Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing
Reversible data hiding in encrypted images (RDH-EI) is instrumental in image privacy protection and data embedding. However, conventional RDH-EI models, involving image providers, data hiders, and receivers, limit the number of data hiders to one, which restricts its applicability in scenarios requi...
Gespeichert in:
| Veröffentlicht in: | Sensors (Basel, Switzerland) Jg. 23; H. 10; S. 4865 |
|---|---|
| Hauptverfasser: | , , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Switzerland
MDPI AG
18.05.2023
MDPI |
| Schlagworte: | |
| ISSN: | 1424-8220, 1424-8220 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Reversible data hiding in encrypted images (RDH-EI) is instrumental in image privacy protection and data embedding. However, conventional RDH-EI models, involving image providers, data hiders, and receivers, limit the number of data hiders to one, which restricts its applicability in scenarios requiring multiple data embedders. Therefore, the need for an RDH-EI accommodating multiple data hiders, especially for copyright protection, has become crucial. Addressing this, we introduce the application of Pixel Value Order (PVO) technology to encrypted reversible data hiding, combined with the secret image sharing (SIS) scheme. This creates a novel scheme, PVO, Chaotic System, Secret Sharing-based Reversible Data Hiding in Encrypted Image (PCSRDH-EI), which satisfies the (k,n) threshold property. An image is partitioned into N shadow images, and reconstruction is feasible when at least k shadow images are available. This method enables separate data extraction and image decryption. Our scheme combines stream encryption, based on chaotic systems, with secret sharing, underpinned by the Chinese remainder theorem (CRT), ensuring secure secret sharing. Empirical tests show that PCSRDH-EI can reach a maximum embedding rate of 5.706 bpp, outperforming the state-of-the-art and demonstrating superior encryption effects. |
|---|---|
| AbstractList | Reversible data hiding in encrypted images (RDH-EI) is instrumental in image privacy protection and data embedding. However, conventional RDH-EI models, involving image providers, data hiders, and receivers, limit the number of data hiders to one, which restricts its applicability in scenarios requiring multiple data embedders. Therefore, the need for an RDH-EI accommodating multiple data hiders, especially for copyright protection, has become crucial. Addressing this, we introduce the application of Pixel Value Order (PVO) technology to encrypted reversible data hiding, combined with the secret image sharing (SIS) scheme. This creates a novel scheme, PVO, Chaotic System, Secret Sharing-based Reversible Data Hiding in Encrypted Image (PCSRDH-EI), which satisfies the (k,n) threshold property. An image is partitioned into N shadow images, and reconstruction is feasible when at least k shadow images are available. This method enables separate data extraction and image decryption. Our scheme combines stream encryption, based on chaotic systems, with secret sharing, underpinned by the Chinese remainder theorem (CRT), ensuring secure secret sharing. Empirical tests show that PCSRDH-EI can reach a maximum embedding rate of 5.706 bpp, outperforming the state-of-the-art and demonstrating superior encryption effects. Reversible data hiding in encrypted images (RDH-EI) is instrumental in image privacy protection and data embedding. However, conventional RDH-EI models, involving image providers, data hiders, and receivers, limit the number of data hiders to one, which restricts its