Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Complete Separable Reversible Data Hiding for Encrypted Digital Images Using Code Division Multiplexing with Versatile Bit Depth Management
by
Cedillo-Hernandez, Manuel
, Nakano-Miyatake, Mariko
, Perez-Meana, Hector
, Mata-Mendoza, David
, Nuñez-Ramirez, Diana
in
Algorithms
/ Code division multiplexing
/ complete separable reversible data hiding
/ digital image processing
/ Digital imaging
/ Domains
/ Electronic data processing
/ Encryption
/ image encryption
/ Image restoration
/ information security
/ Intellectual property
/ Methods
/ Multimedia
/ Pixels
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Complete Separable Reversible Data Hiding for Encrypted Digital Images Using Code Division Multiplexing with Versatile Bit Depth Management
by
Cedillo-Hernandez, Manuel
, Nakano-Miyatake, Mariko
, Perez-Meana, Hector
, Mata-Mendoza, David
, Nuñez-Ramirez, Diana
in
Algorithms
/ Code division multiplexing
/ complete separable reversible data hiding
/ digital image processing
/ Digital imaging
/ Domains
/ Electronic data processing
/ Encryption
/ image encryption
/ Image restoration
/ information security
/ Intellectual property
/ Methods
/ Multimedia
/ Pixels
2023
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Complete Separable Reversible Data Hiding for Encrypted Digital Images Using Code Division Multiplexing with Versatile Bit Depth Management
by
Cedillo-Hernandez, Manuel
, Nakano-Miyatake, Mariko
, Perez-Meana, Hector
, Mata-Mendoza, David
, Nuñez-Ramirez, Diana
in
Algorithms
/ Code division multiplexing
/ complete separable reversible data hiding
/ digital image processing
/ Digital imaging
/ Domains
/ Electronic data processing
/ Encryption
/ image encryption
/ Image restoration
/ information security
/ Intellectual property
/ Methods
/ Multimedia
/ Pixels
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Complete Separable Reversible Data Hiding for Encrypted Digital Images Using Code Division Multiplexing with Versatile Bit Depth Management
Journal Article
Complete Separable Reversible Data Hiding for Encrypted Digital Images Using Code Division Multiplexing with Versatile Bit Depth Management
2023
Request Book From Autostore
and Choose the Collection Method
Overview
A reversible data hiding in the encrypted domain (RDH-ED) aims to hide data within encrypted images, protecting its content, while allowing additional information to be distributed. This paper presents a complete separable RDH-ED scheme, whose main contribution is allowing the receiver to extract data and restore the image, either from the cryptogram with hidden data or from the directly decrypted version. With versatile bit-depth management, the most significant bits of each pixel are encrypted with AES-CTR cipher algorithm, while the additional data will be inserted inside the least significant bit planes of the encrypted pixels, by means of the code division multiplexing technique. Considering the marked/encrypted images, and encryption/data-hiding keys, a receiver could: (a) directly decrypt the encrypted image and obtain its approximate version, (b) extract the error-free hidden data, and (c) recover the data and original image. Considering an image approximation version and the data hiding key, a receiver could: (d) extract the hidden data from the plaintext domain, and (e) restore the image to its original state, while accessing the hidden data without any loss. Experimental results show the performance of the developed algorithm, evaluating the capacity and imperceptibility of the proposed scheme with respect to current state of the art.
Publisher
MDPI AG
Subject
MBRLCatalogueRelatedBooks
Related Items
Related Items
This website uses cookies to ensure you get the best experience on our website.