 39
X Zhang (7874_CR34) 2011; 6
7874_CR7
7874_CR9
7874_CR8
X Zhang (7874_CR35) 2012; 7
M Li (7874_CR14) 2017; 130
C-W Shiu (7874_CR22) 2015; 39
Fuqiang Di (7874_CR4) 2017
7874_CR21
X Zhang (7874_CR33) 2011; 18
M Li (7874_CR15) 2014; 36
AA-A Gutub (7874_CR6) 2007; 1
W Hong (7874_CR11) 2011; 9
M Li (7874_CR16) 2015; 51
XP Zhang (7874_CR39) 2016; 26
7874_CR27
W Zhang (7874_CR37) 2014; 94
P Paillier (7874_CR20) 1999; 1592
X Zhang (7874_CR36) 2014; 94
Fuqiang Di (7874_CR5) 2017
K Ma (7874_CR18) 2013; 8
S Xiang (7874_CR29) 2017; 2017
D Xiao (7874_CR31) 2014; 50
S Janani (7874_CR12) 2014; 3
RL Lagendijk (7874_CR13) 2013; 30
7874_CR32
YC Chen (7874_CR3) 2014; 25
Z Tang (7874_CR23) 2017; 76
Norah Alassaf (7874_CR1) 2018; 78
S Xiang (7874_CR30) 2018; 28
7874_CR38
Zhenjun Tang (7874_CR24) 2018; 16
J Tian (7874_CR26) 2003; 3
B Ou (7874_CR19) 2013; 86
SJ Xiang (7874_CR28) 2016; 27
References_xml – volume: 51
  start-page: 690
  issue: 9
  year: 2015
  end-page: 691
  ident: CR16
  article-title: Improved reversible data hiding for encrypted images using full embedding strategy
  publication-title: Electron Lett
  doi: 10.1049/el.2014.4476
  contributor:
    fullname: Zhang
– volume: 27
  start-page: 1592
  issue: 6
  year: 2016
  end-page: 1601
  ident: CR28
  article-title: Reversible data hiding in encrypted image based on homomorphic public key cryptosystem
  publication-title: Ruan Jian Xue Bao/Journal of Software
  contributor:
    fullname: Luo
– volume: 78
  start-page: 5591
  issue: 5
  year: 2017
  end-page: 5619
  ident: CR10
  article-title: Counting-based secret sharing technique for multimedia applications
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-017-5293-6
  contributor:
    fullname: Khan
– volume: 36
  start-page: 325
  issue: 2
  year: 2014
  end-page: 328
  ident: CR15
  article-title: Modified reversible data hiding in encrypted images using random diffusion and accurate prediction [J]
  publication-title: ETRI J
  doi: 10.4218/etrij.14.0213.0449
  contributor:
    fullname: Nan
– volume: 3
  start-page: 223
  issue: 2
  year: 2014
  end-page: 225
  ident: CR12
  article-title: In-dependable data hiding in an encrypted image using FCM-DH algorithm[J]
  publication-title: IJRCCT
  contributor:
    fullname: P Poorani
– start-page: 138
  year: 2017
  end-page: 149
  ident: CR4
  article-title: Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Interpolation-Error Expansion
  publication-title: Advances in Internetworking, Data & Web Technologies
  contributor:
    fullname: Liu
– volume: 1
  start-page: 389
  issue: 4
  year: 2007
  end-page: 396
  ident: CR6
  article-title: High speed hardware architecture to compute galois fields GF(p) Montgomery inversion with scalability features
  publication-title: IET Comput Digit Technol
  doi: 10.1049/iet-cdt:20060183
  contributor:
    fullname: Gutub
– volume: 76
  start-page: 8257
  issue: 6
  year: 2017
  end-page: 8283
  ident: CR23
  article-title: Image encryption based on random projection partition and chaotic system
  publication-title: Multimed Tools Applic
  doi: 10.1007/s11042-016-3476-1
