Subarna Sen, A. Mukherjee, J. Mondal, Anil Saroliya
{"title":"加密域可逆数据隐藏的研究","authors":"Subarna Sen, A. Mukherjee, J. Mondal, Anil Saroliya","doi":"10.1109/ICONC345789.2020.9117341","DOIUrl":null,"url":null,"abstract":"Reversible Data Hiding (RDH) has proved itself to be the best technique for providing security to sensitive datasets. RDH provides confidentiality, preserves privacy of secret and personal data and ensures reversibility. Several working principles are adhered for different RDH techniques for encryption and data embedding, in the past two decades. RDH covers all the basics of a proper cryptographic algorithm, i.e. confidentiality, integrity and availability. Furthermore, it works better for sensitive images. Based on the working methodologies and implementation area RDH schemes can be categorically divided into 4 types: (i) RDH in compressed domain, (ii) RDH in spatial domain, (iii) RDH for contrast enhancement and (iv) RDH in encrypted domain. This work presents a survey on the some recent RDH mechanisms working on encrypted domain. RDH schemes achieve different outcomes based on the intension and implementation. This review, shows the different services that RDH provides and the best base-methodologies to achieve high security along with maximum reversibility.","PeriodicalId":155813,"journal":{"name":"2020 International Conference on Emerging Trends in Communication, Control and Computing (ICONC3)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Contemplator on Reversible Data Hiding in Encrypted Domain\",\"authors\":\"Subarna Sen, A. Mukherjee, J. Mondal, Anil Saroliya\",\"doi\":\"10.1109/ICONC345789.2020.9117341\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Reversible Data Hiding (RDH) has proved itself to be the best technique for providing security to sensitive datasets. RDH provides confidentiality, preserves privacy of secret and personal data and ensures reversibility. Several working principles are adhered for different RDH techniques for encryption and data embedding, in the past two decades. RDH covers all the basics of a proper cryptographic algorithm, i.e. confidentiality, integrity and availability. Furthermore, it works better for sensitive images. Based on the working methodologies and implementation area RDH schemes can be categorically divided into 4 types: (i) RDH in compressed domain, (ii) RDH in spatial domain, (iii) RDH for contrast enhancement and (iv) RDH in encrypted domain. This work presents a survey on the some recent RDH mechanisms working on encrypted domain. RDH schemes achieve different outcomes based on the intension and implementation. This review, shows the different services that RDH provides and the best base-methodologies to achieve high security along with maximum reversibility.\",\"PeriodicalId\":155813,\"journal\":{\"name\":\"2020 International Conference on Emerging Trends in Communication, Control and Computing (ICONC3)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Emerging Trends in Communication, Control and Computing (ICONC3)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICONC345789.2020.9117341\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Emerging Trends in Communication, Control and Computing (ICONC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICONC345789.2020.9117341","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Contemplator on Reversible Data Hiding in Encrypted Domain
Reversible Data Hiding (RDH) has proved itself to be the best technique for providing security to sensitive datasets. RDH provides confidentiality, preserves privacy of secret and personal data and ensures reversibility. Several working principles are adhered for different RDH techniques for encryption and data embedding, in the past two decades. RDH covers all the basics of a proper cryptographic algorithm, i.e. confidentiality, integrity and availability. Furthermore, it works better for sensitive images. Based on the working methodologies and implementation area RDH schemes can be categorically divided into 4 types: (i) RDH in compressed domain, (ii) RDH in spatial domain, (iii) RDH for contrast enhancement and (iv) RDH in encrypted domain. This work presents a survey on the some recent RDH mechanisms working on encrypted domain. RDH schemes achieve different outcomes based on the intension and implementation. This review, shows the different services that RDH provides and the best base-methodologies to achieve high security along with maximum reversibility.