applicability in scenarios requiring multiple data embedders. Therefore, the need for an RDH-EI accommodating multiple data hiders, especially for copyright protection, has become crucial. Addressing this, we introduce the application of Pixel Value Order (PVO) technology to encrypted reversible data hiding, combined with the secret image sharing (SIS) scheme. This creates a novel scheme, PVO, Chaotic System, Secret Sharing-based Reversible Data Hiding in Encrypted Image (PCSRDH-EI), which satisfies the (k,n) threshold property. An image is partitioned into shadow images, and reconstruction is feasible when at least shadow images are available. This method enables separate data extraction and image decryption. Our scheme combines stream encryption, based on chaotic systems, with secret sharing, underpinned by the Chinese remainder theorem (CRT), ensuring secure secret sharing. Empirical tests show that PCSRDH-EI can reach a maximum embedding rate of 5.706 bpp, outperforming the state-of-the-art and demonstrating superior encryption effects. Reversible data hiding in encrypted images (RDH-EI) is instrumental in image privacy protection and data embedding. However, conventional RDH-EI models, involving image providers, data hiders, and receivers, limit the number of data hiders to one, which restricts its applicability in scenarios requiring multiple data embedders. Therefore, the need for an RDH-EI accommodating multiple data hiders, especially for copyright protection, has become crucial. Addressing this, we introduce the application of Pixel Value Order (PVO) technology to encrypted reversible data hiding, combined with the secret image sharing (SIS) scheme. This creates a novel scheme, PVO, Chaotic System, Secret Sharing-based Reversible Data Hiding in Encrypted Image (PCSRDH-EI), which satisfies the (k,n) threshold property. An image is partitioned into N shadow images, and reconstruction is feasible when at least k shadow images are available. This method enables separate data extraction and image decryption. Our scheme combines stream encryption, based on chaotic systems, with secret sharing, underpinned by the Chinese remainder theorem (CRT), ensuring secure secret sharing. Empirical tests show that PCSRDH-EI can reach a maximum embedding rate of 5.706 bpp, outperforming the state-of-the-art and demonstrating superior encryption effects.Reversible data hiding in encrypted images (RDH-EI) is instrumental in image privacy protection and data embedding. However, conventional RDH-EI models, involving image providers, data hiders, and receivers, limit the number of data hiders to one, which restricts its applicability in scenarios requiring multiple data embedders. Therefore, the need for an RDH-EI accommodating multiple data hiders, especially for copyright protection, has become crucial. Addressing this, we introduce the application of Pixel Value Order (PVO) technology to encrypted reversible data hiding, combined with the secret image sharing (SIS) scheme. This creates a novel scheme, PVO, Chaotic System, Secret Sharing-based Reversible Data Hiding in Encrypted Image (PCSRDH-EI), which satisfies the (k,n) threshold property. An image is partitioned into N shadow images, and reconstruction is feasible when at least k shadow images are available. This method enables separate data extraction and image decryption. Our scheme combines stream encryption, based on chaotic systems, with secret sharing, underpinned by the Chinese remainder theorem (CRT), ensuring secure secret sharing. Empirical tests show that PCSRDH-EI can reach a maximum embedding rate of 5.706 bpp, outperforming the state-of-the-art and demonstrating superior encryption effects. |
