Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing

Reversible data hiding in encrypted images (RDH-EI) is instrumental in image privacy protection and data embedding. However, conventional RDH-EI models, involving image providers, data hiders, and receivers, limit the number of data hiders to one, which restricts its applicability in scenarios requi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Sensors (Basel, Switzerland) Jg. 23; H. 10; S. 4865
Hauptverfasser: Yu, Haoyang, Zhang, Junwei, Xiang, Zixiao, Liu, Biao, Feng, Huamin
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Switzerland MDPI AG 18.05.2023
MDPI
Schlagworte:
ISSN:1424-8220, 1424-8220
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Reversible data hiding in encrypted images (RDH-EI) is instrumental in image privacy protection and data embedding. However, conventional RDH-EI models, involving image providers, data hiders, and receivers, limit the number of data hiders to one, which restricts its applicability in scenarios requiring multiple data embedders. Therefore, the need for an RDH-EI accommodating multiple data hiders, especially for copyright protection, has become crucial. Addressing this, we introduce the application of Pixel Value Order (PVO) technology to encrypted reversible data hiding, combined with the secret image sharing (SIS) scheme. This creates a novel scheme, PVO, Chaotic System, Secret Sharing-based Reversible Data Hiding in Encrypted Image (PCSRDH-EI), which satisfies the (k,n) threshold property. An image is partitioned into N shadow images, and reconstruction is feasible when at least k shadow images are available. This method enables separate data extraction and image decryption. Our scheme combines stream encryption, based on chaotic systems, with secret sharing, underpinned by the Chinese remainder theorem (CRT), ensuring secure secret sharing. Empirical tests show that PCSRDH-EI can reach a maximum embedding rate of 5.706 bpp, outperforming the state-of-the-art and demonstrating superior encryption effects.
AbstractList Reversible data hiding in encrypted images (RDH-EI) is instrumental in image privacy protection and data embedding. However, conventional RDH-EI models, involving image providers, data hiders, and receivers, limit the number of data hiders to one, which restricts its applicability in scenarios requiring multiple data embedders. Therefore, the need for an RDH-EI accommodating multiple data hiders, especially for copyright protection, has become crucial. Addressing this, we introduce the application of Pixel Value Order (PVO) technology to encrypted reversible data hiding, combined with the secret image sharing (SIS) scheme. This creates a novel scheme, PVO, Chaotic System, Secret Sharing-based Reversible Data Hiding in Encrypted Image (PCSRDH-EI), which satisfies the (k,n) threshold property. An image is partitioned into N shadow images, and reconstruction is feasible when at least k shadow images are available. This method enables separate data extraction and image decryption. Our scheme combines stream encryption, based on chaotic systems, with secret sharing, underpinned by the Chinese remainder theorem (CRT), ensuring secure secret sharing. Empirical tests show that PCSRDH-EI can reach a maximum embedding rate of 5.706 bpp, outperforming the state-of-the-art and demonstrating superior encryption effects.
Reversible data hiding in encrypted images (RDH-EI) is instrumental in image privacy protection and data embedding. However, conventional RDH-EI models, involving image providers, data hiders, and receivers, limit the number of data hiders to one, which restricts its applicability in scenarios requiring multiple data embedders. Therefore, the need for an RDH-EI accommodating multiple data hiders, especially for copyright protection, has become crucial. Addressing this, we introduce the application of Pixel Value Order (PVO) technology to encrypted reversible data hiding, combined with the secret image sharing (SIS) scheme. This creates a novel scheme, PVO, Chaotic System, Secret Sharing-based Reversible Data Hiding in Encrypted Image (PCSRDH-EI), which satisfies the (k,n) threshold property. An image is partitioned into shadow images, and reconstruction is feasible when at least shadow images are available. This method enables separate data extraction and image decryption. Our scheme combines stream encryption, based on chaotic systems, with secret sharing, underpinned by the Chinese remainder theorem (CRT), ensuring secure secret sharing. Empirical tests show that PCSRDH-EI can reach a maximum embedding rate of 5.706 bpp, outperforming the state-of-the-art and demonstrating superior encryption effects.