  contributor:
    fullname: Zhang
– volume: 7
  start-page: 826
  issue: 2
  year: 2012
  end-page: 832
  ident: CR35
  article-title: Separable reversible data hiding in encrypted image
  publication-title: IEEE Trans Inform Forensics Sec
  doi: 10.1109/TIFS.2011.2176120
  contributor:
    fullname: Zhang
– ident: CR2
– volume: 25
  start-page: 1164
  year: 2014
  end-page: 1170
  ident: CR3
  article-title: Encrypted signal-based reversible data hiding with public key cryptosystem
  publication-title: J Vis Commun Image Represent
  doi: 10.1016/j.jvcir.2014.04.003
  contributor:
    fullname: Horng
– volume: 39
  start-page: 226
  year: 2015
  end-page: 233
  ident: CR22
  article-title: Encrypted image-based reversible data hiding with public key cryptography from difference expansion
  publication-title: Signal Process Image Commun
  doi: 10.1016/j.image.2015.09.014
  contributor:
    fullname: Hong
– volume: 130
  start-page: 190
  year: 2017
  end-page: 196
  ident: CR14
  article-title: Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2016.07.002
  contributor:
    fullname: Li
– volume: 18
  start-page: 255
  issue: 4
  year: 2011
  end-page: 258
  ident: CR33
  article-title: Reversible data hiding in encrypted image
  publication-title: IEEE Signal Process Lett
  doi: 10.1109/LSP.2011.2114651
  contributor:
    fullname: Zhang
– volume: 26
  start-page: 1622
  issue: 9
  year: 2016
  end-page: 1631
  ident: CR39
  article-title: Lossless and reversible data hiding in encrypted images with public key cryptography
  publication-title: IEEE Trans Circ Syst Video Technol
  doi: 10.1109/TCSVT.2015.2433194
  contributor:
    fullname: Cheng
– volume: 9
  start-page: 199
  issue: 4
  year: 2011
  end-page: 202
  ident: CR11
  article-title: An improved reversible data hiding in encrypted images using side match
  publication-title: IEEE Signal Process Lett
  doi: 10.1109/LSP.2012.2187334
  contributor:
    fullname: Wu
– volume: 1592
  start-page: 223
  year: 1999
  end-page: 238
  ident: CR20
  article-title: Public-key cryptosystems based on composite degree residuosity classes
  publication-title: Proceeding of the Advances Cryptology, EUROCRYPT99,LNCS
  doi: 10.1007/3-540-48910-X_16
  contributor:
    fullname: Paillier
– start-page: 150
  year: 2017
  end-page: 159
  ident: CR5
  article-title: Reversible Image Data Hiding with Homomorphic Encryption and Contrast Enhancement
  publication-title: Advances in Internetworking, Data & Web Technologies
  contributor:
    fullname: Liu
– ident: CR8
– volume: 8
  start-page: 553
  issue: 3
  year: 2013
  end-page: 562
  ident: CR18
  article-title: Reversible data hiding in encrypted images by reserving room before encryption
  publication-title: IEEE Trans Inform Forensics Sec
  doi: 10.1109/TIFS.2013.2248725
  contributor:
    fullname: Li
– ident: CR27
– volume: 94
  start-page: 118
  issue: 0
  year: 2014
  end-page: 127
  ident: CR36
  article-title: Reversibility improved data hiding in encrypted images
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2013.06.023
  contributor:
    fullname: Zhang
