General secure encryption algorithm for separable reversible data hiding in encrypted domain
The separable reversible data hiding in encrypted domain (RDH-ED) algorithm leaves out the embedding space for the information before or after encryption and makes the operation of extracting the information and restoring the image not interfere with each other. The encryption method employed not on...
Saved in:
| Published in | Journal of King Saud University. Computer and information sciences Vol. 36; no. 9; p. 102217 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Elsevier B.V
01.11.2024
Elsevier |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1319-1578 |
| DOI | 10.1016/j.jksuci.2024.102217 |
Cover
| Abstract | The separable reversible data hiding in encrypted domain (RDH-ED) algorithm leaves out the embedding space for the information before or after encryption and makes the operation of extracting the information and restoring the image not interfere with each other. The encryption method employed not only affects the embedding space of the information and separability, but is more crucial for ensuring security. However, the commonly used XOR, scram-bling or combination methods fall short in security, especially against known plaintext attack (KPA). Therefore, in order to improve the security of RDH-ED and be widely applicable, this paper proposes a high-security RDH-ED encryption algorithm that can be used to reserve space before encryption (RSBE) and free space after encryption (FSAE). During encryption, the image undergoes block XOR, global intra-block bit-plane scrambling (GIBS) and inter-block scrambling sequentially. The GIBS key is created through chaotic mapping transformation. Subsequently, two RDH-ED algorithms based on this encryption are proposed. Experimental results indicate that the algorithm outlined in this paper maintains consistent key communication traffic post key conversion. Additionally, its computational complexity remains at a constant level, satisfying separability criteria, and is suitable for both RSBE and FSAE methods. Simultaneously, while satisfying the security of a single encryption technique, we have expanded the key space to 28Np×Np!×8!Np, enabling resilience against various existing attack methods. Notably, particularly in KPA testing scenarios, the average decryption success rate is a mere 0.0067% and 0.0045%, highlighting its exceptional security. Overall, this virtually unbreakable system significantly enhances image security while preserving an appropriate embedding capacity. |
|---|---|
| AbstractList | The separable reversible data hiding in encrypted domain (RDH-ED) algorithm leaves out the embedding space for the information before or after encryption and makes the operation of extracting the information and restoring the image not interfere with each other. The encryption method employed not only affects the embedding space of the information and separability, but is more crucial for ensuring security. However, the commonly used XOR, scram-bling or combination methods fall short in security, especially against known plaintext attack (KPA). Therefore, in order to improve the security of RDH-ED and be widely applicable, this paper proposes a high-security RDH-ED encryption algorithm that can be used to reserve space before encryption (RSBE) and free space after encryption (FSAE). During encryption, the image undergoes block XOR, global intra-block bit-plane scrambling (GIBS) and inter-block scrambling sequentially. The GIBS key is created through chaotic mapping transformation. Subsequently, two RDH-ED algorithms based on this encryption are proposed. Experimental results indicate that the algorithm outlined in this paper maintains consistent key communication traffic post key conversion. Additionally, its computational complexity remains at a constant level, satisfying separability criteria, and is suitable for both RSBE and FSAE methods. Simultaneously, while satisfying the security of a single encryption technique, we have expanded the key space to 28Np×Np!×8!Np, enabling resilience against various existing attack methods. Notably, particularly in KPA testing scenarios, the average decryption success rate is a mere 0.0067% and 0.0045%, highlighting its exceptional security. Overall, this virtually unbreakable system significantly enhances image security while preserving an appropriate embedding capacity. |