Reversible data hiding in encrypted images (RDH-EI) is instrumental in image privacy protection and data embedding. However, conventional RDH-EI models, involving image providers, data hiders, and receivers, limit the number of data hiders to one, which restricts its applicability in scenarios requiring multiple data embedders. Therefore, the need for an RDH-EI accommodating multiple data hiders, especially for copyright protection, has become crucial. Addressing this, we introduce the application of Pixel Value Order (PVO) technology to encrypted reversible data hiding, combined with the secret image sharing (SIS) scheme. This creates a novel scheme, PVO, Chaotic System, Secret Sharing-based Reversible Data Hiding in Encrypted Image (PCSRDH-EI), which satisfies the (k,n) threshold property. An image is partitioned into N shadow images, and reconstruction is feasible when at least k shadow images are available. This method enables separate data extraction and image decryption. Our scheme combines stream encryption, based on chaotic systems, with secret sharing, underpinned by the Chinese remainder theorem (CRT), ensuring secure secret sharing. Empirical tests show that PCSRDH-EI can reach a maximum embedding rate of 5.706 bpp, outperforming the state-of-the-art and demonstrating superior encryption effects.Reversible data hiding in encrypted images (RDH-EI) is instrumental in image privacy protection and data embedding. However, conventional RDH-EI models, involving image providers, data hiders, and receivers, limit the number of data hiders to one, which restricts its applicability in scenarios requiring multiple data embedders. Therefore, the need for an RDH-EI accommodating multiple data hiders, especially for copyright protection, has become crucial. Addressing this, we introduce the application of Pixel Value Order (PVO) technology to encrypted reversible data hiding, combined with the secret image sharing (SIS) scheme. This creates a novel scheme, PVO, Chaotic System, Secret Sharing-based Reversible Data Hiding in Encrypted Image (PCSRDH-EI), which satisfies the (k,n) threshold property. An image is partitioned into N shadow images, and reconstruction is feasible when at least k shadow images are available. This method enables separate data extraction and image decryption. Our scheme combines stream encryption, based on chaotic systems, with secret sharing, underpinned by the Chinese remainder theorem (CRT), ensuring secure secret sharing. Empirical tests show that PCSRDH-EI can reach a maximum embedding rate of 5.706 bpp, outperforming the state-of-the-art and demonstrating superior encryption effects.
Audience Academic
Author Zhang, Junwei
Yu, Haoyang
Feng, Huamin
Liu, Biao
Xiang, Zixiao
AuthorAffiliation 2 Beijing Electronic Science and Technology Institute, Beijing 100070, China
1 School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
3 School of Cyber Engineering, Xidian University, Xi’an 710071, China
AuthorAffiliation_xml – name: 3 School of Cyber Engineering, Xidian University, Xi’an 710071, China
– name: 2 Beijing Electronic Science and Technology Institute, Beijing 100070, China
– name: 1 School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
Author_xml – sequence: 1
  givenname: Haoyang
  surname: Yu
  fullname: Yu, Haoyang
– sequence: 2
  givenname: Junwei
  orcidid: 0000-0002-6705-5511
  surname: Zhang
  fullname: Zhang, Junwei
– sequence: 3
  givenname: Zixiao
  surname: Xiang
