{"title":"基于汉明编码的图像可逆隐藏算法","authors":"Yi-Hui Chen, Pei-Yu Lin","doi":"10.1109/SNPD51163.2021.9704934","DOIUrl":null,"url":null,"abstract":"Cloud service is a convenient but insecure platform, which might suffer from the potential security risks, such as personal privacy leakage and illegal broadcasting. This paper proposed a reversible data embedding scheme in encrypted images using hamming coding. The sensitive data can be embedded into an encrypted image for privacy preserving. Later, the encrypted image can be restored back to the original one after extracting the hidden data. In comparison with schemes [1]-[5], the proposed scheme provides higher hiding capacity. The experiments show the positive result to confirm its feasibility.","PeriodicalId":235370,"journal":{"name":"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Integrated Hamming Coding Operation to Reversible Data Hiding Scheme for Encrypted Images\",\"authors\":\"Yi-Hui Chen, Pei-Yu Lin\",\"doi\":\"10.1109/SNPD51163.2021.9704934\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud service is a convenient but insecure platform, which might suffer from the potential security risks, such as personal privacy leakage and illegal broadcasting. This paper proposed a reversible data embedding scheme in encrypted images using hamming coding. The sensitive data can be embedded into an encrypted image for privacy preserving. Later, the encrypted image can be restored back to the original one after extracting the hidden data. In comparison with schemes [1]-[5], the proposed scheme provides higher hiding capacity. The experiments show the positive result to confirm its feasibility.\",\"PeriodicalId\":235370,\"journal\":{\"name\":\"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SNPD51163.2021.9704934\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SNPD51163.2021.9704934","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Integrated Hamming Coding Operation to Reversible Data Hiding Scheme for Encrypted Images
Cloud service is a convenient but insecure platform, which might suffer from the potential security risks, such as personal privacy leakage and illegal broadcasting. This paper proposed a reversible data embedding scheme in encrypted images using hamming coding. The sensitive data can be embedded into an encrypted image for privacy preserving. Later, the encrypted image can be restored back to the original one after extracting the hidden data. In comparison with schemes [1]-[5], the proposed scheme provides higher hiding capacity. The experiments show the positive result to confirm its feasibility.