– volume: 6
  start-page: 53
  issue: 1
  year: 2011
  end-page: 58
  ident: CR34
  article-title: Lossy compression and iterative reconstruction for encrypted image
  publication-title: IEEE Trans Inform Forensics Sec
  doi: 10.1109/TIFS.2010.2099114
  contributor:
    fullname: Zhang
– volume: 94
  start-page: 118
  year: 2014
  end-page: 127
  ident: CR37
  article-title: Reversibility improved data hiding in encrypted images
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2013.06.023
  contributor:
    fullname: Yu
– ident: CR21
– volume: 39
  start-page: 234
  year: 2015
  end-page: 248
  ident: CR17
  article-title: Reversible data hiding in encrypted images using cross division and additive homomorphism
  publication-title: Signal Process: Image Commun
  contributor:
    fullname: Nan
– volume: 86
  start-page: 2700
  issue: 10
  year: 2013
  end-page: 2709
  ident: CR19
  article-title: Reversible data hiding based on PDE predictor
  publication-title: J Syst Softw
  doi: 10.1016/j.jss.2013.05.077
  contributor:
    fullname: Ni
– ident: CR38
– volume: 16
  start-page: 709
  issue: 3
  year: 2018
  end-page: 724
  ident: CR24
  article-title: Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image
  publication-title: Journal of Real-Time Image Processing
  doi: 10.1007/s11554-018-0838-0
  contributor:
    fullname: Yu
– volume: 50
  start-page: 598
  issue: 8
  year: 2014
  end-page: 600
  ident: CR31
  article-title: Separable data hiding in encrypted image based on compressive sensing [J]
  publication-title: Electron Lett
  doi: 10.1049/el.2013.3806
  contributor:
    fullname: Chen
– ident: CR9
– volume: 3
  start-page: 890
  issue: 8
  year: 2003
  end-page: 896
  ident: CR26
  article-title: Reversible data embedding using a difference expansion
  publication-title: IEEE Trans Circ Syst Video Technol
  doi: 10.1109/TCSVT.2003.815962
  contributor:
    fullname: Tian
– ident: CR32
– volume: 78
  start-page: 9691
  issue: 8
  year: 2018
  end-page: 9715
  ident: CR25
  article-title: Reversible data hiding with differential compression in encrypted image
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-018-6567-3
  contributor:
    fullname: Zhang
– ident: CR7
– volume: 30
  start-page: 82
  issue: 1
  year: 2013
  end-page: 105
  ident: CR13
  article-title: Encrypted signal processing for privacy protection: conveying the utility of homomorphic encryption and multiparty computation
  publication-title: IEEE Signal Process
  doi: 10.1109/MSP.2012.2219653
  contributor:
    fullname: Barni
– volume: 2017
  start-page: 59
  year: 2017
  ident: CR29
  article-title: Efficient reversible data hiding in encrypted image with public key cryptosystem
  publication-title: EURASIP J Adv Signal Process
  doi: 10.1186/s13634-017-0496-6
  contributor:
    fullname: Luo
– volume: 78
  start-page: 32633
  issue: 23
  year: 2018
  end-page: 32657
  ident: CR1
  article-title: Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-018-6801-z
  contributor:
    fullname: Al Ghamdi
– volume: 28
  start-page: 3099
  issue: 11
  year: 2018
  end-page: 3110
  ident: CR30
