{"title":"Integrated Hamming Coding Operation to Reversible Data Hiding Scheme for Encrypted Images","authors":"Yi-Hui Chen, Pei-Yu Lin","doi":"10.1109/SNPD51163.2021.9704934","DOIUrl":null,"url":null,"abstract":"Cloud service is a convenient but insecure platform, which might suffer from the potential security risks, such as personal privacy leakage and illegal broadcasting. This paper proposed a reversible data embedding scheme in encrypted images using hamming coding. The sensitive data can be embedded into an encrypted image for privacy preserving. Later, the encrypted image can be restored back to the original one after extracting the hidden data. In comparison with schemes [1]-[5], the proposed scheme provides higher hiding capacity. The experiments show the positive result to confirm its feasibility.","PeriodicalId":235370,"journal":{"name":"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SNPD51163.2021.9704934","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Cloud service is a convenient but insecure platform, which might suffer from the potential security risks, such as personal privacy leakage and illegal broadcasting. This paper proposed a reversible data embedding scheme in encrypted images using hamming coding. The sensitive data can be embedded into an encrypted image for privacy preserving. Later, the encrypted image can be restored back to the original one after extracting the hidden data. In comparison with schemes [1]-[5], the proposed scheme provides higher hiding capacity. The experiments show the positive result to confirm its feasibility.