Residential Collegefalse
Status已發表Published
Adaptive image encryption for high capacity reversible data hiding
Choi K.-C.; Pun C.-M.
2017-10-18
Conference Name2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING
Source Publication2017 IEEE Conference on Dependable and Secure Computing
Pages429-432
Conference DateAugust 7—10, 2017
Conference PlaceTaipei, Taiwan
Abstract

In this paper, an adaptive image encryption method which achieves high capacity reversible data hiding is proposed. In the proposed encryption method, Burrow's-wheeler transform was applied before encrypting the given image. The resultant encrypted images are comparatively smoother and have higher spatial correlation, which allow high embedding rates. To preserve good visual quality for the approximate image obtained from direct decryption without watermark extraction, data hiding process are carried out block by block within the encrypted image and sorted-variance block embedding is adopted in watermark embedding procedure. In the experimental results, the reversibility of the proposed method is verified, and in comparison with state-of-the-art methods, a higher maximum embedding rate is obtained in the proposed method.

KeywordBurrow's-wheeler Transform Generalized Integer Transform Image Encryption Lossless Data Hiding
DOI10.1109/DESEC.2017.8073862
URLView the original
Indexed ByCPCI-S
Language英語English
WOS Research AreaComputer Science
WOS SubjectComputer Science, Theory & Methods
WOS IDWOS:000450296400058
Scopus ID2-s2.0-85039897358
Fulltext Access
Citation statistics
Document TypeConference paper
CollectionDEPARTMENT OF COMPUTER AND INFORMATION SCIENCE
Corresponding AuthorPun C.-M.
AffiliationUniversidade de Macau
First Author AffilicationUniversity of Macau
Corresponding Author AffilicationUniversity of Macau
Recommended Citation
GB/T 7714
Choi K.-C.,Pun C.-M.. Adaptive image encryption for high capacity reversible data hiding[C], 2017, 429-432.
APA Choi K.-C.., & Pun C.-M. (2017). Adaptive image encryption for high capacity reversible data hiding. 2017 IEEE Conference on Dependable and Secure Computing, 429-432.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Choi K.-C.]'s Articles
[Pun C.-M.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Choi K.-C.]'s Articles
[Pun C.-M.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Choi K.-C.]'s Articles
[Pun C.-M.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.