  article-title: Reversible data hiding in homomorphic encrypted domain by mirroring Ciphertext group
  publication-title: IEEE Trans Circ Syst Video Technol
  doi: 10.1109/TCSVT.2017.2742023
  contributor:
    fullname: Luo
– volume: 7
  start-page: 826
  issue: 2
  year: 2012
  ident: 7874_CR35
  publication-title: IEEE Trans Inform Forensics Sec
  doi: 10.1109/TIFS.2011.2176120
  contributor:
    fullname: X Zhang
– start-page: 138
  volume-title: Advances in Internetworking, Data & Web Technologies
  year: 2017
  ident: 7874_CR4
  doi: 10.1007/978-3-319-59463-7_14
  contributor:
    fullname: Fuqiang Di
– volume: 1
  start-page: 389
  issue: 4
  year: 2007
  ident: 7874_CR6
  publication-title: IET Comput Digit Technol
  doi: 10.1049/iet-cdt:20060183
  contributor:
    fullname: AA-A Gutub
– volume: 78
  start-page: 9691
  issue: 8
  year: 2018
  ident: 7874_CR25
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-018-6567-3
  contributor:
    fullname: Zhenjun Tang
– volume: 27
  start-page: 1592
  issue: 6
  year: 2016
  ident: 7874_CR28
  publication-title: Ruan Jian Xue Bao/Journal of Software
  contributor:
    fullname: SJ Xiang
– ident: 7874_CR32
  doi: 10.1155/2014/604876
– volume: 86
  start-page: 2700
  issue: 10
  year: 2013
  ident: 7874_CR19
  publication-title: J Syst Softw
  doi: 10.1016/j.jss.2013.05.077
  contributor:
    fullname: B Ou
– volume: 1592
  start-page: 223
  year: 1999
  ident: 7874_CR20
  publication-title: Proceeding of the Advances Cryptology, EUROCRYPT99,LNCS
  doi: 10.1007/3-540-48910-X_16
  contributor:
    fullname: P Paillier
– volume: 6
  start-page: 53
  issue: 1
  year: 2011
  ident: 7874_CR34
  publication-title: IEEE Trans Inform Forensics Sec
  doi: 10.1109/TIFS.2010.2099114
  contributor:
    fullname: X Zhang
– volume: 25
  start-page: 1164
  year: 2014
  ident: 7874_CR3
  publication-title: J Vis Commun Image Represent
  doi: 10.1016/j.jvcir.2014.04.003
  contributor:
    fullname: YC Chen
– volume: 130
  start-page: 190
  year: 2017
  ident: 7874_CR14
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2016.07.002
  contributor:
    fullname: M Li
– volume: 3
  start-page: 890
  issue: 8
  year: 2003
  ident: 7874_CR26
  publication-title: IEEE Trans Circ Syst Video Technol
  doi: 10.1109/TCSVT.2003.815962
  contributor:
    fullname: J Tian
– ident: 7874_CR38
  doi: 10.1155/2014/861782
– volume: 9
  start-page: 199
  issue: 4
  year: 2011
  ident: 7874_CR11
  publication-title: IEEE Signal Process Lett
  doi: 10.1109/LSP.2012.2187334
  contributor:
    fullname: W Hong
– volume: 8
  start-page: 553
  issue: 3
  year: 2013
  ident: 7874_CR18
  publication-title: IEEE Trans Inform Forensics Sec
  doi: 10.1109/TIFS.2013.2248725
  contributor:
    fullname: K Ma
– ident: 7874_CR8
– volume: 39
  start-page: 234
  year: 2015
  ident: 7874_CR17
  publication-title: Signal Process: Image Commun
  contributor:
    fullname: M Li
– volume: 76
  start-page: 8257
  issue: 6
  year: 2017
  ident: 7874_CR23
  publication-title: Multimed Tools Applic
  doi: 10.1007/s11042-016-3476-1
  contributor:
    fullname: Z Tang
