4.6 Article

Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

Blockchain-Enabled Secure and Trusted Federated Data Sharing in IIoT

Zhou Zhou et al.

Summary: Federated learning breaks down data silos and promotes the intelligence of the Industrial Internet of Things (IIoT). However, the principal-agent architecture commonly used in federated learning not only increases the cost but also fails to take into account the privacy protection and trustworthiness of flexible on-demand data sharing. To tackle the above challenges, we propose a secure and trusted federated data sharing (STFS) based on blockchain. Initially, we construct an autonomous and reliable federated extreme gradient boosting learning algorithm to crack the data isolation problem, providing privacy protection and verifiability. Furthermore, we design a secure and trusted data sharing and trading mechanism to ensure secure on-demand controlled data sharing and fair trading. Finally, the security of STFS is proved based on the universal composable theory. The results of ample experimental simulations demonstrate the good effectiveness and performance of STFS for IIoT applications.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Physics, Multidisciplinary

Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm

Chi-Yao Weng et al.

Summary: This paper proposes an RDHEI technique based on Shamir's Secret Sharing technique and multi-project construction technique, which allows the hiding of pixel values in the coefficients of a polynomial and the substitution of a secret key using Shamir's Secret Sharing technology. The experimental results demonstrate that our approach has a multi-hider mechanism and fixed embedding rate.

ENTROPY (2023)

Article Engineering, Electrical & Electronic

A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem

Yan Ke et al.

Summary: This paper proposes a reversible data hiding scheme for secret image sharing based on the Chinese remainder theorem, which provides security guarantees for multi-party scenarios. The scheme allows additional data to be embedded into image shares and supports data extraction from both the shares and the reconstructed image. Experimental results demonstrate that the proposed scheme outperforms existing RDH-ED algorithms in terms of security, threshold function, reversibility, and efficiency.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2022)

Article Engineering, Biomedical

Multibiosignal chaotic encryption scheme based on spread spectrum and global diffusion process for e-health

M. A. Murillo-Escobar et al.

Summary: E-health offers convenient remote health services for patients, but faces security risks like data privacy. This paper proposes using chaos-based technology to enhance security and efficiency in monitoring multiple biosignals for e-health applications.

BIOMEDICAL SIGNAL PROCESSING AND CONTROL (2022)

Article Telecommunications

Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT

Linjie Wang et al.

Summary: This paper proposes a reliable and anti-collusion outsourcing computation and verification protocol, which addresses the issue of centralized storage with distributed storage solutions and uses homomorphic encryption to protect data privacy. By embedding outsourcing computation results and a novel polynomial factorization algorithm into a smart contract, the protocol enables verification without a trusted third party and resists collusion attacks. Theoretical analysis and experimental evaluation show that the proposed protocol is secure, reliable, and more effective than existing approaches.

DIGITAL COMMUNICATIONS AND NETWORKS (2022)

Article Computer Science, Information Systems

High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels

Chih-Cheng Chen et al.

Summary: This paper proposes a new reversible data hiding method in encrypted images, using Huffman coding to compress the high nibbles of adjacent pixels for creating a large-room capacity. Experimental results show that the proposed method achieves a higher embedding rate and better visual quality of the marked decrypted image compared to other related methods.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2021)

Article Engineering, Electrical & Electronic

High-capacity reversible data hiding in encrypted image based on specific encryption process

Delu Huang et al.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2020)

Article Computer Science, Information Systems

Generating visually coherent encrypted images with reversible data hiding in wavelet domain by fusing chaos and pairing function

Farhan Musanna et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Hardware & Architecture

Edge-Assisted Privacy-Preserving Raw Data Sharing Framework for Connected Autonomous Vehicles

Jinbo Xiong et al.

IEEE WIRELESS COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain

Yan Ke et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2020)

Article Physics, Multidisciplinary

Suggested Integral Analysis for Chaos-Based Image Cryptosystems

Miguel Angel Murillo-Escobar et al.

ENTROPY (2019)

Article Computer Science, Theory & Methods

A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms

Yu-Chi Chen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

High-Capacity Reversible Data Hiding in Encrypted Images by Bit Plane Partition and MSB Prediction

Hao-Tian Wu et al.

IEEE ACCESS (2019)

Article Computer Science, Theory & Methods

An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images

Pauline Puteaux et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

A multilevel reversible data hiding scheme in encrypted domain based on LWE

Yan Ke et al.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2018)

Article Engineering, Electrical & Electronic

Adopting secret sharing for reversible data hiding in encrypted images

Xiaotian Wu et al.

SIGNAL PROCESSING (2018)

Article Computer Science, Information Systems

Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer

Xiaotian Wu et al.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2016)

Article Computer Science, Information Systems

Encrypted signal-based reversible data hiding with public key cryptosystem

Yu-Chi Chen et al.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2014)

Article Computer Science, Theory & Methods

Separable Reversible Data Hiding in Encrypted Image

Xinpeng Zhang

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Engineering, Electrical & Electronic

Reversible Data Hiding in Encrypted Image

Xinpeng Zhang

IEEE SIGNAL PROCESSING LETTERS (2011)

Article Engineering, Electrical & Electronic

Reversible data hiding

ZC Ni et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2006)

Article Computer Science, Artificial Intelligence

Lossless generalized-LSB data embedding

MU Celik et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2005)

Article Engineering, Electrical & Electronic

Reversible data embedding using a difference expansion

J Tian

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2003)