| Audience | Academic |
| Author | Zhang, Junwei Yu, Haoyang Feng, Huamin Liu, Biao Xiang, Zixiao |
| AuthorAffiliation | 2 Beijing Electronic Science and Technology Institute, Beijing 100070, China 1 School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China 3 School of Cyber Engineering, Xidian University, Xi’an 710071, China |
| AuthorAffiliation_xml | – name: 3 School of Cyber Engineering, Xidian University, Xi’an 710071, China – name: 2 Beijing Electronic Science and Technology Institute, Beijing 100070, China – name: 1 School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China |
| Author_xml | – sequence: 1 givenname: Haoyang surname: Yu fullname: Yu, Haoyang – sequence: 2 givenname: Junwei orcidid: 0000-0002-6705-5511 surname: Zhang fullname: Zhang, Junwei – sequence: 3 givenname: Zixiao surname: Xiang fullname: Xiang, Zixiao – sequence: 4 givenname: Biao surname: Liu fullname: Liu, Biao – sequence: 5 givenname: Huamin surname: Feng fullname: Feng, Huamin |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/37430779$$D View this record in MEDLINE/PubMed |
| BookMark | eNptkk9vFCEYhyemxv7Rg1_AkHjRw7YMDAOcTK3VbrKmxqpXwsA7UzazsMJM43572W5dd5uGAwSe95l54XdcHPjgoShel_iUUonPEqElrkTNnhVHZUWqiSAEH-ysD4vjlOYYE0qpeFEcUl5RzLk8KlazkFIPKaHvcAcxuaYH9EkPGl0563yHnEeX3sTVcgCLpgvdAWpDRF_HfnDLHTbXoo86ZSh49M39gR790v0I6DrmM6S9RTdgIgzo5lbHbH5ZPG91n-DVw3xS_Px8-ePiajK7_jK9OJ9NDKN8mHDdUilKTrg0vARpJKmBmwZXvOWtxSXVjBEDtWXE6romDRW6bmVjGguSM3pSTDdeG_RcLaNb6LhSQTt1vxFip3QcnOlBGahEQy1rscYVLWvJs0bYBoCW2lCcXR82ruXYLMAa8EPU_Z50_8S7W9WFO1Vikp-hrrLh3YMhht8jpEEtXDLQ99pDGJMigtaCc8F4Rt8-QudhjD7fVaZKWQlCCftPdTp34Hwb8ofNWqrOOcNSMnL_46dPUHlYWDiT09S6vL9X8Ga3022L_5KTgfcbwMScoAjtFimxWqdSbVOZ2bNHrHGDHlxYX5Lrn6j4C6im4VU |
| CitedBy_id | crossref_primary_10_3390_app14135574 crossref_primary_10_1007_s10044_025_01536_4 |
| Cites_doi | 10.1016/j.bspc.2022.104001 10.1016/j.jvcir.2021.103060 10.3390/e21080815 10.1016/j.jvcir.2016.09.005 10.1109/ACCESS.2019.2916355 10.1109/TCSVT.2006.869964 10.1016/S0097-8493(02)00131-0 10.1109/LSP.2011.2114651 10.1016/j.jvcir.2014.04.003 10.1109/TCSVT.2003.815962 10.1109/TII.2022.3215192 10.1016/j.image.2019.115632 10.1109/TIFS.2018.2799381 10.1016/j.sigpro.2017.09.017 10.1109/TCSVT.2021.3081575 10.1109/TIFS.2019.2914557 10.1117/12.766754 10.1016/j.dcan.2022.05.012 10.1016/j.comcom.2020.08.008 10.1109/TCSVT.2019.2963393 10.3390/e25020209 10.1145/359168.359176 10.1109/TIP.2004.840686 10.1007/3-540-45496-9_21 10.1109/TIFS.2011.2176120 10.1016/j.jvcir.2018.05.002 10.1109/MWC.001.1900463 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2023 MDPI AG 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2023 by the authors. 2023 |
| Copyright_xml | – notice: COPYRIGHT 2023 MDPI AG – notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2023 by the authors. 2023 |
| DBID | AAYXX CITATION NPM 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU DWQXO FYUFA GHDGH K9. M0S M1P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQQKQ PQUKI PRINS 7X8 5PM DOA |
| DOI | 10.3390/s23104865 |
| DatabaseName | CrossRef PubMed ProQuest Central (Corporate) Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials - QC ProQuest Central ProQuest One ProQuest Central Korea Proquest Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) Health & Medical Collection (Alumni) Medical Database Proquest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef PubMed Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Central China ProQuest Central ProQuest Health & Medical Research Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Health & Medical Research Collection ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest One Academic Eastern Edition ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
