General secure encryption algorithm for separable reversible data hiding in encrypted domain

The separable reversible data hiding in encrypted domain (RDH-ED) algorithm leaves out the embedding space for the information before or after encryption and makes the operation of extracting the information and restoring the image not interfere with each other. The encryption method employed not on...

Full description

Saved in:
Bibliographic Details
Published inJournal of King Saud University. Computer and information sciences Vol. 36; no. 9; p. 102217
Main Authors Wan, Hongli, Zhang, Minqing, Ke, Yan, Jiang, Zongbao, Di, Fuqiang
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.11.2024
Elsevier
Subjects
Online AccessGet full text
ISSN1319-1578
DOI10.1016/j.jksuci.2024.102217

Cover

Abstract The separable reversible data hiding in encrypted domain (RDH-ED) algorithm leaves out the embedding space for the information before or after encryption and makes the operation of extracting the information and restoring the image not interfere with each other. The encryption method employed not only affects the embedding space of the information and separability, but is more crucial for ensuring security. However, the commonly used XOR, scram-bling or combination methods fall short in security, especially against known plaintext attack (KPA). Therefore, in order to improve the security of RDH-ED and be widely applicable, this paper proposes a high-security RDH-ED encryption algorithm that can be used to reserve space before encryption (RSBE) and free space after encryption (FSAE). During encryption, the image undergoes block XOR, global intra-block bit-plane scrambling (GIBS) and inter-block scrambling sequentially. The GIBS key is created through chaotic mapping transformation. Subsequently, two RDH-ED algorithms based on this encryption are proposed. Experimental results indicate that the algorithm outlined in this paper maintains consistent key communication traffic post key conversion. Additionally, its computational complexity remains at a constant level, satisfying separability criteria, and is suitable for both RSBE and FSAE methods. Simultaneously, while satisfying the security of a single encryption technique, we have expanded the key space to 28Np×Np!×8!Np, enabling resilience against various existing attack methods. Notably, particularly in KPA testing scenarios, the average decryption success rate is a mere 0.0067% and 0.0045%, highlighting its exceptional security. Overall, this virtually unbreakable system significantly enhances image security while preserving an appropriate embedding capacity.
AbstractList The separable reversible data hiding in encrypted domain (RDH-ED) algorithm leaves out the embedding space for the information before or after encryption and makes the operation of extracting the information and restoring the image not interfere with each other. The encryption method employed not only affects the embedding space of the information and separability, but is more crucial for ensuring security. However, the commonly used XOR, scram-bling or combination methods fall short in security, especially against known plaintext attack (KPA). Therefore, in order to improve the security of RDH-ED and be widely applicable, this paper proposes a high-security RDH-ED encryption algorithm that can be used to reserve space before encryption (RSBE) and free space after encryption (FSAE). During encryption, the image undergoes block XOR, global intra-block bit-plane scrambling (GIBS) and inter-block scrambling sequentially. The GIBS key is created through chaotic mapping transformation. Subsequently, two RDH-ED algorithms based on this encryption are proposed. Experimental results indicate that the algorithm outlined in this paper maintains consistent key communication traffic post key conversion. Additionally, its computational complexity remains at a constant level, satisfying separability criteria, and is suitable for both RSBE and FSAE methods. Simultaneously, while satisfying the security of a single encryption technique, we have expanded the key space to 28Np×Np!×8!Np, enabling resilience against various existing attack methods. Notably, particularly in KPA testing scenarios, the average decryption success rate is a mere 0.0067% and 0.0045%, highlighting its exceptional security. Overall, this virtually unbreakable system significantly enhances image security while preserving an appropriate embedding capacity.