– volume: 94
  start-page: 118
  issue: 0
  year: 2014
  ident: 7874_CR36
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2013.06.023
  contributor:
    fullname: X Zhang
– volume: 26
  start-page: 1622
  issue: 9
  year: 2016
  ident: 7874_CR39
  publication-title: IEEE Trans Circ Syst Video Technol
  doi: 10.1109/TCSVT.2015.2433194
  contributor:
    fullname: XP Zhang
– volume: 2017
  start-page: 59
  year: 2017
  ident: 7874_CR29
  publication-title: EURASIP J Adv Signal Process
  doi: 10.1186/s13634-017-0496-6
  contributor:
    fullname: S Xiang
– volume: 16
  start-page: 709
  issue: 3
  year: 2018
  ident: 7874_CR24
  publication-title: Journal of Real-Time Image Processing
  doi: 10.1007/s11554-018-0838-0
  contributor:
    fullname: Zhenjun Tang
– volume: 28
  start-page: 3099
  issue: 11
  year: 2018
  ident: 7874_CR30
  publication-title: IEEE Trans Circ Syst Video Technol
  doi: 10.1109/TCSVT.2017.2742023
  contributor:
    fullname: S Xiang
– start-page: 150
  volume-title: Advances in Internetworking, Data & Web Technologies
  year: 2017
  ident: 7874_CR5
  doi: 10.1007/978-3-319-59463-7_15
  contributor:
    fullname: Fuqiang Di
– volume: 78
  start-page: 5591
  issue: 5
  year: 2017
  ident: 7874_CR10
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-017-5293-6
  contributor:
    fullname: Adnan Gutub
– volume: 30
  start-page: 82
  issue: 1
  year: 2013
  ident: 7874_CR13
  publication-title: IEEE Signal Process
  doi: 10.1109/MSP.2012.2219653
  contributor:
    fullname: RL Lagendijk
– volume: 18
  start-page: 255
  issue: 4
  year: 2011
  ident: 7874_CR33
  publication-title: IEEE Signal Process Lett
  doi: 10.1109/LSP.2011.2114651
  contributor:
    fullname: X Zhang
– volume: 78
  start-page: 32633
  issue: 23
  year: 2018
  ident: 7874_CR1
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-018-6801-z
  contributor:
    fullname: Norah Alassaf
– ident: 7874_CR9
– ident: 7874_CR7
– ident: 7874_CR21
  doi: 10.1109/TCSVT.2015.2418611
– ident: 7874_CR2
  doi: 10.1155/2010/134546
– volume: 94
  start-page: 118
  year: 2014
  ident: 7874_CR37
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2013.06.023
  contributor:
    fullname: W Zhang
– volume: 3
  start-page: 223
  issue: 2
  year: 2014
  ident: 7874_CR12
  publication-title: IJRCCT
  contributor:
    fullname: S Janani
– volume: 50
  start-page: 598
  issue: 8
  year: 2014
  ident: 7874_CR31
  publication-title: Electron Lett
  doi: 10.1049/el.2013.3806
  contributor:
    fullname: D Xiao
– volume: 51
  start-page: 690
  issue: 9
  year: 2015
  ident: 7874_CR16
  publication-title: Electron Lett
  doi: 10.1049/el.2014.4476
  contributor:
    fullname: M Li
– volume: 39
  start-page: 226
  year: 2015
  ident: 7874_CR22
  publication-title: Signal Process Image Commun
  doi: 10.1016/j.image.2015.09.014
  contributor:
    fullname: C-W Shiu
– ident: 7874_CR27
– volume: 36
  start-page: 325
  issue: 2
  year: 2014
  ident: 7874_CR15
  publication-title: ETRI J
  doi: 10.4218/etrij.14.0213.0449
  contributor:
    fullname: M Li
SSID ssj0016524
Score 2.340385