| DatabaseTitleList | CrossRef PubMed Publicly Available Content Database MEDLINE - Academic |
| Database_xml | – sequence: 1 dbid: DOA name: Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1424-8220 |
| ExternalDocumentID | oai_doaj_org_article_ce48b3d5f0a04316979bc8dbee31ac30 PMC10222064 A750995230 37430779 10_3390_s23104865 |
| Genre | Journal Article |
| GeographicLocations | China |
| GeographicLocations_xml | – name: China |
| GrantInformation_xml | – fundername: NSFC-General Technology Fundamental Research Joint Fund grantid: U1836215 – fundername: National Nature Science Foundation of China grantid: 62102040 – fundername: Beijing Universities grantid: 20210071Z0403 – fundername: BUPT Excellent Ph.D. Students Foundation grantid: CX2021124 |
| GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFFHD AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE IAO ITC KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PJZUB PPXIY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M 3V. ABJCF ALIPV ARAPS HCIFZ KB. M7S NPM PDBOC 7XB 8FK AZQEC DWQXO K9. PKEHL PQEST PQUKI PRINS 7X8 PUEGO 5PM |
| ID | FETCH-LOGICAL-c537t-7af39817279c71e9c926e7cb047f7fd013a552ce6d52da662b38a6f9bcbde9753 |
| IEDL.DBID | BENPR |
| ISICitedReferencesCount | 4 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000996569700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1424-8220 |
| IngestDate | Mon Nov 10 04:32:02 EST 2025 Tue Nov 04 02:06:53 EST 2025 Thu Sep 04 17:47:25 EDT 2025 Tue Oct 07 07:39:34 EDT 2025 Tue Nov 11 07:50:51 EST 2025 Tue Nov 04 17:55:04 EST 2025 Wed Feb 19 02:22:13 EST 2025 Sat Nov 29 07:18:07 EST 2025 Tue Nov 18 22:39:55 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 10 |
| Keywords | secret sharing reversible data hiding in encrypted domain secure multi-party computing |
| Language | English |
| License | Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c537t-7af39817279c71e9c926e7cb047f7fd013a552ce6d52da662b38a6f9bcbde9753 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ORCID | 0000-0002-6705-5511 0000-0001-7317-726X |
| OpenAccessLink | https://www.proquest.com/docview/2819482325?pq-origsite=%requestingapplication% |
| PMID | 37430779 |
| PQID | 2819482325 |
| PQPubID | 2032333 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_ce48b3d5f0a04316979bc8dbee31ac30 pubmedcentral_primary_oai_pubmedcentral_nih_gov_10222064 proquest_miscellaneous_2836877857 proquest_journals_2819482325 gale_infotracmisc_A750995230 gale_infotracacademiconefile_A750995230 pubmed_primary_37430779 crossref_primary_10_3390_s23104865 crossref_citationtrail_10_3390_s23104865 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-05-18 |
| PublicationDateYYYYMMDD | 2023-05-18 |
| PublicationDate_xml | – month: 05 year: 2023 text: 2023-05-18 day: 18 |
| PublicationDecade | 2020 |
| PublicationPlace | Switzerland |
| PublicationPlace_xml | – name: Switzerland – name: Basel |
| PublicationTitle | Sensors (Basel, Switzerland) |
| PublicationTitleAlternate | Sensors (Basel) |
| PublicationYear | 2023 |
| Publisher | MDPI AG MDPI |
| Publisher_xml | – name: MDPI AG – name: MDPI |
| References | Ke (ref_24) 2021; 32 Celik (ref_4) 2005; 14 ref_12 Chen (ref_29) 2020; 19 Wu (ref_22) 2018; 143 ref_30 Thien (ref_20) 2002; 26 Huang (ref_14) 2020; 80 (ref_27) 2022; 78 Chen (ref_23) 2019; 14 Wu (ref_16) 2016; 41 Ke (ref_1) 2020; 30 Shamir (ref_21) 1979; 22 Puteaux (ref_10) 2018; 13 Chen (ref_8) 2021; 76 Chen (ref_15) 2014; 25 Xiong (ref_17) 2020; 27 Musanna (ref_26) 2020; 162 Wu (ref_11) 2019; 7 Zhang (ref_7) 2011; 7 Zhang (ref_5) 2011; 18 Ke (ref_13) 2018; 54 Ni (ref_2) 2006; 16 ref_28 ref_9 Zhou (ref_18) 2022; 19 Wang (ref_19) 2022; 8 Tian (ref_3) 2003; 13 Xiong (ref_25) 2022; 19 ref_6 |
| References_xml | – volume: 78 start-page: 104001 year: 2022 ident: ref_27 article-title: Multibiosignal chaotic encryption scheme based on spread spectrum and global diffusion process for e-health publication-title: Biomed. Signal Process. Control. doi: 10.1016/j.bspc.2022.104001 – volume: 76 start-page: 103060 year: 2021 ident: ref_8 article-title: High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels publication-title: J. Vis. Commun. Image Represent. doi: 10.1016/j.jvcir.2021.103060 – ident: ref_9 – ident: ref_28 doi: 10.3390/e21080815 – volume: 41 start-page: 58 year: 2016 ident: ref_16 article-title: Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer publication-title: J. Vis. Commun. Image Represent. doi: 10.1016/j.jvcir.2016.09.005 – volume: 7 start-page: 62361 year: 2019 ident: ref_11 article-title: High-capacity reversible data hiding in encrypted images by bit plane partition and MSB prediction publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2916355 – volume: 16 start-page: 354 year: 2006 ident: ref_2 article-title: Reversible data hiding publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2006.869964 – volume: 26 start-page: 765 year: 2002 ident: ref_20 article-title: Secret image sharing publication-title: Comput. Graph. doi: 10.1016/S0097-8493(02)00131-0 – volume: 18 start-page: 255 year: 2011 ident: ref_5 article-title: Reversible data hiding in encrypted image publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2011.2114651 – volume: 25 start-page: 1164 year: 2014 ident: ref_15 article-title: Encrypted signal-based reversible data hiding with public key cryptosystem publication-title: J. Vis. Commun. Image Represent. doi: 10.1016/j.jvcir.2014.04.003 – volume: 13 start-page: 890 year: 2003 ident: ref_3 article-title: Reversible data embedding using a difference expansion publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2003.815962 – volume: 19 start-page: 6669 year: 2022 ident: ref_18 article-title: Blockchain-enabled Secure and Trusted Federated Data Sharing in IIoT publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2022.3215192 – volume: 80 start-page: 115632 year: 2020 ident: ref_14 article-title: High-capacity reversible data hiding in encrypted image based on specific encryption process publication-title: Signal Process. Image Commun. doi: 10.1016/j.image.2019.115632 – volume: 13 start-page: 1670 year: 2018 ident: ref_10 article-title: An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2018.2799381 – volume: 143 start-page: 269 year: 2018 ident: ref_22 article-title: Adopting secret sharing for reversible data hiding in encrypted images publication-title: Signal Process. doi: 10.1016/j.sigpro.2017.09.017 – volume: 32 start-page: 2469 year: 2021 ident: ref_24 article-title: A reversible data hiding scheme in encrypted domain for secret image sharing based on Chinese remainder theorem publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2021.3081575 – volume: 14 start-page: 3332 year: 2019 ident: ref_23 article-title: A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2019.2914557 – ident: ref_6 doi: 10.1117/12.766754 – volume: 8 start-page: 644 year: 2022 ident: ref_19 article-title: Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT publication-title: Digit. Commun. Netw. doi: 10.1016/j.dcan.2022.05.012 – volume: 162 start-page: 12 year: 2020 ident: ref_26 article-title: Generating visually coherent encrypted images with reversible data hiding in wavelet domain by fusing chaos and pairing function publication-title: Comput. Commun. doi: 10.1016/j.comcom.2020.08.008 – volume: 30 start-page: 2353 year: 2020 ident: ref_1 article-title: Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2019.2963393 – ident: ref_30 doi: 10.3390/e25020209 – volume: 22 start-page: 612 year: 1979 ident: ref_21 article-title: How to share a secret publication-title: Commun. ACM doi: 10.1145/359168.359176 – volume: 14 start-page: 253 year: 2005 ident: ref_4 article-title: Lossless generalized-LSB data embedding publication-title: IEEE Trans. Image Process. doi: 10.1109/TIP.2004.840686 – ident: ref_12 doi: 10.1007/3-540-45496-9_21 – volume: 7 start-page: 826 year: 2011 ident: ref_7 article-title: Separable reversible data hiding in encrypted image publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2011.2176120 – volume: 54 start-page: 133 year: 2018 ident: ref_13 article-title: A multilevel reversible data hiding scheme in encrypted domain based on LWE publication-title: J. Vis. Commun. Image Represent. doi: 10.1016/j.jvcir.2018.05.002 – volume: 19 start-page: 1 year: 2022 ident: ref_25 article-title: RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers based on Secret Sharing publication-title: ACM Trans. Multimid. Comput. Commun. Appl. – volume: 27 start-page: 24 year: 2020 ident: ref_17 article-title: Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles publication-title: IEEE Wirel. Commun. doi: 10.1109/MWC.001.1900463 – volume: 19 start-page: 978 year: 2020 ident: ref_29 article-title: Secret sharing based reversible data hiding in encrypted images with multiple data-hiders publication-title: IEEE Trans. Dependable Secur. Comput. |
| SSID | ssj0023338 |
| Score | 2.424028 |
| Snippet | Reversible data hiding in encrypted images (RDH-EI) is instrumental in image privacy protection and data embedding. However, conventional RDH-EI models,... |
| SourceID | doaj pubmedcentral proquest gale pubmed crossref |
| SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
| StartPage | 4865 |
| SubjectTerms | Algorithms Copyright Efficiency Medical imaging equipment Privacy Privacy, Right of reversible data hiding in encrypted domain secret sharing secure multi-party computing |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELZQxQEOiDeBggxCgkvUjR3H9rGFVkWCUvFSb5HtjEWkJVvtZhH998wk2SgRSFy4xpONPQ_PN9nJZ8ZeRlVhBIWYauFEmgfpUqczSI0PIIsMQATTHTahz87MxYU9nxz1RT1hPT1wr7iDALnxslJx4YgHprDa-mAqDyAzF2RXrS-03RVTQ6klsfLqeYQkFvUHG0IxuaEMMsk-HUn_n1vxJBfN-yQniefkNrs1IEZ-2M_0DrsGzV12c8IjeI9dvceHLXHP4p-ga7PwS-BvXev4aU25idcNP27C-uoS8SV_9wP3EI5glX8YuglHWbyXH2Feq_iq4ef1L1jyb265Bf6RGDq5ayr-mXBmy4noGX_5Pvt6cvzlzWk6nKmQBiV1m2oXpTWEWmxAm9hgRQE6-EWuo44VAkKnlAhQVEpUriiEl8YVEXXuK6CPcB-wvWbVwCPGRRTKeERomYx55o33UvmoAAGh8ja3CXu903UZBsJxOvdiWWLhQWYpR7Mk7MUoetmzbPxN6IgMNgoQMXZ3Ad2lHNyl_Je7JOwVmbuk8MXJBDd8hYBLIiKs8pAQlKVX5Qnbn0li2IX58M5hyiHsNyX9K5kbBKk42efjMN1JrWwNrLYkIwujtVE6YQ97_xqXJBHPLbRG1ZmZ583WPB9p6u8dKXhXuSO-fPw_tPSE3RAYRNQlkZl9tteut_CUXQ8_23qzftaF2m-BFi9_ priority: 102 providerName: Directory of Open Access Journals |
| Title | Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/37430779 https://www.proquest.com/docview/2819482325 https://www.proquest.com/docview/2836877857 https://pubmed.ncbi.nlm.nih.gov/PMC10222064 https://doaj.org/article/ce48b3d5f0a04316979bc8dbee31ac30 |
| Volume | 23 |
| WOSCitedRecordID | wos000996569700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: Directory of Open Access Journals customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: DOA dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: M~E dateStart: 20010101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Health & Medical Collection customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: 7X7 dateStart: 20010101 isFulltext: true titleUrlDefault: https://search.proquest.com/healthcomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: BENPR dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: PIMPY dateStart: 20010101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lj9MwELbYXQ5w4L0QWCqDkOASbRPHsXNCW-hqV6KlWh4qp8h2HIgUktKmiL3w25lJ3dAIxIVLDvGksjvjmc-TyTeEPMt5BjvI5L4IVehHhilficD6UhvL4sDa0Mi22YSYTuV8nsxcwm3lyiq3PrF11FltMEd-jC98Ignxn79cfPOxaxS-XXUtNPbIATKVgZ0fjMbT2UV35GJwAtvwCTE43B-vEM1EEiPJThRqyfr_dMk7MalfL7kTgE5v_u_Ub5EbDnrSk42t3CZXbHWHXN8hJLxLLt_AbEtwfvTCtvUaurT0tWoUPSswyNGiouPKLC8XAFTp-VdwRhRQL524ssROFp6lIwiQGa0rOit-2JJ-VOXa0rdI9UlVldF3CFgbiozR8Mv3yIfT8ftXZ75rzuAbzkTjC5WzRCL8SQwoNzFJGFth9DASucgzQJaK89DYOONhpuI41EyqOE-00ZnFr3kPyX5VV_YBoWEecqkB6gUsjwIttWZc59wCsuQ6iRKPvNgqKzWOuRwbaJQpnGBQr2mnV4887UQXG7qOvwmNUOOdADJstzfq5efUbdjU2EhqlvF8qJB_KE4ETF1m2loWKMOGHnmO9pKiH4DJGOU-Z4AlIaNWeoJQLMGcu0eOepKwf01_eGs1qfMfq_S3yXjkSTeMT2JNXGXrNcqwWAohufDI_Y2BdktiAAyHQsBfJ3um21tzf6QqvrTs4m0KAIDqw3_P6xG5FsL-wkKKQB6R_Wa5to_JVfO9KVbLAdkTc9Fe5cDtyUGb7oDr5OcY7s3OJ7NPvwC440PH |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lj9MwELaWLhJw4P0ILGAQCC7RJnYcOweEdtldtdq2VLCg5RRsx4FKJS19AP1T_EZm0jQ0AnHbA9d4EtnOPD7b428IeZKLDCzI5r5kmvmR5drXMnS-MtbxOHSOWVUWm5D9vjo9TQZb5Of6LgymVa59Yumos7HFPfJdPPCJFMR_8XLy1ceqUXi6ui6hsVKLY7f8Dku22YvOAfzfp4wdHZ68avtVVQHfCi7nvtQ5TxTG7cRCrxKbsNhJa4JI5jLPABJpIZh1cSZYpuOYGa50nCfGmszhNVT47jmyHYGysxbZHnR6gw_1Eo_Dim_FX8R5EuzOED1FCiPXRtQriwP8GQI2YmAzP3Mj4B1d-d-m6iq5XEFrureyhWtkyxXXyaUNwsUbZNmF2RmBc6dvXJmPYkaOHui5pu0hBnE6LOhhYafLCQBx2vkCzpYCqqe9Ku2yloV36T4AgIyOCzoY_nAj-l6PFo6-RipTqouMvkVAPqfIiA1fvknencnYb5FWMS7cHUJZzoQyAGVDnkehUcZwYXLhADkLk0SJR56vlSO1FTM7FggZpbBCQz1Kaz3yyONadLKiI_mb0D5qWC2ADOLlg_H0U1o5pNS6SBmeiTzQyK8UJxK6rjLjHA-15YFHnqF-pujnoDNWV9c1YEjIGJbuIdRM8EzBIzsNSfBPttm81tK08o-z9LeKeuRR3YxvYs5f4cYLlOGxklIJ6ZHbK4Ooh8QB-AZSwtSphqk0xtxsKYafS_b0cosDgPjdf_frIbnQPul1026nf3yPXGRg25g0Eqod0ppPF-4-OW-_zYez6YPKB1Dy8axt6RcF7JvX |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lj9MwELaWXYTgwPsRWMAgEFyiNnYcOweEdulWW-2DCha0nILt2FCppKUPoH-NX8dMmoZGIG574FpPItudxzfx-BtCnniRgwVZH0qmWRhbrkMtIxcqYx1PIueYVWWzCXl8rE5P0_4G-bm6C4NllSufWDrqfGTxG3kLD3xiBfFftHxVFtHvdF-Ov4bYQQpPWlftNJYqcuAW3yF9m77odeC_fspYd-_k1X5YdRgIreByFkrteaowhqcWZpjalCVOWtOOpZc-B3ikhWDWJblguU4SZrjSiU-NNbnDK6nw3nNkCyA5h8Rvq9876n-o0z0O2d-Sy4jztN2aIpKKFUaxtQhYNgr4MxysxcNmreZa8Ote-Z-37Sq5XEFuurO0kWtkwxXXyaU1IsYbZHEIOzUEp0_fuLJOxQwd7eiZpvsDDO50UNC9wk4WYwDotPcFnDAFtE-PqnLMWhaepbsADHI6Kmh_8MMN6Xs9nDv6GilOqS5y-haB-owiUza8-SZ5dyZrv0U2i1Hh7hDKPBPKAMSNuI8jo4zhwnjhAFELk8ZpQJ6vFCWzFWM7Ng4ZZpC5oU5ltU4F5HEtOl7SlPxNaBe1rRZAZvHyh9HkU1Y5qsy6WBmeC9_WyLuUpBKmrnLjHI-05e2APENdzdD_wWSsrq5xwJKQSSzbQQia4llDQLYbkuC3bHN4pbFZ5Ten2W91DcijehifxFrAwo3mKMMTJaUSMiC3l8ZRL4kDIG5LCVunGmbTWHNzpBh8LlnVy08fANDv_nteD8kFMKDssHd8cI9cZGDmWEsSqW2yOZvM3X1y3n6bDaaTB5U7oOTjWZvSL4ebpKA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Lossless+Reversible+Data+Hiding+in+Encrypted+Image+for+Multiple+Data+Hiders+Based+on+Pixel+Value+Order+and+Secret+Sharing&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Yu%2C+Haoyang&rft.au=Zhang%2C+Junwei&rft.au=Xiang%2C+Zixiao&rft.au=Liu%2C+Biao&rft.date=2023-05-18&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=23&rft.issue=10&rft_id=info:doi/10.3390%2Fs23104865&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |