{"title":"Reversible data hiding in encrypted images with auxiliary syndrome","authors":"Jiang Yu, Wen Si, Fenyong Li","doi":"10.1109/ISPACS.2017.8266480","DOIUrl":null,"url":null,"abstract":"This paper presents a novel data hiding scheme combing reversible, encryption mechanism and auxiliary syndrome. An original plain image is segmented into two parts. Then, with the aid of histogram shifting, the auxiliary syndrome generated from the first part subimage is embedded into the second part of the original uncompressed image and the encoded image is encrypted using an encryption key. After image encoding and encryption, message is embedded into the first subimage of cipher image and every pixel can load a bit of secret message. At the receiver side, using the encryption key and extracted auxiliary syndrome, the embedded data can be successfully extracted and the original image can be perfectly recovered.","PeriodicalId":166414,"journal":{"name":"2017 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPACS.2017.8266480","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper presents a novel data hiding scheme combing reversible, encryption mechanism and auxiliary syndrome. An original plain image is segmented into two parts. Then, with the aid of histogram shifting, the auxiliary syndrome generated from the first part subimage is embedded into the second part of the original uncompressed image and the encoded image is encrypted using an encryption key. After image encoding and encryption, message is embedded into the first subimage of cipher image and every pixel can load a bit of secret message. At the receiver side, using the encryption key and extracted auxiliary syndrome, the embedded data can be successfully extracted and the original image can be perfectly recovered.