ArticleNumber 102217
Author Ke, Yan
Wan, Hongli
Di, Fuqiang
Zhang, Minqing
Jiang, Zongbao
Author_xml – sequence: 1
  givenname: Hongli
  surname: Wan
  fullname: Wan, Hongli
– sequence: 2
  givenname: Minqing
  orcidid: 0000-0002-8783-3608
  surname: Zhang
  fullname: Zhang, Minqing
  email: api_zmq@126.com
– sequence: 3
  givenname: Yan
  surname: Ke
  fullname: Ke, Yan
– sequence: 4
  givenname: Zongbao
  surname: Jiang
  fullname: Jiang, Zongbao
– sequence: 5
  givenname: Fuqiang
  surname: Di
  fullname: Di, Fuqiang
BookMark eNp9kE1LxDAQhnNYwc9_4KF_YNdJkzbpRRDxCwQvehPCNJnspnabJamC_96uVY-eZpjhfZh5jtliiAMxds5hxYHXF92qe8vvNqxKKOU0KkuuFuyIC94seaX0ITvLuQMArupKivqIvd7RQAn7IpN9T1TQYNPnbgxxKLBfxxTGzbbwMU37HSZseyoSfVDKYd86HLHYBBeGdRGG3zC5wsUthuGUHXjsM5391BP2cnvzfH2_fHy6e7i-elxaUfJx6VvwziG1TotKQ2NBqkZY8kpZD1rwSktAREG1IihtWTdSt1hqEEp734oT9jBzXcTO7FLYYvo0EYP5HsS0NpjGYHsyNZCWLVnXiErK2mmClsA6p7WvmkpNLDmzbIo5J_J_PA5mL9l0ZpZs9pLNLHmKXc4xmv78CJRMtmHyQS4ksuN0SPgf8AWL8ozC
Cites_doi 10.1109/TMM.2021.3062699
10.1016/j.dsp.2022.103872
10.1109/TCSVT.2022.3183391
10.1055/s-0042-1758765
10.26735/QBIJ3667
10.32604/cmc.2020.09723
10.1007/978-981-15-1420-3_105
10.1109/TIFS.2015.2489178
10.1109/TMM.2018.2844679
10.1088/1742-6596/1979/1/012037
10.1016/j.ins.2019.04.043
10.1109/TCSVT.2018.2863029
10.1016/j.sigpro.2022.108577
10.55708/js0109002
10.1016/j.sigpro.2021.108146
10.1002/hast.973
10.1007/s11042-016-4049-z
10.1109/TCSVT.2020.2990952
10.1109/TIFS.2021.3069173
10.1007/s00530-020-00732-y
10.1016/j.ins.2017.12.044
10.1007/s13218-022-00763-9
10.1109/TCSVT.2021.3069811
10.1016/j.physleta.2018.12.011
10.1016/j.sigpro.2017.09.020
10.1016/j.ins.2020.12.002
10.1142/S0129167X18500672
10.1016/j.sigpro.2020.107888
ContentType Journal Article
Copyright 2024 The Authors
Copyright_xml – notice: 2024 The Authors
DBID 6I.
AAFTH
AAYXX
CITATION
DOA
DOI 10.1016/j.jksuci.2024.102217
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID oai_doaj_org_article_60e84becd935446d8e0be0cdd88f5957
10_1016_j_jksuci_2024_102217
S1319157824003069
GroupedDBID --K
0R~
0SF
4.4
457
5VS
6I.
AACTN
AAEDT
AAEDW
AAFTH
AAIKJ
AALRI
AAQXK
AAXUO
ABMAC
ACGFS
ADBBV
ADEZE
ADVLN
AEXQZ
AFJKZ
AFTJW
AGHFR
AITUG
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ASPBG
AVWKF
AZFZN
BCNDV
EBS
EJD
FDB
FEDTE
FGOYB
GROUPED_DOAJ
HVGLF
HZ~
IPNFZ
IXB
KQ8
M41
NCXOZ
O-L
O9-
OK1
R2-
RIG
ROL
SES
SSZ
XH2
AAJSJ
AASML
AAYWO
AAYXX
ABEEZ
ABWVN
ACULB
AFGXO
AGQPQ
APXCP
BGLVJ
C6C
CCPQU
CITATION
K7-
PHGZM
PHGZT
PIMPY
PQGLB
SOJ
ID FETCH-LOGICAL-c321t-fb0fddaebd835809c04793cef77cf08315840aaa3e67e02c26948ba280378ffb3
IEDL.DBID IXB
ISSN 1319-1578
IngestDate Fri Oct 03 12:39:57 EDT 2025
Wed Oct 01 05:02:29 EDT 2025
Wed Dec 04 16:49:04 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 9
Keywords Reversible data hiding in encrypted domain
High-security
Global intra-block bit-plane scrambling
Separability
Known plaintext attack
Key conversion
Language English
License This is an open access article under the CC BY-NC-ND license.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c321t-fb0fddaebd835809c04793cef77cf08315840aaa3e67e02c26948ba280378ffb3
ORCID 0000-0002-8783-3608
OpenAccessLink https://www.sciencedirect.com/science/article/pii/S1319157824003069
ParticipantIDs doaj_primary_oai_doaj_org_article_60e84becd935446d8e0be0cdd88f5957
crossref_primary_10_1016_j_jksuci_2024_102217
elsevier_sciencedirect_doi_10_1016_j_jksuci_2024_102217
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate November 2024
2024-11-00
2024-11-01
PublicationDateYYYYMMDD 2024-11-01
PublicationDate_xml – month: 11
  year: 2024
  text: November 2024
PublicationDecade 2020
PublicationTitle Journal of King Saud University. Computer and information sciences
PublicationYear 2024
Publisher Elsevier B.V
Elsevier
Publisher_xml – sequence: 0
  name: Elsevier B.V
– name: Elsevier
References Mohammadi, Nakhkash, Akhaee (b25) 2020; 30
Yin, She, Tang, Luo (b39) 2021; 187
Ge, Chen, Qian, Wang (b8) 2019; 29
London (b23) 2019; 49
Li, Wang, Wang, Ma, Wang, Shi (b19) 2021; 553
Zang, Yuan, Wei (b40) 2021; 2021
Mao, Chen, He, Yang (b24) 2022; 198
Abdel-Nabi, Al-Haj (b1) 2021; 27
Zhang, Wang, Ke, Kong, Di (b42) 2022; 44
He, Xiong, Wang (b11) 2021; 16
Huo, Zhou, Yuan, Yi, Zhang, Zhou (b13) 2019; 383
Yang, Wang, Wang, Guo, Hu (b35) 2023; 133
Du, Yin, Zhang (b4) 2020; 19
Fu, Kong, Yao, Tang, Qin (b7) 2019; 494
Humayun, Hamid, Jhanjhi, Suseendran, Talib (b12) 2021; 1979
University of Southern California (b32) 2022
Jolfaei, Wu, Muthukkumarasamy (b15) 2016; 11
École Centrale de Lille (b5) 2022
Yin, Abel, Tang, Zhang, Luo (b38) 2016; 76
Liu, Pun (b22) 2020; 19
Zhang, Luo (b41) 2022; 32
Liu, Pun (b21) 2018; 433–434
Delgado, Llorente (b3) 2022; 61
Fan, Pan, Gao, Gao, Zhang (b6) 2021; 180
Wang, He (b33) 2022; 24
Yi, Zhou (b36) 2019; 21
Liu, Liu (b20) 2019; 45
Qu, He, Zhang, Chen (b28) 2020; 65
Ravi, Subramaniam (b29) 2017; 12
Khelifi (b17) 2018; 143
Solanke, Biasiotti (b31) 2022; 36
Shirisha, Prasad (b30) 2020
Ge, Zhang, Yang (b9) 2021; 38
Hamid, Yousuf, Chowhan (b10) 2023; 6
Qu, Chen, He, Yuan (b26) 2019; 37
Wu, Xu, Qiao, Pan, Liao (b34) 2022; 27
Qu, He, Chen (b27) 2022; 32
Yi, Zhou (b37) 2021; 27
Zhang, Wang, Liu, Liu (b43) 2016; 27
Kahate, Raut (b16) 2022; 12
Ahmed, George, Hadi (b2) 2022; 1
Hussien, Xiong, Liu (b14) 2023; 40
Lanteri (b18) 2018; 29
Liu (10.1016/j.jksuci.2024.102217_b21) 2018; 433–434
Zhang (10.1016/j.jksuci.2024.102217_b41) 2022; 32
Qu (10.1016/j.jksuci.2024.102217_b27) 2022; 32
Zhang (10.1016/j.jksuci.2024.102217_b42) 2022; 44
Shirisha (10.1016/j.jksuci.2024.102217_b30) 2020
Mao (10.1016/j.jksuci.2024.102217_b24) 2022; 198
Zang (10.1016/j.jksuci.2024.102217_b40) 2021; 2021
Ge (10.1016/j.jksuci.2024.102217_b8) 2019; 29
Yang (10.1016/j.jksuci.2024.102217_b35) 2023; 133
Humayun (10.1016/j.jksuci.2024.102217_b12) 2021; 1979
Zhang (10.1016/j.jksuci.2024.102217_b43) 2016; 27
École Centrale de Lille (10.1016/j.jksuci.2024.102217_b5) 2022
Fu (10.1016/j.jksuci.2024.102217_b7) 2019; 494
Qu (10.1016/j.jksuci.2024.102217_b28) 2020; 65
Fan (10.1016/j.jksuci.2024.102217_b6) 2021; 180
Li (10.1016/j.jksuci.2024.102217_b19) 2021; 553
Yin (10.1016/j.jksuci.2024.102217_b39) 2021; 187
Ravi (10.1016/j.jksuci.2024.102217_b29) 2017; 12
Yin (10.1016/j.jksuci.2024.102217_b38) 2016; 76
Jolfaei (10.1016/j.jksuci.2024.102217_b15) 2016; 11
Yi (10.1016/j.jksuci.2024.102217_b37) 2021; 27
Wang (10.1016/j.jksuci.2024.102217_b33) 2022; 24
Kahate (10.1016/j.jksuci.2024.102217_b16) 2022; 12
Qu (10.1016/j.jksuci.2024.102217_b26) 2019; 37
Abdel-Nabi (10.1016/j.jksuci.2024.102217_b1) 2021; 27
He (10.1016/j.jksuci.2024.102217_b11) 2021; 16
Ge (10.1016/j.jksuci.2024.102217_b9) 2021; 38
Delgado (10.1016/j.jksuci.2024.102217_b3) 2022; 61
Hussien (10.1016/j.jksuci.2024.102217_b14) 2023; 40
Khelifi (10.1016/j.jksuci.2024.102217_b17) 2018; 143
Lanteri (10.1016/j.jksuci.2024.102217_b18) 2018; 29
Solanke (10.1016/j.jksuci.2024.102217_b31) 2022; 36
Yi (10.1016/j.jksuci.2024.102217_b36) 2019; 21
Liu (10.1016/j.jksuci.2024.102217_b22) 2020; 19
University of Southern California (10.1016/j.jksuci.2024.102217_b32) 2022
Du (10.1016/j.jksuci.2024.102217_b4) 2020; 19
Liu (10.1016/j.jksuci.2024.102217_b20) 2019; 45
Mohammadi (10.1016/j.jksuci.2024.102217_b25) 2020; 30
Hamid (10.1016/j.jksuci.2024.102217_b10) 2023; 6
Ahmed (10.1016/j.jksuci.2024.102217_b2) 2022; 1
London (10.1016/j.jksuci.2024.102217_b23) 2019; 49
Huo (10.1016/j.jksuci.2024.102217_b13) 2019; 383
Wu (10.1016/j.jksuci.2024.102217_b34) 2022; 27
References_xml – volume: 30
  start-page: 2366
  year: 2020
  end-page: 2376
  ident: b25
  article-title: A high-capacity reversible data hiding in encrypted images employing local difference predictor
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– volume: 19
  start-page: 1382
  year: 2020
  end-page: 1394
  ident: b22
  article-title: Reversible data hiding in encrypted images using chunk encryption and redundancy matrix representation
  publication-title: IEEE Trans. Dependable Secure Comput.
– volume: 2021
  start-page: 1
  year: 2021
  end-page: 12
  ident: b40
  article-title: Research on pseudorandom number generator based on several new types of piecewise chaotic maps
  publication-title: Math. Probl. Eng.
– volume: 44
  start-page: 4337
  year: 2022
  end-page: 4347
  ident: b42
  article-title: Reversible data hiding in encrypted images based on polynomial secret sharing
  publication-title: J. Electron. Inform. Technol.
– volume: 65
  start-page: 2623
  year: 2020
  end-page: 2638
  ident: b28
  article-title: Reversible data hiding in encrypted images based on prediction and adaptive classification scrambling
  publication-title: Comput. Mater. Continua
– year: 2022
  ident: b5
  article-title: Bows-2 web page
– volume: 12
  start-page: 3961
  year: 2017
  end-page: 3977
  ident: b29
  article-title: Optimized wavelet filters and modified huffman encoding-based compression and chaotic encryption for image data
  publication-title: Int. J. Appl. Eng. Res.
– year: 2022
  ident: b32
  article-title: SIPI image database
– volume: 76
  start-page: 3899
  year: 2016
  end-page: 3920
  ident: b38
  article-title: Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification
  publication-title: Multimedia Tools Appl.
– volume: 553
  start-page: 19
  year: 2021
  end-page: 30
  ident: b19
  article-title: An encrypted coverless information hiding method based on generative models
  publication-title: Inform. Sci.
– volume: 27
  start-page: 125
  year: 2022
  end-page: 149
  ident: b34
  article-title: Review of reversible data hiding based on the spatial domain of images
  publication-title: J. Image Graphics
– start-page: 960
  year: 2020
  end-page: 965
  ident: b30
  article-title: A survey on reversible data hiding techniques
  publication-title: Lect. Notes Electr. Eng.
– volume: 29
  start-page: 2285
  year: 2019
  end-page: 2295
  ident: b8
  article-title: A high capacity multi-level approach for reversible data hiding in encrypted images
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– volume: 12
  start-page: 507
  year: 2022
  end-page: 518
  ident: b16
  article-title: Comprehensive analysis of privacy attacks in online social network: Security issues and challenges
  publication-title: Int. J. Saf. Secur. Eng.
– volume: 49
  start-page: 15
  year: 2019
  end-page: 21
  ident: b23
  article-title: Artificial intelligence and black-box medical decisions: Accuracy versus explainability
  publication-title: Hastings Cent. Rep.
– volume: 32
  start-page: 920
  year: 2022
  end-page: 932
  ident: b27
  article-title: On the security of block permutation and Co-XOR in reversible data hiding
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– volume: 1979
  year: 2021
  ident: b12
  article-title: 5G network security issues, challenges, opportunities and future directions: A survey
  publication-title: J. Phys. Conf. Ser.
– volume: 198
  start-page: 108577
  year: 2022
  ident: b24
  article-title: Reversible data hiding based on adaptive IPVO and two-segment pairwise PEE
  publication-title: Signal Process.
– volume: 38
  year: 2021
  ident: b9
  article-title: Reversible information hiding scheme in a large-capacity ciphertext domain based on peano curve scanning
  publication-title: Appl. Res. Comput.
– volume: 11
  start-page: 235
  year: 2016
  end-page: 246
  ident: b15
  article-title: On the security of permutation-only image encryption schemes
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 36
  start-page: 1
  year: 2022
  end-page: 19
  ident: b31
  article-title: Digital forensics AI: Evaluating, standardizing and optimizing digital evidence mining techniques
  publication-title: KI - Künstliche Intelligenz
– volume: 1
  start-page: 8
  year: 2022
  end-page: 14
  ident: b2
  article-title: Images compression using combined scheme of transform coding
  publication-title: J. Eng. Res. Sci.
– volume: 6
  start-page: 24
  year: 2023
  end-page: 39
  ident: b10
  article-title: Security in health information management records through blockchain technology: A review
  publication-title: J. Inform. Secur. Cybercrimes Res.
– volume: 29
  start-page: 1850067
  year: 2018
  ident: b18
  article-title: Hilbert curves of quadric fibrations
  publication-title: Int. J. Math.
– volume: 27
  start-page: 1328
  year: 2016
  end-page: 1348
  ident: b43
  article-title: Survey on cloud computing security
  publication-title: J. Softw.
– volume: 19
  start-page: 1420
  year: 2020
  end-page: 1433
  ident: b4
  article-title: High capacity lossless data hiding in JPEG bitstream based on general VLC mapping
  publication-title: IEEE Trans. Dependable Secure Comput.
– volume: 494
  start-page: 21
  year: 2019
  end-page: 36
  ident: b7
  article-title: Effective reversible data hiding in encrypted image with adaptive encoding strategy
  publication-title: Inform. Sci.
– volume: 45
  start-page: 188
  year: 2019
  end-page: 193
  ident: b20
  article-title: Convolutional neural network compression method based on LZW coding
  publication-title: Comput. Eng.
– volume: 32
  start-page: 7359
  year: 2022
  end-page: 7372
  ident: b41
  article-title: Vector-based efficient data hiding in encrypted images via multi-MSB replacement
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
– volume: 383
  start-page: 915
  year: 2019
  end-page: 922
  ident: b13
  article-title: Image encryption using exclusive-OR with DNA complementary rules and double random phase encoding
  publication-title: Phys. Lett. A
– volume: 180
  year: 2021
  ident: b6
  article-title: Reversible data hiding method based on combining IPVO with bias-added rhombus predictor by multi-predictor mechanism
  publication-title: Signal Process.
– volume: 143
  start-page: 336
  year: 2018
  end-page: 345
  ident: b17
  article-title: On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain
  publication-title: Signal Process.
– volume: 21
  start-page: 51
  year: 2019
  end-page: 64
  ident: b36
  article-title: Separable and reversible data hiding in encrypted images using parametric binary tree labeling
  publication-title: IEEE Trans. Multimed.
– volume: 16
  start-page: 3000
  year: 2021
  end-page: 3012
  ident: b11
  article-title: Reversible data hiding based on adaptive multiple histograms modification
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 37
  start-page: 631
  year: 2019
  end-page: 642
  ident: b26
  article-title: Security analysis of image encryption algorithm based on bit plane-pixel block scrambling
  publication-title: J. Appl. Sci. Electron. Inform. Eng.
– volume: 433–434
  start-page: 188
  year: 2018
  end-page: 203
  ident: b21
  article-title: Reversible data-hiding in encrypted images by redundant space transfer
  publication-title: Inform. Sci.
– volume: 133
  start-page: 103872
  year: 2023
  ident: b35
  article-title: A fast deconvolution method for multiple sound source localization based on Hilbert curve
  publication-title: Digit. Signal Process.
– volume: 40
  start-page: 3663
  year: 2023
  end-page: 3691
  ident: b14
  article-title: Reversible data-hiding exploiting huffman encoding in dual image using weighted matrix and generalized exploiting modification direction (GEMD)
  publication-title: Vis. Comput.
– volume: 61
  start-page: e172
  year: 2022
  end-page: e182
  ident: b3
  article-title: Fair aspects of a health information protection and management system
  publication-title: Methods Inf. Med.
– volume: 187
  start-page: 108146
  year: 2021
  ident: b39
  article-title: Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement
  publication-title: Signal Process.
– volume: 27
  start-page: 229
  year: 2021
  end-page: 245
  ident: b1
  article-title: Reversible data hiding in adjacent zeros
  publication-title: Multimedia Syst.
– volume: 24
  start-page: 1288
  year: 2022
  end-page: 1298
  ident: b33
  article-title: High capacity reversible data hiding in encrypted image based on adaptive MSB prediction
  publication-title: IEEE Trans. Multimed.
– volume: 27
  start-page: 40
  year: 2021
  end-page: 46
  ident: b37
  article-title: Research progress and review on reversible information hiding in encrypted domain
  publication-title: J. People’s Public Secur. Univ. China (Sci. Technol.)
– volume: 24
  start-page: 1288
  year: 2022
  ident: 10.1016/j.jksuci.2024.102217_b33
  article-title: High capacity reversible data hiding in encrypted image based on adaptive MSB prediction
  publication-title: IEEE Trans. Multimed.
  doi: 10.1109/TMM.2021.3062699
– volume: 45
  start-page: 188
  issue: 09
  year: 2019
  ident: 10.1016/j.jksuci.2024.102217_b20
  article-title: Convolutional neural network compression method based on LZW coding
  publication-title: Comput. Eng.
– volume: 133
  start-page: 103872
  year: 2023
  ident: 10.1016/j.jksuci.2024.102217_b35
  article-title: A fast deconvolution method for multiple sound source localization based on Hilbert curve
  publication-title: Digit. Signal Process.
  doi: 10.1016/j.dsp.2022.103872
– volume: 32
  start-page: 7359
  year: 2022
  ident: 10.1016/j.jksuci.2024.102217_b41
  article-title: Vector-based efficient data hiding in encrypted images via multi-MSB replacement
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2022.3183391
– volume: 61
  start-page: e172
  year: 2022
  ident: 10.1016/j.jksuci.2024.102217_b3
  article-title: Fair aspects of a health information protection and management system
  publication-title: Methods Inf. Med.
  doi: 10.1055/s-0042-1758765
– volume: 6
  start-page: 24
  year: 2023
  ident: 10.1016/j.jksuci.2024.102217_b10
  article-title: Security in health information management records through blockchain technology: A review
  publication-title: J. Inform. Secur. Cybercrimes Res.
  doi: 10.26735/QBIJ3667
– volume: 65
  start-page: 2623
  year: 2020
  ident: 10.1016/j.jksuci.2024.102217_b28
  article-title: Reversible data hiding in encrypted images based on prediction and adaptive classification scrambling
  publication-title: Comput. Mater. Continua
  doi: 10.32604/cmc.2020.09723
– volume: 27
  start-page: 40
  issue: 02
  year: 2021
  ident: 10.1016/j.jksuci.2024.102217_b37
  article-title: Research progress and review on reversible information hiding in encrypted domain
  publication-title: J. People’s Public Secur. Univ. China (Sci. Technol.)
– volume: 27
  start-page: 1328
  issue: 6
  year: 2016
  ident: 10.1016/j.jksuci.2024.102217_b43
  article-title: Survey on cloud computing security
  publication-title: J. Softw.
– start-page: 960
  year: 2020
  ident: 10.1016/j.jksuci.2024.102217_b30
  article-title: A survey on reversible data hiding techniques
  publication-title: Lect. Notes Electr. Eng.
  doi: 10.1007/978-981-15-1420-3_105
– volume: 2021
  start-page: 1
  year: 2021
  ident: 10.1016/j.jksuci.2024.102217_b40
  article-title: Research on pseudorandom number generator based on several new types of piecewise chaotic maps
  publication-title: Math. Probl. Eng.
– volume: 11
  start-page: 235
  year: 2016
  ident: 10.1016/j.jksuci.2024.102217_b15
  article-title: On the security of permutation-only image encryption schemes
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2489178
– volume: 21
  start-page: 51
  year: 2019
  ident: 10.1016/j.jksuci.2024.102217_b36
  article-title: Separable and reversible data hiding in encrypted images using parametric binary tree labeling
  publication-title: IEEE Trans. Multimed.
  doi: 10.1109/TMM.2018.2844679
– volume: 1979
  year: 2021
  ident: 10.1016/j.jksuci.2024.102217_b12
  article-title: 5G network security issues, challenges, opportunities and future directions: A survey
  publication-title: J. Phys. Conf. Ser.
  doi: 10.1088/1742-6596/1979/1/012037
– volume: 19
  start-page: 1382
  issue: 2
  year: 2020
  ident: 10.1016/j.jksuci.2024.102217_b22
  article-title: Reversible data hiding in encrypted images using chunk encryption and redundancy matrix representation
  publication-title: IEEE Trans. Dependable Secure Comput.
– volume: 494
  start-page: 21
  year: 2019
  ident: 10.1016/j.jksuci.2024.102217_b7
  article-title: Effective reversible data hiding in encrypted image with adaptive encoding strategy
  publication-title: Inform. Sci.
  doi: 10.1016/j.ins.2019.04.043
– volume: 29
  start-page: 2285
  year: 2019
  ident: 10.1016/j.jksuci.2024.102217_b8
  article-title: A high capacity multi-level approach for reversible data hiding in encrypted images
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2018.2863029
– volume: 198
  start-page: 108577
  year: 2022
  ident: 10.1016/j.jksuci.2024.102217_b24
  article-title: Reversible data hiding based on adaptive IPVO and two-segment pairwise PEE
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2022.108577
– volume: 1
  start-page: 8
  year: 2022
  ident: 10.1016/j.jksuci.2024.102217_b2
  article-title: Images compression using combined scheme of transform coding
  publication-title: J. Eng. Res. Sci.
  doi: 10.55708/js0109002
– volume: 12
  start-page: 3961
  issue: 13
  year: 2017
  ident: 10.1016/j.jksuci.2024.102217_b29
  article-title: Optimized wavelet filters and modified huffman encoding-based compression and chaotic encryption for image data
  publication-title: Int. J. Appl. Eng. Res.
– volume: 187
  start-page: 108146
  year: 2021
  ident: 10.1016/j.jksuci.2024.102217_b39
  article-title: Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2021.108146
– volume: 44
  start-page: 4337
  issue: 12
  year: 2022
  ident: 10.1016/j.jksuci.2024.102217_b42
  article-title: Reversible data hiding in encrypted images based on polynomial secret sharing
  publication-title: J. Electron. Inform. Technol.
– volume: 37
  start-page: 631
  issue: 05
  year: 2019
  ident: 10.1016/j.jksuci.2024.102217_b26
  article-title: Security analysis of image encryption algorithm based on bit plane-pixel block scrambling
  publication-title: J. Appl. Sci. Electron. Inform. Eng.
– volume: 27
  start-page: 125
  issue: 01
  year: 2022
  ident: 10.1016/j.jksuci.2024.102217_b34
  article-title: Review of reversible data hiding based on the spatial domain of images
  publication-title: J. Image Graphics
– volume: 49
  start-page: 15
  year: 2019
  ident: 10.1016/j.jksuci.2024.102217_b23
  article-title: Artificial intelligence and black-box medical decisions: Accuracy versus explainability
  publication-title: Hastings Cent. Rep.
  doi: 10.1002/hast.973
– year: 2022
  ident: 10.1016/j.jksuci.2024.102217_b32
– volume: 76
  start-page: 3899
  year: 2016
  ident: 10.1016/j.jksuci.2024.102217_b38
  article-title: Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-016-4049-z
– volume: 30
  start-page: 2366
  year: 2020
  ident: 10.1016/j.jksuci.2024.102217_b25
  article-title: A high-capacity reversible data hiding in encrypted images employing local difference predictor
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2020.2990952
– volume: 19
  start-page: 1420
  issue: 2
  year: 2020
  ident: 10.1016/j.jksuci.2024.102217_b4
  article-title: High capacity lossless data hiding in JPEG bitstream based on general VLC mapping
  publication-title: IEEE Trans. Dependable Secure Comput.
– volume: 16
  start-page: 3000
  year: 2021
  ident: 10.1016/j.jksuci.2024.102217_b11
  article-title: Reversible data hiding based on adaptive multiple histograms modification
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2021.3069173
– volume: 27
  start-page: 229
  year: 2021
  ident: 10.1016/j.jksuci.2024.102217_b1
  article-title: Reversible data hiding in adjacent zeros
  publication-title: Multimedia Syst.
  doi: 10.1007/s00530-020-00732-y
– volume: 433–434
  start-page: 188
  year: 2018
  ident: 10.1016/j.jksuci.2024.102217_b21
  article-title: Reversible data-hiding in encrypted images by redundant space transfer
  publication-title: Inform. Sci.
  doi: 10.1016/j.ins.2017.12.044
– volume: 36
  start-page: 1
  year: 2022
  ident: 10.1016/j.jksuci.2024.102217_b31
  article-title: Digital forensics AI: Evaluating, standardizing and optimizing digital evidence mining techniques
  publication-title: KI - Künstliche Intelligenz
  doi: 10.1007/s13218-022-00763-9
– volume: 32
  start-page: 920
  year: 2022
  ident: 10.1016/j.jksuci.2024.102217_b27
  article-title: On the security of block permutation and Co-XOR in reversible data hiding
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2021.3069811
– volume: 383
  start-page: 915
  year: 2019
  ident: 10.1016/j.jksuci.2024.102217_b13
  article-title: Image encryption using exclusive-OR with DNA complementary rules and double random phase encoding
  publication-title: Phys. Lett. A
  doi: 10.1016/j.physleta.2018.12.011
– volume: 12
  start-page: 507
  year: 2022
  ident: 10.1016/j.jksuci.2024.102217_b16
  article-title: Comprehensive analysis of privacy attacks in online social network: Security issues and challenges
  publication-title: Int. J. Saf. Secur. Eng.
– volume: 143
  start-page: 336
  year: 2018
  ident: 10.1016/j.jksuci.2024.102217_b17
  article-title: On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2017.09.020
– year: 2022
  ident: 10.1016/j.jksuci.2024.102217_b5
– volume: 40
  start-page: 3663
  year: 2023
  ident: 10.1016/j.jksuci.2024.102217_b14
  article-title: Reversible data-hiding exploiting huffman encoding in dual image using weighted matrix and generalized exploiting modification direction (GEMD)
  publication-title: Vis. Comput.
– volume: 553
  start-page: 19
  year: 2021
  ident: 10.1016/j.jksuci.2024.102217_b19
  article-title: An encrypted coverless information hiding method based on generative models
  publication-title: Inform. Sci.
  doi: 10.1016/j.ins.2020.12.002
– volume: 29
  start-page: 1850067
  year: 2018
  ident: 10.1016/j.jksuci.2024.102217_b18
  article-title: Hilbert curves of quadric fibrations
  publication-title: Int. J. Math.
  doi: 10.1142/S0129167X18500672
– volume: 180
  year: 2021
  ident: 10.1016/j.jksuci.2024.102217_b6
  article-title: Reversible data hiding method based on combining IPVO with bias-added rhombus predictor by multi-predictor mechanism
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2020.107888
– volume: 38
  issue: 12
  year: 2021
  ident: 10.1016/j.jksuci.2024.102217_b9
  article-title: Reversible information hiding scheme in a large-capacity ciphertext domain based on peano curve scanning
  publication-title: Appl. Res. Comput.
SSID ssj0001765436
Score 2.3094566
Snippet The separable reversible data hiding in encrypted domain (RDH-ED) algorithm leaves out the embedding space for the information before or after encryption and...
SourceID doaj
crossref
elsevier
SourceType Open Website
Index Database
Publisher
StartPage 102217
SubjectTerms Global intra-block bit-plane scrambling
High-security
Key conversion
Known plaintext attack
Reversible data hiding in encrypted domain
Separability
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQJxbeiPKSB9YIJ05iZwQEqpBgolIHJMuOzzSlTVEfA_8en5NAJ1jYIufh6M7OPXLfd4RcmQwsEqtFzHIepSDSqAAtI8MAEmGsyB3mO56e88EwfRxlo41WX1gT1tADN4K7zhnI1E9kC5750MVKYAZYaa2ULiuygCNnstgIpkJ2RSBmMkCLEKUT-3XZ4eZCcdfkfbkuKx8eJimSFyShX9mPXQr0_RvmacPkPOyRndZXpDfNO-6TLagPyG7Xh4G22_KQvLbc0XSJyXOgfnTxGT4FVE_f5j78H8-od079eWT6NlOgSNy08LvBH2KNKB1XaMNoVXc3g6V2PtNVfUSGD_cvd4Oo7ZoQlTyJV5EzzFmrwViJvziLEknkeQlOiNJhXzHvcjCtNYdcAEtKhLJKo7FLlZDOGX5MevW8hhNCuXFIl2ZtjEmP3Jmk9OFNbo1xPItF3CdRJzP10ZBjqK5qbKIaGSuUsWpk3Ce3KNjva5HaOgx4hatW4eovhfeJ6NSiWi-hsf7-UdWv05_-x_RnZBsf2cARz0lvtVjDhfdLVuYyLMEvDI3g_Q
  priority: 102
  providerName: Directory of Open Access Journals
Title General secure encryption algorithm for separable reversible data hiding in encrypted domain
URI https://dx.doi.org/10.1016/j.jksuci.2024.102217
https://doaj.org/article/60e84becd935446d8e0be0cdd88f5957
Volume 36
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  issn: 1319-1578
  databaseCode: KQ8
  dateStart: 19960101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  omitProxy: true
  ssIdentifier: ssj0001765436
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVESC
  databaseName: ScienceDirect Free & Delayed Access Titles
  issn: 1319-1578
  databaseCode: IXB
  dateStart: 19960101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0001765436
  providerName: Elsevier
– providerCode: PRVAVX
  databaseName: Springer Nature HAS Fully OA
  issn: 1319-1578
  databaseCode: AAJSJ
  dateStart: 0
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.springernature.com
  omitProxy: true
  ssIdentifier: ssj0001765436
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT4QwEG6MXrz4Nq6PTQ9emwUKtBxXo9FN9KImezAhlE5d1pU1iAf_vZ1SfFw8eINCgUyn82LmG0JOVQIagdVYoDlnMYiYZVBIpgKASCgtUoPxjpvb9OohnkyT6Qo572thMK3Sy_5Opjtp7UdGnpqj16oa3YWWe0JEY4-d4YtFfDyW2L7henr2HWcRWD3pioywXgcn9BV0Ls1r_vz2XlbWUYxihDGIXOeybw3lgPx_KKofyudyi2x4q5GOuw_bJitQ75DNviMD9Rt0lzx6FGn6hmF0oHa0-XBCgRaLp2VTtbMXas1Uex0xv9UCKEI4NXZf2EPMFqWzCrUZrep-Mmiqly9FVe-Rh8uL-_Mr5vsnsJJHYcuMCozWBSgt8WdnViKcPC_BCFEa7DBmjY-gKAoOqYAgKrGoVaoC-1UJaYzi-2S1XtZwQChXBoHTtA4x_JEaFZXW0Um1UoYnoQgHhPU0y187mIy8zx-b5x2Nc6Rx3tF4QM6QsF_3Isi1G1g2T7lf5TwNQMaWx3TGE-u1agmBgqDUWkqTZIl9iOiXJf_FM_ZR1Z-vP_z3zCOyjmddNeIxWW2bdzixZkmrhmRtPJ7cTYbOrR86LvwEE9zj7A
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELZ4DLDwRrzxwBo1iZM4GQFRlVcXitQByYrjM02BFKXpwL_H5yS0LAxskRM70fl8Pl_u-46QCxmCQmI1x1WMOQHwwEkgjR3pAvhcKh5pjHc89qPec3A3DIdL5LrFwmBaZWP7a5turXXT0mmk2fnM886TZ7THQzb2wDq-yTJZDULjnSCKb3g1D7RwhE9alBECdrBHC6GzeV7jt-ksy81J0Q-Qx8C3pcvmW5Rl8l_YqRZ2n-4W2WjcRnpZf9k2WYJih2y2JRlos0J3yUtDI02nGEcHalrLL2sVaPr-OinzavRBjZ9q7iPpt3wHihxOpVkY5hLTRekox-2M5kXbGRRVk480L_bIc_dmcN1zmgIKTsZ8r3K0dLVSKUgV49_OJEM-eZaB5jzTWGLMeB9umqYMIg6unyGqNZYpFqzisdaS7ZOVYlLAAaFMamROU8rD-EekpZ-Zk06kpNQs9Lh3SJxWZuKz5skQbQLZWNQyFihjUcv4kFyhYH-eRZZr2zApX0UzzSJyIQ6MkqmEhebYqmJwJbiZUnGswyQ0g_B2WsQvpTFD5X--_ujfPc_JWm_w-CAebvv3x2Qd79TQxBOyUpUzODU-SiXPrA5-Axzm5JE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=General+secure+encryption+algorithm+for+separable+reversible+data+hiding+in+encrypted+domain&rft.jtitle=Journal+of+King+Saud+University.+Computer+and+information+sciences&rft.au=Wan%2C+Hongli&rft.au=Zhang%2C+Minqing&rft.au=Ke%2C+Yan&rft.au=Jiang%2C+Zongbao&rft.date=2024-11-01&rft.issn=1319-1578&rft.volume=36&rft.issue=9&rft.spage=102217&rft_id=info:doi/10.1016%2Fj.jksuci.2024.102217&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jksuci_2024_102217
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1319-1578&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1319-1578&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1319-1578&client=summon