| ArticleNumber | 102217 |
| Author | Ke, Yan Wan, Hongli Di, Fuqiang Zhang, Minqing Jiang, Zongbao |
| Author_xml | – sequence: 1 givenname: Hongli surname: Wan fullname: Wan, Hongli – sequence: 2 givenname: Minqing orcidid: 0000-0002-8783-3608 surname: Zhang fullname: Zhang, Minqing email: api_zmq@126.com – sequence: 3 givenname: Yan surname: Ke fullname: Ke, Yan – sequence: 4 givenname: Zongbao surname: Jiang fullname: Jiang, Zongbao – sequence: 5 givenname: Fuqiang surname: Di fullname: Di, Fuqiang |
| BookMark | eNp9kE1LxDAQhnNYwc9_4KF_YNdJkzbpRRDxCwQvehPCNJnspnabJamC_96uVY-eZpjhfZh5jtliiAMxds5hxYHXF92qe8vvNqxKKOU0KkuuFuyIC94seaX0ITvLuQMArupKivqIvd7RQAn7IpN9T1TQYNPnbgxxKLBfxxTGzbbwMU37HSZseyoSfVDKYd86HLHYBBeGdRGG3zC5wsUthuGUHXjsM5391BP2cnvzfH2_fHy6e7i-elxaUfJx6VvwziG1TotKQ2NBqkZY8kpZD1rwSktAREG1IihtWTdSt1hqEEp734oT9jBzXcTO7FLYYvo0EYP5HsS0NpjGYHsyNZCWLVnXiErK2mmClsA6p7WvmkpNLDmzbIo5J_J_PA5mL9l0ZpZs9pLNLHmKXc4xmv78CJRMtmHyQS4ksuN0SPgf8AWL8ozC |
| Cites_doi | 10.1109/TMM.2021.3062699 10.1016/j.dsp.2022.103872 10.1109/TCSVT.2022.3183391 10.1055/s-0042-1758765 10.26735/QBIJ3667 10.32604/cmc.2020.09723 10.1007/978-981-15-1420-3_105 10.1109/TIFS.2015.2489178 10.1109/TMM.2018.2844679 10.1088/1742-6596/1979/1/012037 10.1016/j.ins.2019.04.043 10.1109/TCSVT.2018.2863029 10.1016/j.sigpro.2022.108577 10.55708/js0109002 10.1016/j.sigpro.2021.108146 10.1002/hast.973 10.1007/s11042-016-4049-z 10.1109/TCSVT.2020.2990952 10.1109/TIFS.2021.3069173 10.1007/s00530-020-00732-y 10.1016/j.ins.2017.12.044 10.1007/s13218-022-00763-9 10.1109/TCSVT.2021.3069811 10.1016/j.physleta.2018.12.011 10.1016/j.sigpro.2017.09.020 10.1016/j.ins.2020.12.002 10.1142/S0129167X18500672 10.1016/j.sigpro.2020.107888 |
| ContentType | Journal Article |
| Copyright | 2024 The Authors |
| Copyright_xml | – notice: 2024 The Authors |
| DBID | 6I. AAFTH AAYXX CITATION DOA |
| DOI | 10.1016/j.jksuci.2024.102217 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| ExternalDocumentID | oai_doaj_org_article_60e84becd935446d8e0be0cdd88f5957 10_1016_j_jksuci_2024_102217 S1319157824003069 |
| GroupedDBID | --K 0R~ 0SF 4.4 457 5VS 6I. AACTN AAEDT AAEDW AAFTH AAIKJ AALRI AAQXK AAXUO ABMAC ACGFS ADBBV ADEZE ADVLN AEXQZ AFJKZ AFTJW AGHFR AITUG ALMA_UNASSIGNED_HOLDINGS AMRAJ ASPBG AVWKF AZFZN BCNDV EBS EJD FDB FEDTE FGOYB GROUPED_DOAJ HVGLF HZ~ IPNFZ IXB KQ8 M41 NCXOZ O-L O9- OK1 R2- RIG ROL SES SSZ XH2 AAJSJ AASML AAYWO AAYXX ABEEZ ABWVN ACULB AFGXO AGQPQ APXCP BGLVJ C6C CCPQU CITATION K7- PHGZM PHGZT PIMPY PQGLB SOJ |
| ID | FETCH-LOGICAL-c321t-fb0fddaebd835809c04793cef77cf08315840aaa3e67e02c26948ba280378ffb3 |
| IEDL.DBID | IXB |
| ISSN | 1319-1578 |
| IngestDate | Fri Oct 03 12:39:57 EDT 2025 Wed Oct 01 05:02:29 EDT 2025 Wed Dec 04 16:49:04 EST 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 9 |
| Keywords | Reversible data hiding in encrypted domain High-security Global intra-block bit-plane scrambling Separability Known plaintext attack Key conversion |
| Language | English |
| License | This is an open access article under the CC BY-NC-ND license. |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c321t-fb0fddaebd835809c04793cef77cf08315840aaa3e67e02c26948ba280378ffb3 |
| ORCID | 0000-0002-8783-3608 |
| OpenAccessLink | https://www.sciencedirect.com/science/article/pii/S1319157824003069 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_60e84becd935446d8e0be0cdd88f5957 crossref_primary_10_1016_j_jksuci_2024_102217 elsevier_sciencedirect_doi_10_1016_j_jksuci_2024_102217 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | November 2024 2024-11-00 2024-11-01 |
| PublicationDateYYYYMMDD | 2024-11-01 |
| PublicationDate_xml | – month: 11 year: 2024 text: November 2024 |
| PublicationDecade | 2020 |
| PublicationTitle | Journal of King Saud University. Computer and information sciences |
| PublicationYear | 2024 |
| Publisher | Elsevier B.V Elsevier |
| Publisher_xml | – sequence: 0 name: Elsevier B.V – name: Elsevier |
| References | Mohammadi, Nakhkash, Akhaee (b25) 2020; 30 Yin, She, Tang, Luo (b39) 2021; 187 Ge, Chen, Qian, Wang (b8) 2019; 29 London (b23) 2019; 49 Li, Wang, Wang, Ma, Wang, Shi (b19) 2021; 553 Zang, Yuan, Wei (b40) 2021; 2021 Mao, Chen, He, Yang (b24) 2022; 198 Abdel-Nabi, Al-Haj (b1) 2021; 27 Zhang, Wang, Ke, Kong, Di (b42) 2022; 44 He, Xiong, Wang (b11) 2021; 16 Huo, Zhou, Yuan, Yi, Zhang, Zhou (b13) 2019; 383 Yang, Wang, Wang, Guo, Hu (b35) 2023; 133 Du, Yin, Zhang (b4) 2020; 19 Fu, Kong, Yao, Tang, Qin (b7) 2019; 494 Humayun, Hamid, Jhanjhi, Suseendran, Talib (b12) 2021; 1979 University of Southern California (b32) 2022 Jolfaei, Wu, Muthukkumarasamy (b15) 2016; 11 École Centrale de Lille (b5) 2022 Yin, Abel, Tang, Zhang, Luo (b38) 2016; 76 Liu, Pun (b22) 2020; 19 Zhang, Luo (b41) 2022; 32 Liu, Pun (b21) 2018; 433–434 Delgado, Llorente (b3) 2022; 61 Fan, Pan, Gao, Gao, Zhang (b6) 2021; 180 Wang, He (b33) 2022; 24 Yi, Zhou (b36) 2019; 21 Liu, Liu (b20) 2019; 45 Qu, He, Zhang, Chen (b28) 2020; 65 Ravi, Subramaniam (b29) 2017; 12 Khelifi (b17) 2018; 143 Solanke, Biasiotti (b31) 2022; 36 Shirisha, Prasad (b30) 2020 Ge, Zhang, Yang (b9) 2021; 38 Hamid, Yousuf, Chowhan (b10) 2023; 6 Qu, Chen, He, Yuan (b26) 2019; 37 Wu, Xu, Qiao, Pan, Liao (b34) 2022; 27 Qu, He, Chen (b27) 2022; 32 Yi, Zhou (b37) 2021; 27 Zhang, Wang, Liu, Liu (b43) 2016; 27 Kahate, Raut (b16) 2022; 12 Ahmed, George, Hadi (b2) 2022; 1 Hussien, Xiong, Liu (b14) 2023; 40 Lanteri (b18) 2018; 29 Liu (10.1016/j.jksuci.2024.102217_b21) 2018; 433–434 Zhang (10.1016/j.jksuci.2024.102217_b41) 2022; 32 Qu (10.1016/j.jksuci.2024.102217_b27) 2022; 32 Zhang (10.1016/j.jksuci.2024.102217_b42) 2022; 44 Shirisha (10.1016/j.jksuci.2024.102217_b30) 2020 Mao (10.1016/j.jksuci.2024.102217_b24) 2022; 198 Zang (10.1016/j.jksuci.2024.102217_b40) 2021; 2021 Ge (10.1016/j.jksuci.2024.102217_b8) 2019; 29 Yang (10.1016/j.jksuci.2024.102217_b35) 2023; 133 Humayun (10.1016/j.jksuci.2024.102217_b12) 2021; 1979 Zhang (10.1016/j.jksuci.2024.102217_b43) 2016; 27 École Centrale de Lille (10.1016/j.jksuci.2024.102217_b5) 2022 Fu (10.1016/j.jksuci.2024.102217_b7) 2019; 494 Qu (10.1016/j.jksuci.2024.102217_b28) 2020; 65 Fan (10.1016/j.jksuci.2024.102217_b6) 2021; 180 Li (10.1016/j.jksuci.2024.102217_b19) 2021; 553 Yin (10.1016/j.jksuci.2024.102217_b39) 2021; 187 Ravi (10.1016/j.jksuci.2024.102217_b29) 2017; 12 Yin (10.1016/j.jksuci.2024.102217_b38) 2016; 76 Jolfaei (10.1016/j.jksuci.2024.102217_b15) 2016; 11 Yi (10.1016/j.jksuci.2024.102217_b37) 2021; 27 Wang (10.1016/j.jksuci.2024.102217_b33) 2022; 24 Kahate (10.1016/j.jksuci.2024.102217_b16) 2022; 12 Qu (10.1016/j.jksuci.2024.102217_b26) 2019; 37 Abdel-Nabi (10.1016/j.jksuci.2024.102217_b1) 2021; 27 He (10.1016/j.jksuci.2024.102217_b11) 2021; 16 Ge (10.1016/j.jksuci.2024.102217_b9) 2021; 38 Delgado (10.1016/j.jksuci.2024.102217_b3) 2022; 61 Hussien (10.1016/j.jksuci.2024.102217_b14) 2023; 40 Khelifi (10.1016/j.jksuci.2024.102217_b17) 2018; 143 Lanteri (10.1016/j.jksuci.2024.102217_b18) 2018; 29 Solanke (10.1016/j.jksuci.2024.102217_b31) 2022; 36 Yi (10.1016/j.jksuci.2024.102217_b36) 2019; 21 Liu (10.1016/j.jksuci.2024.102217_b22) 2020; 19 University of Southern California (10.1016/j.jksuci.2024.102217_b32) 2022 Du (10.1016/j.jksuci.2024.102217_b4) 2020; 19 Liu (10.1016/j.jksuci.2024.102217_b20) 2019; 45 Mohammadi (10.1016/j.jksuci.2024.102217_b25) 2020; 30 Hamid (10.1016/j.jksuci.2024.102217_b10) 2023; 6 Ahmed (10.1016/j.jksuci.2024.102217_b2) 2022; 1 London (10.1016/j.jksuci.2024.102217_b23) 2019; 49 Huo (10.1016/j.jksuci.2024.102217_b13) 2019; 383 Wu (10.1016/j.jksuci.2024.102217_b34) 2022; 27 |
| References_xml | – volume: 30 start-page: 2366 year: 2020 end-page: 2376 ident: b25 article-title: A high-capacity reversible data hiding in encrypted images employing local difference predictor publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 19 start-page: 1382 year: 2020 end-page: 1394 ident: b22 article-title: Reversible data hiding in encrypted images using chunk encryption and redundancy matrix representation publication-title: IEEE Trans. Dependable Secure Comput. – volume: 2021 start-page: 1 year: 2021 end-page: 12 ident: b40 article-title: Research on pseudorandom number generator based on several new types of piecewise chaotic maps publication-title: Math. Probl. Eng. – volume: 44 start-page: 4337 year: 2022 end-page: 4347 ident: b42 article-title: Reversible data hiding in encrypted images based on polynomial secret sharing publication-title: J. Electron. Inform. Technol. – volume: 65 start-page: 2623 year: 2020 end-page: 2638 ident: b28 article-title: Reversible data hiding in encrypted images based on prediction and adaptive classification scrambling publication-title: Comput. Mater. Continua – year: 2022 ident: b5 article-title: Bows-2 web page – volume: 12 start-page: 3961 year: 2017 end-page: 3977 ident: b29 article-title: Optimized wavelet filters and modified huffman encoding-based compression and chaotic encryption for image data publication-title: Int. J. Appl. Eng. Res. – year: 2022 ident: b32 article-title: SIPI image database – volume: 76 start-page: 3899 year: 2016 end-page: 3920 ident: b38 article-title: Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification publication-title: Multimedia Tools Appl. – volume: 553 start-page: 19 year: 2021 end-page: 30 ident: b19 article-title: An encrypted coverless information hiding method based on generative models publication-title: Inform. Sci. – volume: 27 start-page: 125 year: 2022 end-page: 149 ident: b34 article-title: Review of reversible data hiding based on the spatial domain of images publication-title: J. Image Graphics – start-page: 960 year: 2020 end-page: 965 ident: b30 article-title: A survey on reversible data hiding techniques publication-title: Lect. Notes Electr. Eng. – volume: 29 start-page: 2285 year: 2019 end-page: 2295 ident: b8 article-title: A high capacity multi-level approach for reversible data hiding in encrypted images publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 12 start-page: 507 year: 2022 end-page: 518 ident: b16 article-title: Comprehensive analysis of privacy attacks in online social network: Security issues and challenges publication-title: Int. J. Saf. Secur. Eng. – volume: 49 start-page: 15 year: 2019 end-page: 21 ident: b23 article-title: Artificial intelligence and black-box medical decisions: Accuracy versus explainability publication-title: Hastings Cent. Rep. – volume: 32 start-page: 920 year: 2022 end-page: 932 ident: b27 article-title: On the security of block permutation and Co-XOR in reversible data hiding publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 1979 year: 2021 ident: b12 article-title: 5G network security issues, challenges, opportunities and future directions: A survey publication-title: J. Phys. Conf. Ser. – volume: 198 start-page: 108577 year: 2022 ident: b24 article-title: Reversible data hiding based on adaptive IPVO and two-segment pairwise PEE publication-title: Signal Process. – volume: 38 year: 2021 ident: b9 article-title: Reversible information hiding scheme in a large-capacity ciphertext domain based on peano curve scanning publication-title: Appl. Res. Comput. – volume: 11 start-page: 235 year: 2016 end-page: 246 ident: b15 article-title: On the security of permutation-only image encryption schemes publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 36 start-page: 1 year: 2022 end-page: 19 ident: b31 article-title: Digital forensics AI: Evaluating, standardizing and optimizing digital evidence mining techniques publication-title: KI - Künstliche Intelligenz – volume: 1 start-page: 8 year: 2022 end-page: 14 ident: b2 article-title: Images compression using combined scheme of transform coding publication-title: J. Eng. Res. Sci. – volume: 6 start-page: 24 year: 2023 end-page: 39 ident: b10 article-title: Security in health information management records through blockchain technology: A review publication-title: J. Inform. Secur. Cybercrimes Res. – volume: 29 start-page: 1850067 year: 2018 ident: b18 article-title: Hilbert curves of quadric fibrations publication-title: Int. J. Math. – volume: 27 start-page: 1328 year: 2016 end-page: 1348 ident: b43 article-title: Survey on cloud computing security publication-title: J. Softw. – volume: 19 start-page: 1420 year: 2020 end-page: 1433 ident: b4 article-title: High capacity lossless data hiding in JPEG bitstream based on general VLC mapping publication-title: IEEE Trans. Dependable Secure Comput. – volume: 494 start-page: 21 year: 2019 end-page: 36 ident: b7 article-title: Effective reversible data hiding in encrypted image with adaptive encoding strategy publication-title: Inform. Sci. – volume: 45 start-page: 188 year: 2019 end-page: 193 ident: b20 article-title: Convolutional neural network compression method based on LZW coding publication-title: Comput. Eng. – volume: 32 start-page: 7359 year: 2022 end-page: 7372 ident: b41 article-title: Vector-based efficient data hiding in encrypted images via multi-MSB replacement publication-title: IEEE Trans. Circuits Syst. Video Technol. – volume: 383 start-page: 915 year: 2019 end-page: 922 ident: b13 article-title: Image encryption using exclusive-OR with DNA complementary rules and double random phase encoding publication-title: Phys. Lett. A – volume: 180 year: 2021 ident: b6 article-title: Reversible data hiding method based on combining IPVO with bias-added rhombus predictor by multi-predictor mechanism publication-title: Signal Process. – volume: 143 start-page: 336 year: 2018 end-page: 345 ident: b17 article-title: On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain publication-title: Signal Process. – volume: 21 start-page: 51 year: 2019 end-page: 64 ident: b36 article-title: Separable and reversible data hiding in encrypted images using parametric binary tree labeling publication-title: IEEE Trans. Multimed. – volume: 16 start-page: 3000 year: 2021 end-page: 3012 ident: b11 article-title: Reversible data hiding based on adaptive multiple histograms modification publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 37 start-page: 631 year: 2019 end-page: 642 ident: b26 article-title: Security analysis of image encryption algorithm based on bit plane-pixel block scrambling publication-title: J. Appl. Sci. Electron. Inform. Eng. – volume: 433–434 start-page: 188 year: 2018 end-page: 203 ident: b21 article-title: Reversible data-hiding in encrypted images by redundant space transfer publication-title: Inform. Sci. – volume: 133 start-page: 103872 year: 2023 ident: b35 article-title: A fast deconvolution method for multiple sound source localization based on Hilbert curve publication-title: Digit. Signal Process. – volume: 40 start-page: 3663 year: 2023 end-page: 3691 ident: b14 article-title: Reversible data-hiding exploiting huffman encoding in dual image using weighted matrix and generalized exploiting modification direction (GEMD) publication-title: Vis. Comput. – volume: 61 start-page: e172 year: 2022 end-page: e182 ident: b3 article-title: Fair aspects of a health information protection and management system publication-title: Methods Inf. Med. – volume: 187 start-page: 108146 year: 2021 ident: b39 article-title: Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement publication-title: Signal Process. – volume: 27 start-page: 229 year: 2021 end-page: 245 ident: b1 article-title: Reversible data hiding in adjacent zeros publication-title: Multimedia Syst. – volume: 24 start-page: 1288 year: 2022 end-page: 1298 ident: b33 article-title: High capacity reversible data hiding in encrypted image based on adaptive MSB prediction publication-title: IEEE Trans. Multimed. – volume: 27 start-page: 40 year: 2021 end-page: 46 ident: b37 article-title: Research progress and review on reversible information hiding in encrypted domain publication-title: J. People’s Public Secur. Univ. China (Sci. Technol.) – volume: 24 start-page: 1288 year: 2022 ident: 10.1016/j.jksuci.2024.102217_b33 article-title: High capacity reversible data hiding in encrypted image based on adaptive MSB prediction publication-title: IEEE Trans. Multimed. doi: 10.1109/TMM.2021.3062699 – volume: 45 start-page: 188 issue: 09 year: 2019 ident: 10.1016/j.jksuci.2024.102217_b20 article-title: Convolutional neural network compression method based on LZW coding publication-title: Comput. Eng. – volume: 133 start-page: 103872 year: 2023 ident: 10.1016/j.jksuci.2024.102217_b35 article-title: A fast deconvolution method for multiple sound source localization based on Hilbert curve publication-title: Digit. Signal Process. doi: 10.1016/j.dsp.2022.103872 – volume: 32 start-page: 7359 year: 2022 ident: 10.1016/j.jksuci.2024.102217_b41 article-title: Vector-based efficient data hiding in encrypted images via multi-MSB replacement publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2022.3183391 – volume: 61 start-page: e172 year: 2022 ident: 10.1016/j.jksuci.2024.102217_b3 article-title: Fair aspects of a health information protection and management system publication-title: Methods Inf. Med. doi: 10.1055/s-0042-1758765 – volume: 6 start-page: 24 year: 2023 ident: 10.1016/j.jksuci.2024.102217_b10 article-title: Security in health information management records through blockchain technology: A review publication-title: J. Inform. Secur. Cybercrimes Res. doi: 10.26735/QBIJ3667 – volume: 65 start-page: 2623 year: 2020 ident: 10.1016/j.jksuci.2024.102217_b28 article-title: Reversible data hiding in encrypted images based on prediction and adaptive classification scrambling publication-title: Comput. Mater. Continua doi: 10.32604/cmc.2020.09723 – volume: 27 start-page: 40 issue: 02 year: 2021 ident: 10.1016/j.jksuci.2024.102217_b37 article-title: Research progress and review on reversible information hiding in encrypted domain publication-title: J. People’s Public Secur. Univ. China (Sci. Technol.) – volume: 27 start-page: 1328 issue: 6 year: 2016 ident: 10.1016/j.jksuci.2024.102217_b43 article-title: Survey on cloud computing security publication-title: J. Softw. – start-page: 960 year: 2020 ident: 10.1016/j.jksuci.2024.102217_b30 article-title: A survey on reversible data hiding techniques publication-title: Lect. Notes Electr. Eng. doi: 10.1007/978-981-15-1420-3_105 – volume: 2021 start-page: 1 year: 2021 ident: 10.1016/j.jksuci.2024.102217_b40 article-title: Research on pseudorandom number generator based on several new types of piecewise chaotic maps publication-title: Math. Probl. Eng. – volume: 11 start-page: 235 year: 2016 ident: 10.1016/j.jksuci.2024.102217_b15 article-title: On the security of permutation-only image encryption schemes publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2489178 – volume: 21 start-page: 51 year: 2019 ident: 10.1016/j.jksuci.2024.102217_b36 article-title: Separable and reversible data hiding in encrypted images using parametric binary tree labeling publication-title: IEEE Trans. Multimed. doi: 10.1109/TMM.2018.2844679 – volume: 1979 year: 2021 ident: 10.1016/j.jksuci.2024.102217_b12 article-title: 5G network security issues, challenges, opportunities and future directions: A survey publication-title: J. Phys. Conf. Ser. doi: 10.1088/1742-6596/1979/1/012037 – volume: 19 start-page: 1382 issue: 2 year: 2020 ident: 10.1016/j.jksuci.2024.102217_b22 article-title: Reversible data hiding in encrypted images using chunk encryption and redundancy matrix representation publication-title: IEEE Trans. Dependable Secure Comput. – volume: 494 start-page: 21 year: 2019 ident: 10.1016/j.jksuci.2024.102217_b7 article-title: Effective reversible data hiding in encrypted image with adaptive encoding strategy publication-title: Inform. Sci. doi: 10.1016/j.ins.2019.04.043 – volume: 29 start-page: 2285 year: 2019 ident: 10.1016/j.jksuci.2024.102217_b8 article-title: A high capacity multi-level approach for reversible data hiding in encrypted images publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2018.2863029 – volume: 198 start-page: 108577 year: 2022 ident: 10.1016/j.jksuci.2024.102217_b24 article-title: Reversible data hiding based on adaptive IPVO and two-segment pairwise PEE publication-title: Signal Process. doi: 10.1016/j.sigpro.2022.108577 – volume: 1 start-page: 8 year: 2022 ident: 10.1016/j.jksuci.2024.102217_b2 article-title: Images compression using combined scheme of transform coding publication-title: J. Eng. Res. Sci. doi: 10.55708/js0109002 – volume: 12 start-page: 3961 issue: 13 year: 2017 ident: 10.1016/j.jksuci.2024.102217_b29 article-title: Optimized wavelet filters and modified huffman encoding-based compression and chaotic encryption for image data publication-title: Int. J. Appl. Eng. Res. – volume: 187 start-page: 108146 year: 2021 ident: 10.1016/j.jksuci.2024.102217_b39 article-title: Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement publication-title: Signal Process. doi: 10.1016/j.sigpro.2021.108146 – volume: 44 start-page: 4337 issue: 12 year: 2022 ident: 10.1016/j.jksuci.2024.102217_b42 article-title: Reversible data hiding in encrypted images based on polynomial secret sharing publication-title: J. Electron. Inform. Technol. – volume: 37 start-page: 631 issue: 05 year: 2019 ident: 10.1016/j.jksuci.2024.102217_b26 article-title: Security analysis of image encryption algorithm based on bit plane-pixel block scrambling publication-title: J. Appl. Sci. Electron. Inform. Eng. – volume: 27 start-page: 125 issue: 01 year: 2022 ident: 10.1016/j.jksuci.2024.102217_b34 article-title: Review of reversible data hiding based on the spatial domain of images publication-title: J. Image Graphics – volume: 49 start-page: 15 year: 2019 ident: 10.1016/j.jksuci.2024.102217_b23 article-title: Artificial intelligence and black-box medical decisions: Accuracy versus explainability publication-title: Hastings Cent. Rep. doi: 10.1002/hast.973 – year: 2022 ident: 10.1016/j.jksuci.2024.102217_b32 – volume: 76 start-page: 3899 year: 2016 ident: 10.1016/j.jksuci.2024.102217_b38 article-title: Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-016-4049-z – volume: 30 start-page: 2366 year: 2020 ident: 10.1016/j.jksuci.2024.102217_b25 article-title: A high-capacity reversible data hiding in encrypted images employing local difference predictor publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2020.2990952 – volume: 19 start-page: 1420 issue: 2 year: 2020 ident: 10.1016/j.jksuci.2024.102217_b4 article-title: High capacity lossless data hiding in JPEG bitstream based on general VLC mapping publication-title: IEEE Trans. Dependable Secure Comput. – volume: 16 start-page: 3000 year: 2021 ident: 10.1016/j.jksuci.2024.102217_b11 article-title: Reversible data hiding based on adaptive multiple histograms modification publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2021.3069173 – volume: 27 start-page: 229 year: 2021 ident: 10.1016/j.jksuci.2024.102217_b1 article-title: Reversible data hiding in adjacent zeros publication-title: Multimedia Syst. doi: 10.1007/s00530-020-00732-y – volume: 433–434 start-page: 188 year: 2018 ident: 10.1016/j.jksuci.2024.102217_b21 article-title: Reversible data-hiding in encrypted images by redundant space transfer publication-title: Inform. Sci. doi: 10.1016/j.ins.2017.12.044 – volume: 36 start-page: 1 year: 2022 ident: 10.1016/j.jksuci.2024.102217_b31 article-title: Digital forensics AI: Evaluating, standardizing and optimizing digital evidence mining techniques publication-title: KI - Künstliche Intelligenz doi: 10.1007/s13218-022-00763-9 – volume: 32 start-page: 920 year: 2022 ident: 10.1016/j.jksuci.2024.102217_b27 article-title: On the security of block permutation and Co-XOR in reversible data hiding publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2021.3069811 – volume: 383 start-page: 915 year: 2019 ident: 10.1016/j.jksuci.2024.102217_b13 article-title: Image encryption using exclusive-OR with DNA complementary rules and double random phase encoding publication-title: Phys. Lett. A doi: 10.1016/j.physleta.2018.12.011 – volume: 12 start-page: 507 year: 2022 ident: 10.1016/j.jksuci.2024.102217_b16 article-title: Comprehensive analysis of privacy attacks in online social network: Security issues and challenges publication-title: Int. J. Saf. Secur. Eng. – volume: 143 start-page: 336 year: 2018 ident: 10.1016/j.jksuci.2024.102217_b17 article-title: On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain publication-title: Signal Process. doi: 10.1016/j.sigpro.2017.09.020 – year: 2022 ident: 10.1016/j.jksuci.2024.102217_b5 – volume: 40 start-page: 3663 year: 2023 ident: 10.1016/j.jksuci.2024.102217_b14 article-title: Reversible data-hiding exploiting huffman encoding in dual image using weighted matrix and generalized exploiting modification direction (GEMD) publication-title: Vis. Comput. – volume: 553 start-page: 19 year: 2021 ident: 10.1016/j.jksuci.2024.102217_b19 article-title: An encrypted coverless information hiding method based on generative models publication-title: Inform. Sci. doi: 10.1016/j.ins.2020.12.002 – volume: 29 start-page: 1850067 year: 2018 ident: 10.1016/j.jksuci.2024.102217_b18 article-title: Hilbert curves of quadric fibrations publication-title: Int. J. Math. doi: 10.1142/S0129167X18500672 – volume: 180 year: 2021 ident: 10.1016/j.jksuci.2024.102217_b6 article-title: Reversible data hiding method based on combining IPVO with bias-added rhombus predictor by multi-predictor mechanism publication-title: Signal Process. doi: 10.1016/j.sigpro.2020.107888 – volume: 38 issue: 12 year: 2021 ident: 10.1016/j.jksuci.2024.102217_b9 article-title: Reversible information hiding scheme in a large-capacity ciphertext domain based on peano curve scanning publication-title: Appl. Res. Comput. |
| SSID | ssj0001765436 |
| Score | 2.3094566 |
| Snippet | The separable reversible data hiding in encrypted domain (RDH-ED) algorithm leaves out the embedding space for the information before or after encryption and... |
| SourceID | doaj crossref elsevier |
| SourceType | Open Website Index Database Publisher |
| StartPage | 102217 |
| SubjectTerms | Global intra-block bit-plane scrambling High-security Key conversion Known plaintext attack Reversible data hiding in encrypted domain Separability |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQJxbeiPKSB9YIJ05iZwQEqpBgolIHJMuOzzSlTVEfA_8en5NAJ1jYIufh6M7OPXLfd4RcmQwsEqtFzHIepSDSqAAtI8MAEmGsyB3mO56e88EwfRxlo41WX1gT1tADN4K7zhnI1E9kC5750MVKYAZYaa2ULiuygCNnstgIpkJ2RSBmMkCLEKUT-3XZ4eZCcdfkfbkuKx8eJimSFyShX9mPXQr0_RvmacPkPOyRndZXpDfNO-6TLagPyG7Xh4G22_KQvLbc0XSJyXOgfnTxGT4FVE_f5j78H8-od079eWT6NlOgSNy08LvBH2KNKB1XaMNoVXc3g6V2PtNVfUSGD_cvd4Oo7ZoQlTyJV5EzzFmrwViJvziLEknkeQlOiNJhXzHvcjCtNYdcAEtKhLJKo7FLlZDOGX5MevW8hhNCuXFIl2ZtjEmP3Jmk9OFNbo1xPItF3CdRJzP10ZBjqK5qbKIaGSuUsWpk3Ce3KNjva5HaOgx4hatW4eovhfeJ6NSiWi-hsf7-UdWv05_-x_RnZBsf2cARz0lvtVjDhfdLVuYyLMEvDI3g_Q priority: 102 providerName: Directory of Open Access Journals |
| Title | General secure encryption algorithm for separable reversible data hiding in encrypted domain |
| URI | https://dx.doi.org/10.1016/j.jksuci.2024.102217 https://doaj.org/article/60e84becd935446d8e0be0cdd88f5957 |
| Volume | 36 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library issn: 1319-1578 databaseCode: KQ8 dateStart: 19960101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html omitProxy: true ssIdentifier: ssj0001765436 providerName: Colorado Alliance of Research Libraries – providerCode: PRVESC databaseName: ScienceDirect Free & Delayed Access Titles issn: 1319-1578 databaseCode: IXB dateStart: 19960101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0001765436 providerName: Elsevier – providerCode: PRVAVX databaseName: Springer Nature HAS Fully OA issn: 1319-1578 databaseCode: AAJSJ dateStart: 0 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.springernature.com omitProxy: true ssIdentifier: ssj0001765436 providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT4QwEG6MXrz4Nq6PTQ9emwUKtBxXo9FN9KImezAhlE5d1pU1iAf_vZ1SfFw8eINCgUyn82LmG0JOVQIagdVYoDlnMYiYZVBIpgKASCgtUoPxjpvb9OohnkyT6Qo572thMK3Sy_5Opjtp7UdGnpqj16oa3YWWe0JEY4-d4YtFfDyW2L7henr2HWcRWD3pioywXgcn9BV0Ls1r_vz2XlbWUYxihDGIXOeybw3lgPx_KKofyudyi2x4q5GOuw_bJitQ75DNviMD9Rt0lzx6FGn6hmF0oHa0-XBCgRaLp2VTtbMXas1Uex0xv9UCKEI4NXZf2EPMFqWzCrUZrep-Mmiqly9FVe-Rh8uL-_Mr5vsnsJJHYcuMCozWBSgt8WdnViKcPC_BCFEa7DBmjY-gKAoOqYAgKrGoVaoC-1UJaYzi-2S1XtZwQChXBoHTtA4x_JEaFZXW0Um1UoYnoQgHhPU0y187mIy8zx-b5x2Nc6Rx3tF4QM6QsF_3Isi1G1g2T7lf5TwNQMaWx3TGE-u1agmBgqDUWkqTZIl9iOiXJf_FM_ZR1Z-vP_z3zCOyjmddNeIxWW2bdzixZkmrhmRtPJ7cTYbOrR86LvwEE9zj7A |
| linkProvider | Elsevier |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELZ4DLDwRrzxwBo1iZM4GQFRlVcXitQByYrjM02BFKXpwL_H5yS0LAxskRM70fl8Pl_u-46QCxmCQmI1x1WMOQHwwEkgjR3pAvhcKh5pjHc89qPec3A3DIdL5LrFwmBaZWP7a5turXXT0mmk2fnM886TZ7THQzb2wDq-yTJZDULjnSCKb3g1D7RwhE9alBECdrBHC6GzeV7jt-ksy81J0Q-Qx8C3pcvmW5Rl8l_YqRZ2n-4W2WjcRnpZf9k2WYJih2y2JRlos0J3yUtDI02nGEcHalrLL2sVaPr-OinzavRBjZ9q7iPpt3wHihxOpVkY5hLTRekox-2M5kXbGRRVk480L_bIc_dmcN1zmgIKTsZ8r3K0dLVSKUgV49_OJEM-eZaB5jzTWGLMeB9umqYMIg6unyGqNZYpFqzisdaS7ZOVYlLAAaFMamROU8rD-EekpZ-Zk06kpNQs9Lh3SJxWZuKz5skQbQLZWNQyFihjUcv4kFyhYH-eRZZr2zApX0UzzSJyIQ6MkqmEhebYqmJwJbiZUnGswyQ0g_B2WsQvpTFD5X--_ujfPc_JWm_w-CAebvv3x2Qd79TQxBOyUpUzODU-SiXPrA5-Axzm5JE |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=General+secure+encryption+algorithm+for+separable+reversible+data+hiding+in+encrypted+domain&rft.jtitle=Journal+of+King+Saud+University.+Computer+and+information+sciences&rft.au=Wan%2C+Hongli&rft.au=Zhang%2C+Minqing&rft.au=Ke%2C+Yan&rft.au=Jiang%2C+Zongbao&rft.date=2024-11-01&rft.issn=1319-1578&rft.volume=36&rft.issue=9&rft.spage=102217&rft_id=info:doi/10.1016%2Fj.jksuci.2024.102217&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jksuci_2024_102217 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1319-1578&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1319-1578&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1319-1578&client=summon |