Paper
22 February 2023 Reversible data hiding in encrypted domain based on color image channel correlation
Yu Ge, Minqing Zhang, Pan Yang
Author Affiliations +
Proceedings Volume 12587, Third International Seminar on Artificial Intelligence, Networking, and Information Technology (AINIT 2022); 125871B (2023) https://doi.org/10.1117/12.2667346
Event: Third International Seminar on Artificial Intelligence, Networking, and Information Technology (AINIT 2022), 2022, Shanghai, China
Abstract
Nowadays, due to the increasing need for cloud storage and cloud computing services, digital images need to be kept confidential in order to secure the privacy of individuals' information. Since the currently available codomain reversible data masking techniques are based on gray images, this paper introduces a data masking approach using color image channel correlation to achieve codomain reversibility. In the encryption stage, the security and homomorphism of encryption are achieved through XOR encryption and block scrambling. The data hiding processed by making full use of the texture information data of the reference channel to predict the pixel data more accurately, and an adaptive prediction error expansion technique is used to embed the encrypted information into the R, G, and B channels. The experimental results prove that the method has better security and better performance than the existing algorithms.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yu Ge, Minqing Zhang, and Pan Yang "Reversible data hiding in encrypted domain based on color image channel correlation", Proc. SPIE 12587, Third International Seminar on Artificial Intelligence, Networking, and Information Technology (AINIT 2022), 125871B (22 February 2023); https://doi.org/10.1117/12.2667346
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data hiding

Image encryption

Distortion

Electrocardiography

Histograms

Computer security

Information security

Back to Top