Snippet Homomorphic public key technology effectively protects privacy, allowing algebraic operations directly in the cipher-text. Therefore, it has been extensively...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Publisher
StartPage 693
SubjectTerms Algorithms
Cloud computing
Computer Communication Networks
Computer Science
Data Structures and Information Theory
Encryption
Image quality
Multimedia Information Systems
Pixels
Public Key Infrastructure
Special Purpose and Application-Based Systems
Title Encrypted images-based reversible data hiding in Paillier cryptosystem
URI https://link.springer.com/article/10.1007/s11042-019-07874-w
https://www.proquest.com/docview/2286045847
Volume 79
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwED90e9EHp1NxOiUPvmkkadqkfRxuY4iIoML2VNokxaF2Yx8M_3uTfqwq-qBPpbQN5Xp3v9xd73cA517iGRCKs6yNwq4mAgeuYFjwmCfK84TDbDfy4EHcDf1uz9LksHXqIn25KiuSmaOuet2o7SQhWc-NL1y82oS6wR7PKHe907sZ3K6LB9wrZtn6BBtApEWvzM-rfMWjapP5rS6awU2_8a8X3YWdYneJOrk67MGGTpvQKCc3oMKQm7D9iYZwH_q9VM7ep2bvicZvxr_MscU2hSy708yYzKtG9kdS9Dy2QIfGKbqPbJrGrJg9N8npoA_gqd97vB7gYr4ClsbwFlhxIQUTJGDK-C0uA18mMY1j5XJFIhbRIKaW_z0yQGqiOidWJjaJGDcnXJOIs0OopZNUHwFKHIckTEVUMelSR0eE6kQyzQSVShK_BRellMNpTqMRVoTJVmChEViYCSxctaBdfoiwMKl56Dg-z6u6LbgsJV9d_n2147_dfgJbjo2pszRLG2qL2VKfwuZcLc8KRbPH4WjU_QDXws6M
link.rule.ids 315,782,786,27933,27934,41073,42142,48344,48347,49649,49652,52153
linkProvider Springer Nature
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60PagH6xOrVXPwpoE8tsnusdiWirUIKrSnZTfJYkFX6YPivzfZh1XRgx73NSyTTL5JJt8XgLNm0rQgFGerNhp7hkgceJJjKWKR6GZTMu7YyL07ORj67Y6TyfFKLky2270sSWYj9ZLsRh2VhGSkG196eLEKVad2zipQbQ1Ho_ZH9cDeyw-z9Qm2iEgLsszPVr4C0jLL_FYYzfCmW_vfn27BZpFfolbeIbZhxaQ7UCvPbkBFKO_Axichwl3odlI1eXu12ScaP9sRZoodumnk9J0mNmieDHJbSdHj2EEdGqfoNnILNdZi9t1LLgi9Bw_dzv1lDxcnLGBlQ2-GtZBKckkCru3IJVTgqySmcaw9oUnEIxrE1CnARxZK7byOxdrOTiIu7IUwJBJ8HyrpS2oOACWMkYTriGquPMpMRKhJFDdcUqUV8etwXro5fM2FNMKlZLJzWGgdFmYOCxd1aJQtERZBNQ0Z80Ve163DRen55ePfrR3-7fVTWOvd3_TD_tXg-gjWmZthZ4suDajMJnNzDKtTPT8pet07FO7RDA
linkToPdf http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bS8MwFD7oBqIPTqfivObBNw0mTZt0j8OtbigycIJvpU1SHGg3dmH470162VT0QXwsbUI5ycmXnJPvOwAXXuIZEIqzqI3CriYCN13BsOAxT5TnCYdZNnL3UTw8--2OlclZsviz2-5lSjLnNFiVpnR2PVbJ9Yr4Ri2thGQEHF-4eLEOVRsWcytQbfUGt8Eyk8C9orCtT7BBR1oQZ37u5Ss4rXac35KkGfYEtf__9Q5sF_tO1Monyi6s6bQOtbKmAypcvA5bnwQK9yDopHLyPja7UjR8MyvPFFvUU8jqPk2MM71qZK-YopehhUA0TFE_sgEc02PWbpQLRe_DU9AZ3HRxUXkBS-OSM6y4kIIJ0mTKrGhcNn2ZxDSOlcsViVhEmzG1yvCRgVhz3nNiZU4tEePmgWsScXYAlXSU6kNAieOQhKmIKiZd6uiIUJ1IppmgUkniN-CyNHk4zgU2wpWUsjVYaAwWZgYLFw04KUclLJxtGjqOz_N8bwOuylFYvf69t6O_fX4OG_12EN73Hu6OYdOxB-8sFnMCldlkrk9hfarmZ8UE_ABjE9mj
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Encrypted+images-based+reversible+data+hiding+in+Paillier+cryptosystem&rft.jtitle=Multimedia+tools+and+applications&rft.au=Jiang%2C+Cuiling&rft.au=Pang%2C+Yilin&rft.date=2020-01-01&rft.pub=Springer+US&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=79&rft.issue=1-2&rft.spage=693&rft.epage=711&rft_id=info:doi/10.1007%2Fs11042-019-07874-w&rft.externalDocID=10_1007_s11042_019_07874_w
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon