Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (44)
  • Open Access

    ARTICLE

    Reversible Data Hiding in Classification-Scrambling Encrypted-Image Based on Iterative Recovery

    Yuyu Chen1, Bangxu Yin2, Hongjie He2, Shu Yan2, Fan Chen2,*, Hengming Tai3

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 299-312, 2018, DOI:10.3970/cmc.2018.03179

    Abstract To improve the security and quality of decrypted images, this work proposes a reversible data hiding in encrypted image based on iterative recovery. The encrypted image is firstly generated by the pixel classification scrambling and bit-wise exclusive-OR (XOR), which improves the security of encrypted images. And then, a pixel-type-mark generation method based on block-compression is designed to reduce the extra burden of key management and transfer. At last, an iterative recovery strategy is proposed to optimize the marked decrypted image, which allows the original image to be obtained only using the encryption key. The proposed More >

  • Open Access

    ARTICLE

    On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing

    Lizhi Xiong1,*, Yunqing Shi2

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 523-539, 2018, DOI:10.3970/cmc.2018.01791

    Abstract Advanced cloud computing technology provides cost saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. In this paper, two reversible data hiding… More >

  • Open Access

    ARTICLE

    Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification

    Yang Du1, Zhaoxia Yin1,2,*, Xinpeng Zhang3

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 495-507, 2018, DOI:10.3970/cmc.2018.02440

    Abstract This paper proposes a lossless and high payload data hiding scheme for JPEG images by histogram modification. The most in JPEG bitstream consists of a sequence of VLCs (variable length codes) and the appended bits. Each VLC has a corresponding RLV (run/length value) to record the AC/DC coefficients. To achieve lossless data hiding with high payload, we shift the histogram of VLCs and modify the DHT segment to embed data. Since we sort the histogram of VLCs in descending order, the filesize expansion is limited. The paper’s key contribution includes: Lossless data hiding, less filesize More >

  • Open Access

    ARTICLE

    Watermark Embedding for Direct Binary Searched Halftone Images by Adopting Visual Cryptography

    Yangyang Wang1, Rongrong Ni1,*, Yao Zhao1, Min Xian2

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 255-265, 2018, DOI:10.3970/cmc.2018.01732

    Abstract In this paper, two methods are proposed to embed visual watermark into direct binary search (DBS) halftone images, which are called Adjusted Direct Binary Search (ADBS) and Dual Adjusted Direct Binary Search (DADBS). DADBS is an improved version of ADBS. By using the proposed methods, the visual watermark will be embedded into two halftone images separately, thus, the watermark can be revealed when these two halftone images are overlaid. Experimental results show that both methods can achieve excellent image visual quality and decoded visual patterns. More >

Displaying 41-50 on page 5 of 44. Per Page