  fullname: Xiang, Zixiao
– sequence: 4
  givenname: Biao
  surname: Liu
  fullname: Liu, Biao
– sequence: 5
  givenname: Huamin
  surname: Feng
  fullname: Feng, Huamin
BackLink https://www.ncbi.nlm.nih.gov/pubmed/37430779$$D View this record in MEDLINE/PubMed
BookMark eNptkk9vFCEYhyemxv7Rg1_AkHjRw7YMDAOcTK3VbrKmxqpXwsA7UzazsMJM43572W5dd5uGAwSe95l54XdcHPjgoShel_iUUonPEqElrkTNnhVHZUWqiSAEH-ysD4vjlOYYE0qpeFEcUl5RzLk8KlazkFIPKaHvcAcxuaYH9EkPGl0563yHnEeX3sTVcgCLpgvdAWpDRF_HfnDLHTbXoo86ZSh49M39gR790v0I6DrmM6S9RTdgIgzo5lbHbH5ZPG91n-DVw3xS_Px8-ePiajK7_jK9OJ9NDKN8mHDdUilKTrg0vARpJKmBmwZXvOWtxSXVjBEDtWXE6romDRW6bmVjGguSM3pSTDdeG_RcLaNb6LhSQTt1vxFip3QcnOlBGahEQy1rscYVLWvJs0bYBoCW2lCcXR82ruXYLMAa8EPU_Z50_8S7W9WFO1Vikp-hrrLh3YMhht8jpEEtXDLQ99pDGJMigtaCc8F4Rt8-QudhjD7fVaZKWQlCCftPdTp34Hwb8ofNWqrOOcNSMnL_46dPUHlYWDiT09S6vL9X8Ga3022L_5KTgfcbwMScoAjtFimxWqdSbVOZ2bNHrHGDHlxYX5Lrn6j4C6im4VU
CitedBy_id crossref_primary_10_3390_app14135574
crossref_primary_10_1007_s10044_025_01536_4
Cites_doi 10.1016/j.bspc.2022.104001
10.1016/j.jvcir.2021.103060
10.3390/e21080815
10.1016/j.jvcir.2016.09.005
10.1109/ACCESS.2019.2916355
10.1109/TCSVT.2006.869964
10.1016/S0097-8493(02)00131-0
10.1109/LSP.2011.2114651
10.1016/j.jvcir.2014.04.003
10.1109/TCSVT.2003.815962
10.1109/TII.2022.3215192
10.1016/j.image.2019.115632
10.1109/TIFS.2018.2799381
10.1016/j.sigpro.2017.09.017
10.1109/TCSVT.2021.3081575
10.1109/TIFS.2019.2914557
10.1117/12.766754
10.1016/j.dcan.2022.05.012
10.1016/j.comcom.2020.08.008
10.1109/TCSVT.2019.2963393
10.3390/e25020209
10.1145/359168.359176
10.1109/TIP.2004.840686
10.1007/3-540-45496-9_21
10.1109/TIFS.2011.2176120
10.1016/j.jvcir.2018.05.002
10.1109/MWC.001.1900463
ContentType Journal Article
Copyright COPYRIGHT 2023 MDPI AG
2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2023 by the authors. 2023
Copyright_xml – notice: COPYRIGHT 2023 MDPI AG
– notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2023 by the authors. 2023
DBID AAYXX
CITATION
NPM
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
PRINS
7X8
5PM
DOA
DOI 10.3390/s23104865
DatabaseName CrossRef
PubMed
ProQuest Central (Corporate)
Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials - QC
ProQuest Central
ProQuest One
ProQuest Central Korea
Proquest Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
Health & Medical Collection (Alumni)
Medical Database
Proquest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central China
ProQuest Central
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList
CrossRef
PubMed
Publicly Available Content Database


MEDLINE - Academic
Database_xml – sequence: 1
  dbid: DOA
  name: Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_ce48b3d5f0a04316979bc8dbee31ac30
PMC10222064
A750995230
37430779
10_3390_s23104865
Genre Journal Article
GeographicLocations China
GeographicLocations_xml – name: China
GrantInformation_xml – fundername: NSFC-General Technology Fundamental Research Joint Fund
  grantid: U1836215
– fundername: National Nature Science Foundation of China
  grantid: 62102040
– fundername: Beijing Universities
  grantid: 20210071Z0403
– fundername: BUPT Excellent Ph.D. Students Foundation
  grantid: CX2021124
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFFHD
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IAO
ITC
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PJZUB
PPXIY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
3V.
ABJCF
ALIPV
ARAPS
HCIFZ
KB.
M7S
NPM
PDBOC
7XB
8FK
AZQEC
DWQXO
K9.
PKEHL
PQEST
PQUKI
PRINS
7X8
PUEGO
5PM
ID FETCH-LOGICAL-c537t-7af39817279c71e9c926e7cb047f7fd013a552ce6d52da662b38a6f9bcbde9753
IEDL.DBID BENPR
ISICitedReferencesCount 4
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000996569700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1424-8220
IngestDate Mon Nov 10 04:32:02 EST 2025
Tue Nov 04 02:06:53 EST 2025
Thu Sep 04 17:47:25 EDT 2025
Tue Oct 07 07:39:34 EDT 2025
Tue Nov 11 07:50:51 EST 2025
Tue Nov 04 17:55:04 EST 2025
Wed Feb 19 02:22:13 EST 2025
Sat Nov 29 07:18:07 EST 2025
Tue Nov 18 22:39:55 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 10
Keywords secret sharing
reversible data hiding in encrypted domain
secure multi-party computing
Language English
License Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c537t-7af39817279c71e9c926e7cb047f7fd013a552ce6d52da662b38a6f9bcbde9753
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0002-6705-5511
0000-0001-7317-726X
OpenAccessLink https://www.proquest.com/docview/2819482325?pq-origsite=%requestingapplication%
PMID 37430779
PQID 2819482325
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_ce48b3d5f0a04316979bc8dbee31ac30
pubmedcentral_primary_oai_pubmedcentral_nih_gov_10222064
proquest_miscellaneous_2836877857
proquest_journals_2819482325
gale_infotracmisc_A750995230
gale_infotracacademiconefile_A750995230
pubmed_primary_37430779
crossref_primary_10_3390_s23104865
crossref_citationtrail_10_3390_s23104865
PublicationCentury 2000
PublicationDate 2023-05-18
PublicationDateYYYYMMDD 2023-05-18
PublicationDate_xml – month: 05
  year: 2023
  text: 2023-05-18
  day: 18
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2023
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Ke (ref_24) 2021; 32
Celik (ref_4) 2005; 14
ref_12
Chen (ref_29) 2020; 19
Wu (ref_22) 2018; 143
ref_30
Thien (ref_20) 2002; 26
Huang (ref_14) 2020; 80
(ref_27) 2022; 78
Chen (ref_23) 2019; 14
Wu (ref_16) 2016; 41
Ke (ref_1) 2020; 30
Shamir (ref_21) 1979; 22
Puteaux (ref_10) 2018; 13
Chen (ref_8) 2021; 76
Chen (ref_15) 2014; 25
Xiong (ref_17) 2020; 27
Musanna (ref_26) 2020; 162
Wu (ref_11) 2019; 7
Zhang (ref_7) 2011; 7
Zhang (ref_5) 2011; 18
Ke (ref_13) 2018; 54
Ni (ref_2) 2006; 16
ref_28
ref_9
Zhou (ref_18) 2022; 19
Wang (ref_19) 2022; 8
Tian (ref_3) 2003; 13
Xiong (ref_25) 2022; 19
ref_6
References_xml – volume: 78
  start-page: 104001
  year: 2022
  ident: ref_27
  article-title: Multibiosignal chaotic encryption scheme based on spread spectrum and global diffusion process for e-health
  publication-title: Biomed. Signal Process. Control.
  doi: 10.1016/j.bspc.2022.104001
– volume: 76
  start-page: 103060
  year: 2021
  ident: ref_8
  article-title: High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels
  publication-title: J. Vis. Commun. Image Represent.
  doi: 10.1016/j.jvcir.2021.103060
– ident: ref_9
– ident: ref_28
  doi: 10.3390/e21080815
– volume: 41
  start-page: 58
  year: 2016
  ident: ref_16
  article-title: Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer
  publication-title: J. Vis. Commun. Image Represent.
  doi: 10.1016/j.jvcir.2016.09.005
– volume: 7
  start-page: 62361
  year: 2019
  ident: ref_11
  article-title: High-capacity reversible data hiding in encrypted images by bit plane partition and MSB prediction
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2916355
– volume: 16
  start-page: 354
  year: 2006
  ident: ref_2
  article-title: Reversible data hiding
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2006.869964
– volume: 26
  start-page: 765
  year: 2002
  ident: ref_20
  article-title: Secret image sharing
  publication-title: Comput. Graph.
  doi: 10.1016/S0097-8493(02)00131-0
– volume: 18
  start-page: 255
  year: 2011
  ident: ref_5
  article-title: Reversible data hiding in encrypted image
  publication-title: IEEE Signal Process. Lett.
  doi: 10.1109/LSP.2011.2114651
– volume: 25
  start-page: 1164
  year: 2014
  ident: ref_15
  article-title: Encrypted signal-based reversible data hiding with public key cryptosystem
  publication-title: J. Vis. Commun. Image Represent.
  doi: 10.1016/j.jvcir.2014.04.003
– volume: 13
  start-page: 890
  year: 2003
  ident: ref_3
  article-title: Reversible data embedding using a difference expansion
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2003.815962
– volume: 19
  start-page: 6669
  year: 2022
  ident: ref_18
  article-title: Blockchain-enabled Secure and Trusted Federated Data Sharing in IIoT
  publication-title: IEEE Trans. Ind. Inform.
  doi: 10.1109/TII.2022.3215192
– volume: 80
  start-page: 115632
  year: 2020
  ident: ref_14
  article-title: High-capacity reversible data hiding in encrypted image based on specific encryption process
  publication-title: Signal Process. Image Commun.
  doi: 10.1016/j.image.2019.115632
– volume: 13
  start-page: 1670
  year: 2018
  ident: ref_10
  article-title: An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2018.2799381
– volume: 143
  start-page: 269
  year: 2018
  ident: ref_22
  article-title: Adopting secret sharing for reversible data hiding in encrypted images
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2017.09.017
– volume: 32
  start-page: 2469
  year: 2021
  ident: ref_24
  article-title: A reversible data hiding scheme in encrypted domain for secret image sharing based on Chinese remainder theorem
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2021.3081575
– volume: 14
  start-page: 3332
  year: 2019
  ident: ref_23
  article-title: A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2019.2914557
– ident: ref_6
  doi: 10.1117/12.766754
– volume: 8
  start-page: 644
  year: 2022
  ident: ref_19
  article-title: Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT
  publication-title: Digit. Commun. Netw.
  doi: 10.1016/j.dcan.2022.05.012
– volume: 162
  start-page: 12
  year: 2020
  ident: ref_26
  article-title: Generating visually coherent encrypted images with reversible data hiding in wavelet domain by fusing chaos and pairing function
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2020.08.008
– volume: 30
  start-page: 2353
  year: 2020
  ident: ref_1
  article-title: Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2019.2963393
– ident: ref_30
  doi: 10.3390/e25020209
– volume: 22
  start-page: 612
  year: 1979
  ident: ref_21
  article-title: How to share a secret
  publication-title: Commun. ACM
  doi: 10.1145/359168.359176
– volume: 14
  start-page: 253
  year: 2005
  ident: ref_4
  article-title: Lossless generalized-LSB data embedding
  publication-title: IEEE Trans. Image Process.
  doi: 10.1109/TIP.2004.840686
– ident: ref_12
  doi: 10.1007/3-540-45496-9_21
– volume: 7
  start-page: 826
  year: 2011
  ident: ref_7
  article-title: Separable reversible data hiding in encrypted image
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2011.2176120
– volume: 54
  start-page: 133
  year: 2018
  ident: ref_13
  article-title: A multilevel reversible data hiding scheme in encrypted domain based on LWE
  publication-title: J. Vis. Commun. Image Represent.
  doi: 10.1016/j.jvcir.2018.05.002
– volume: 19
  start-page: 1
  year: 2022
  ident: ref_25
  article-title: RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers based on Secret Sharing
  publication-title: ACM Trans. Multimid. Comput. Commun. Appl.
– volume: 27
  start-page: 24
  year: 2020
  ident: ref_17
  article-title: Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles
  publication-title: IEEE Wirel. Commun.
  doi: 10.1109/MWC.001.1900463
– volume: 19
  start-page: 978
  year: 2020
  ident: ref_29
  article-title: Secret sharing based reversible data hiding in encrypted images with multiple data-hiders
  publication-title: IEEE Trans. Dependable Secur. Comput.
SSID ssj0023338
Score 2.424028
Snippet Reversible data hiding in encrypted images (RDH-EI) is instrumental in image privacy protection and data embedding. However, conventional RDH-EI models,...
SourceID doaj
pubmedcentral
proquest
gale
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 4865
SubjectTerms Algorithms
Copyright
Efficiency
Medical imaging equipment
Privacy
Privacy, Right of
reversible data hiding in encrypted domain
secret sharing
secure multi-party computing
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELZQxQEOiDeBggxCgkvUjR3H9rGFVkWCUvFSb5HtjEWkJVvtZhH998wk2SgRSFy4xpONPQ_PN9nJZ8ZeRlVhBIWYauFEmgfpUqczSI0PIIsMQATTHTahz87MxYU9nxz1RT1hPT1wr7iDALnxslJx4YgHprDa-mAqDyAzF2RXrS-03RVTQ6klsfLqeYQkFvUHG0IxuaEMMsk-HUn_n1vxJBfN-yQniefkNrs1IEZ-2M_0DrsGzV12c8IjeI9dvceHLXHP4p-ga7PwS-BvXev4aU25idcNP27C-uoS8SV_9wP3EI5glX8YuglHWbyXH2Feq_iq4ef1L1jyb265Bf6RGDq5ayr-mXBmy4noGX_5Pvt6cvzlzWk6nKmQBiV1m2oXpTWEWmxAm9hgRQE6-EWuo44VAkKnlAhQVEpUriiEl8YVEXXuK6CPcB-wvWbVwCPGRRTKeERomYx55o33UvmoAAGh8ja3CXu903UZBsJxOvdiWWLhQWYpR7Mk7MUoetmzbPxN6IgMNgoQMXZ3Ad2lHNyl_Je7JOwVmbuk8MXJBDd8hYBLIiKs8pAQlKVX5Qnbn0li2IX58M5hyiHsNyX9K5kbBKk42efjMN1JrWwNrLYkIwujtVE6YQ97_xqXJBHPLbRG1ZmZ583WPB9p6u8dKXhXuSO-fPw_tPSE3RAYRNQlkZl9tteut_CUXQ8_23qzftaF2m-BFi9_
  priority: 102
  providerName: Directory of Open Access Journals
Title Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing
URI https://www.ncbi.nlm.nih.gov/pubmed/37430779
https://www.proquest.com/docview/2819482325
https://www.proquest.com/docview/2836877857
https://pubmed.ncbi.nlm.nih.gov/PMC10222064
https://doaj.org/article/ce48b3d5f0a04316979bc8dbee31ac30
Volume 23
WOSCitedRecordID wos000996569700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: Directory of Open Access Journals
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: DOA
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: M~E
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Health & Medical Collection
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: 7X7
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthcomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: BENPR
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: PIMPY
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lj9MwELbYXQ5w4L0QWCqDkOASbRPHsXNCW-hqV6KlWh4qp8h2HIgUktKmiL3w25lJ3dAIxIVLDvGksjvjmc-TyTeEPMt5BjvI5L4IVehHhilficD6UhvL4sDa0Mi22YSYTuV8nsxcwm3lyiq3PrF11FltMEd-jC98Ignxn79cfPOxaxS-XXUtNPbIATKVgZ0fjMbT2UV35GJwAtvwCTE43B-vEM1EEiPJThRqyfr_dMk7MalfL7kTgE5v_u_Ub5EbDnrSk42t3CZXbHWHXN8hJLxLLt_AbEtwfvTCtvUaurT0tWoUPSswyNGiouPKLC8XAFTp-VdwRhRQL524ssROFp6lIwiQGa0rOit-2JJ-VOXa0rdI9UlVldF3CFgbiozR8Mv3yIfT8ftXZ75rzuAbzkTjC5WzRCL8SQwoNzFJGFth9DASucgzQJaK89DYOONhpuI41EyqOE-00ZnFr3kPyX5VV_YBoWEecqkB6gUsjwIttWZc59wCsuQ6iRKPvNgqKzWOuRwbaJQpnGBQr2mnV4887UQXG7qOvwmNUOOdADJstzfq5efUbdjU2EhqlvF8qJB_KE4ETF1m2loWKMOGHnmO9pKiH4DJGOU-Z4AlIaNWeoJQLMGcu0eOepKwf01_eGs1qfMfq_S3yXjkSTeMT2JNXGXrNcqwWAohufDI_Y2BdktiAAyHQsBfJ3um21tzf6QqvrTs4m0KAIDqw3_P6xG5FsL-wkKKQB6R_Wa5to_JVfO9KVbLAdkTc9Fe5cDtyUGb7oDr5OcY7s3OJ7NPvwC440PH
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lj9MwELaWLhJw4P0ILGAQCC7RJnYcOweEdtldtdq2VLCg5RRsx4FKJS19AP1T_EZm0jQ0AnHbA9d4EtnOPD7b428IeZKLDCzI5r5kmvmR5drXMnS-MtbxOHSOWVUWm5D9vjo9TQZb5Of6LgymVa59Yumos7HFPfJdPPCJFMR_8XLy1ceqUXi6ui6hsVKLY7f8Dku22YvOAfzfp4wdHZ68avtVVQHfCi7nvtQ5TxTG7cRCrxKbsNhJa4JI5jLPABJpIZh1cSZYpuOYGa50nCfGmszhNVT47jmyHYGysxbZHnR6gw_1Eo_Dim_FX8R5EuzOED1FCiPXRtQriwP8GQI2YmAzP3Mj4B1d-d-m6iq5XEFrureyhWtkyxXXyaUNwsUbZNmF2RmBc6dvXJmPYkaOHui5pu0hBnE6LOhhYafLCQBx2vkCzpYCqqe9Ku2yloV36T4AgIyOCzoY_nAj-l6PFo6-RipTqouMvkVAPqfIiA1fvknencnYb5FWMS7cHUJZzoQyAGVDnkehUcZwYXLhADkLk0SJR56vlSO1FTM7FggZpbBCQz1Kaz3yyONadLKiI_mb0D5qWC2ADOLlg_H0U1o5pNS6SBmeiTzQyK8UJxK6rjLjHA-15YFHnqF-pujnoDNWV9c1YEjIGJbuIdRM8EzBIzsNSfBPttm81tK08o-z9LeKeuRR3YxvYs5f4cYLlOGxklIJ6ZHbK4Ooh8QB-AZSwtSphqk0xtxsKYafS_b0cosDgPjdf_frIbnQPul1026nf3yPXGRg25g0Eqod0ppPF-4-OW-_zYez6YPKB1Dy8axt6RcF7JvX
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lj9MwELaWXYTgwPsRWMAgEFyiNnYcOweEdulWW-2DCha0nILt2FCppKUPoH-NX8dMmoZGIG574FpPItudxzfx-BtCnniRgwVZH0qmWRhbrkMtIxcqYx1PIueYVWWzCXl8rE5P0_4G-bm6C4NllSufWDrqfGTxG3kLD3xiBfFftHxVFtHvdF-Ov4bYQQpPWlftNJYqcuAW3yF9m77odeC_fspYd-_k1X5YdRgIreByFkrteaowhqcWZpjalCVOWtOOpZc-B3ikhWDWJblguU4SZrjSiU-NNbnDK6nw3nNkCyA5h8Rvq9876n-o0z0O2d-Sy4jztN2aIpKKFUaxtQhYNgr4MxysxcNmreZa8Ote-Z-37Sq5XEFuurO0kWtkwxXXyaU1IsYbZHEIOzUEp0_fuLJOxQwd7eiZpvsDDO50UNC9wk4WYwDotPcFnDAFtE-PqnLMWhaepbsADHI6Kmh_8MMN6Xs9nDv6GilOqS5y-haB-owiUza8-SZ5dyZrv0U2i1Hh7hDKPBPKAMSNuI8jo4zhwnjhAFELk8ZpQJ6vFCWzFWM7Ng4ZZpC5oU5ltU4F5HEtOl7SlPxNaBe1rRZAZvHyh9HkU1Y5qsy6WBmeC9_WyLuUpBKmrnLjHI-05e2APENdzdD_wWSsrq5xwJKQSSzbQQia4llDQLYbkuC3bHN4pbFZ5Ten2W91DcijehifxFrAwo3mKMMTJaUSMiC3l8ZRL4kDIG5LCVunGmbTWHNzpBh8LlnVy08fANDv_nteD8kFMKDssHd8cI9cZGDmWEsSqW2yOZvM3X1y3n6bDaaTB5U7oOTjWZvSL4ebpKA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Lossless+Reversible+Data+Hiding+in+Encrypted+Image+for+Multiple+Data+Hiders+Based+on+Pixel+Value+Order+and+Secret+Sharing&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Yu%2C+Haoyang&rft.au=Zhang%2C+Junwei&rft.au=Xiang%2C+Zixiao&rft.au=Liu%2C+Biao&rft.date=2023-05-18&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=23&rft.issue=10&rft_id=info:doi/10.3390%2Fs23104865&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon