Rebuttal: On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction

Prior to the publication of our article in 2018, to our knowledge, there were no methods of achieving a favourable trade-off between the payload in bits-per-pixel (bpp) and the quality of the reconstructed image in terms of PSNR or SSIM. Indeed, a high payload value would lead to a degradation of th...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information forensics and security Vol. 16; pp. 2445 - 2446
Main Authors Puteaux, Pauline, Puech, William
Format Journal Article
LanguageEnglish
Published New York IEEE 2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Institute of Electrical and Electronics Engineers
Subjects
Online AccessGet full text
ISSN1556-6013
1556-6021
1556-6021
DOI10.1109/TIFS.2021.3055630

Cover

Abstract Prior to the publication of our article in 2018, to our knowledge, there were no methods of achieving a favourable trade-off between the payload in bits-per-pixel (bpp) and the quality of the reconstructed image in terms of PSNR or SSIM. Indeed, a high payload value would lead to a degradation of the reconstructed image's quality. Moreover, it should also be noted that almost all of the other state-of-the-art methods at the time, were based on Least Significant Bit (LSB) substitution and made little use of the redundancy between pixels in the clear domain to realize the data embedding of a secret message. In our proposed work <xref ref-type="bibr" rid="ref2">[2] , we have taken the opposing view by developing a Most Significant Bits (MSB) prediction-based reversible data hiding in encrypted images (RDHEI) method. In the EPE-HCRDH approach, the original image is encrypted without modification and information about the location of all pixels which cannot be correctly predicted is embedded by MSB substitution. In order to localize the prediction errors, flags of consecutive bits equal to 1 are used. With this information, the data hider can detect all the bits which can be marked and substitute them with bits of a secret message. In this case, the payload is slightly lower than 1 bpp, but perfect reversibility is achieved. So, the proposed EPE-HCRDH approach provides a high payload with a little complexity. But as highlighted by Dragoi and Coltuc <xref ref-type="bibr" rid="ref1">[1] , the fact of using flags, so that the data hider can embed a secret message introduces security flaws in the method. Despite this, the method has attracted the attention of many researchers, with 100 citations (according to Google Scholar on November 9, 2020) in several peer-reviewed journals of excellent reputation (IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY <xref ref-type="bibr" rid="ref3">[3] , IEEE TRANSACTIONS ON MULTIMEDIA <xref ref-type="bibr" rid="ref4">[4] -<xref ref-type="bibr" rid="ref5"/><xref ref-type="bibr" rid="ref6"/><xref ref-type="bibr" rid="ref7">[7] , IEEE ACCESS <xref ref-type="bibr" rid="ref8">[8] , IEEE TRANSACTIONS ON SIGNAL PROCESSING, and IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING <xref ref-type="bibr" rid="ref9">[9] . Today, we can say that high capacity RDHEI has become a hot topic.
AbstractList Prior to the publication of our article in 2018, to our knowledge, there were no methods of achieving a favourable trade-off between the payload in bits-per-pixel (bpp) and the quality of the reconstructed image in terms of PSNR or SSIM. Indeed, a high payload value would lead to a degradation of the reconstructed image's quality. Moreover, it should also be noted that almost all of the other state-of-the-art methods at the time, were based on Least Significant Bit (LSB) substitution and made little use of the redundancy between pixels in the clear domain to realize the data embedding of a secret message. In our proposed work <xref ref-type="bibr" rid="ref2">[2] , we have taken the opposing view by developing a Most Significant Bits (MSB) prediction-based reversible data hiding in encrypted images (RDHEI) method. In the EPE-HCRDH approach, the original image is encrypted without modification and information about the location of all pixels which cannot be correctly predicted is embedded by MSB substitution. In order to localize the prediction errors, flags of consecutive bits equal to 1 are used. With this information, the data hider can detect all the bits which can be marked and substitute them with bits of a secret message. In this case, the payload is slightly lower than 1 bpp, but perfect reversibility is achieved. So, the proposed EPE-HCRDH approach provides a high payload with a little complexity. But as highlighted by Dragoi and Coltuc <xref ref-type="bibr" rid="ref1">[1] , the fact of using flags, so that the data hider can embed a secret message introduces security flaws in the method. Despite this, the method has attracted the attention of many researchers, with 100 citations (according to Google Scholar on November 9, 2020) in several peer-reviewed journals of excellent reputation (IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY <xref ref-type="bibr" rid="ref3">[3] , IEEE TRANSACTIONS ON MULTIMEDIA <xref ref-type="bibr" rid="ref4">[4] -<xref ref-type="bibr" rid="ref5"/><xref ref-type="bibr" rid="ref6"/><xref ref-type="bibr" rid="ref7">[7] , IEEE ACCESS <xref ref-type="bibr" rid="ref8">[8] , IEEE TRANSACTIONS ON SIGNAL PROCESSING, and IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING <xref ref-type="bibr" rid="ref9">[9] . Today, we can say that high capacity RDHEI has become a hot topic.
Prior to the publication of our article in 2018, to our knowledge, there were no methods of achieving a favourable trade-off between the payload in bits-per-pixel (bpp) and the quality of the reconstructed image in terms of PSNR or SSIM. Indeed, a high payload value would lead to a degradation of the reconstructed image’s quality. Moreover, it should also be noted that almost all of the other state-of-the-art methods at the time, were based on Least Significant Bit (LSB) substitution and made little use of the redundancy between pixels in the clear domain to realize the data embedding of a secret message. In our proposed work [2] , we have taken the opposing view by developing a Most Significant Bits (MSB) prediction-based reversible data hiding in encrypted images (RDHEI) method. In the EPE-HCRDH approach, the original image is encrypted without modification and information about the location of all pixels which cannot be correctly predicted is embedded by MSB substitution. In order to localize the prediction errors, flags of consecutive bits equal to 1 are used. With this information, the data hider can detect all the bits which can be marked and substitute them with bits of a secret message. In this case, the payload is slightly lower than 1 bpp, but perfect reversibility is achieved. So, the proposed EPE-HCRDH approach provides a high payload with a little complexity. But as highlighted by Dragoi and Coltuc [1] , the fact of using flags, so that the data hider can embed a secret message introduces security flaws in the method. Despite this, the method has attracted the attention of many researchers, with 100 citations (according to Google Scholar on November 9, 2020) in several peer-reviewed journals of excellent reputation (IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY [3] , IEEE TRANSACTIONS ON MULTIMEDIA [4] – [7] , IEEE ACCESS [8] , IEEE TRANSACTIONS ON SIGNAL PROCESSING, and IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING [9] . Today, we can say that high capacity RDHEI has become a hot topic.
This rebuttal is a response to the correspondence [3] from Dragoi and Coltuc about the security flaws in our proposed approach, "Embedded Prediction Errors-based High Capacity Reversible Data Hiding (EPE-HCRDH) in encrypted images" published in IEEE Transactions on Information Forensics and Security in 2018 [4]. After providing an examination of the EPE-HCRDH approach, we detail several solutions that have already been proposed using state-of-the-art methods. Through visual security level analysis, we show that the very recent methods described are efficient to correct the security flaws.
Author Puech, William
Puteaux, Pauline
Author_xml – sequence: 1
  givenname: Pauline
  orcidid: 0000-0002-3236-4664
  surname: Puteaux
  fullname: Puteaux, Pauline
  email: pauline.puteaux_@lirmm.fr
  organization: Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier, Centre National de la Recherche Scientifique, University of Montpellier, Montpellier, France
– sequence: 2
  givenname: William
  orcidid: 0000-0001-9383-2401
  surname: Puech
  fullname: Puech, William
  email: william.puech_@lirmm.fr
  organization: Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier, Centre National de la Recherche Scientifique, University of Montpellier, Montpellier, France
BackLink https://hal.science/hal-03161509$$DView record in HAL
BookMark eNp9kU1P3DAQhi1EJT7aH1BxscSph13GceKNuVG-dqWtqFh66MlynDEYBWexHar8-yYKohJIPc1o9D4zr18fkF3feiTkK4M5YyBP7lZXm3kGGZtzKArBYYfss6GZiWG2-9YzvkcOYnwEyHMmyn3y-xarLiXdnNIbT9MD0g2aLrjU09bSW3zBEF3VIL3QSdOlq52_p87TS29Cv01Y09WTvsdIq57-2HynPwPWziTX-s_kk9VNxC-v9ZD8urq8O1_O1jfXq_Oz9czwBaSZRAt5XYCtKoPGQrUwEgyKvJaA1oishgxkqSuRS8OYQckEs0VhazRGMMEPSTbt7fxW939006htcE869IqBGsNRydmoxnDUazgD9G2CHvQ_eaudWp6t1TgDPpwpQL6wQXs8abehfe4wJvXYdsEPb1JZLrOyKMtstMEmlQltjAHtBxfjF713sXjHGJf0GF4K2jX_JY8m0iHi2yXJc-Bywf8CapSdtA
CODEN ITIFA6
CitedBy_id crossref_primary_10_1007_s11227_024_06712_7
crossref_primary_10_3390_e24020284
crossref_primary_10_1007_s00371_022_02613_z
crossref_primary_10_1007_s11042_023_15939_0
crossref_primary_10_1109_ACCESS_2022_3171578
crossref_primary_10_3390_s22051773
Cites_doi 10.1109/TCSVT.2020.2992817
10.1109/TMM.2018.2844679
10.1109/TMM.2020.2985537
10.1109/TIFS.2018.2799381
10.1109/WIFS.2018.8630788
10.1016/j.jvcir.2018.12.023
10.1109/WIFS.2018.8630785
10.1109/TMM.2019.2936314
10.1109/ACCESS.2019.2916355
10.1109/TMM.2019.2952979
10.1109/TDSC.2020.3019490
10.1109/TIFS.2020.3006382
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
Distributed under a Creative Commons Attribution 4.0 International License
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
– notice: Distributed under a Creative Commons Attribution 4.0 International License
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
1XC
VOOES
ADTOC
UNPAY
DOI 10.1109/TIFS.2021.3055630
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Civil Engineering Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Hyper Article en Ligne (HAL)
Hyper Article en Ligne (HAL) (Open Access)
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Civil Engineering Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Civil Engineering Abstracts

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1556-6021
EndPage 2446
ExternalDocumentID oai:HAL:hal-03161509v1
10_1109_TIFS_2021_3055630
9340397
Genre comment-reply
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
1XC
VOOES
ADTOC
UNPAY
ID FETCH-LOGICAL-c370t-9ef04d50fbbcecf0b7c90ce64d90efc62d02098ab649c11ce9161f55fdecc6163
IEDL.DBID UNPAY
ISSN 1556-6013
1556-6021
IngestDate Sun Oct 26 04:12:25 EDT 2025
Tue Oct 14 20:43:43 EDT 2025
Sun Jun 29 16:45:08 EDT 2025
Wed Oct 01 03:15:43 EDT 2025
Thu Apr 24 23:09:51 EDT 2025
Wed Aug 27 02:50:46 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords reversible data hiding
Image encryption
MSB prediction
image security
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0
other-oa
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c370t-9ef04d50fbbcecf0b7c90ce64d90efc62d02098ab649c11ce9161f55fdecc6163
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-3236-4664
0000-0001-9383-2401
OpenAccessLink https://proxy.k.utb.cz/login?url=https://hal.science/hal-03161509
PQID 2492858826
PQPubID 85506
PageCount 2
ParticipantIDs unpaywall_primary_10_1109_tifs_2021_3055630
crossref_primary_10_1109_TIFS_2021_3055630
crossref_citationtrail_10_1109_TIFS_2021_3055630
hal_primary_oai_HAL_hal_03161509v1
ieee_primary_9340397
proquest_journals_2492858826
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20210000
2021-00-00
20210101
2021
PublicationDateYYYYMMDD 2021-01-01
PublicationDate_xml – year: 2021
  text: 20210000
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on information forensics and security
PublicationTitleAbbrev TIFS
PublicationYear 2021
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Institute of Electrical and Electronics Engineers
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
– name: Institute of Electrical and Electronics Engineers
References ref8
ref12
ref7
ref9
ref4
ref3
ref6
ref11
ref10
ref5
ref2
ref1
References_xml – ident: ref3
  doi: 10.1109/TCSVT.2020.2992817
– ident: ref4
  doi: 10.1109/TMM.2018.2844679
– ident: ref7
  doi: 10.1109/TMM.2020.2985537
– ident: ref2
  doi: 10.1109/TIFS.2018.2799381
– ident: ref11
  doi: 10.1109/WIFS.2018.8630788
– ident: ref12
  doi: 10.1016/j.jvcir.2018.12.023
– ident: ref10
  doi: 10.1109/WIFS.2018.8630785
– ident: ref5
  doi: 10.1109/TMM.2019.2936314
– ident: ref8
  doi: 10.1109/ACCESS.2019.2916355
– ident: ref6
  doi: 10.1109/TMM.2019.2952979
– ident: ref9
  doi: 10.1109/TDSC.2020.3019490
– ident: ref1
  doi: 10.1109/TIFS.2020.3006382
SSID ssj0044168
Score 2.378994
Snippet Prior to the publication of our article in 2018, to our knowledge, there were no methods of achieving a favourable trade-off between the payload in...
This rebuttal is a response to the correspondence [3] from Dragoi and Coltuc about the security flaws in our proposed approach, "Embedded Prediction...
SourceID unpaywall
hal
proquest
crossref
ieee
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2445
SubjectTerms Computer Science
Cryptography and Security
Embedding
Encryption
Flags
Flaw detection
Forensics
Image coding
Image encryption
Image quality
Image reconstruction
image security
Labeling
MSB prediction
Multimedia
Payloads
Pixels
Predictions
Redundancy
reversible data hiding
Security
Signal and Image Processing
Signal processing
Substitutes
Transaction processing
Visualization
SummonAdditionalLinks – databaseName: IEEE Electronic Library (IEL)
  dbid: RIE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fb9MwED6tewEeGGygdRvIQjwB6ZwmcWLeBqzqEAVEN2k8Rf4pKkpatQmo_PWcEydaASHeouiiOLnz3Xf2-TuApyKVNNRSB5EMM0xQlAgkajfgTMSCRjrWddeSyXs2vorfXifXO_CiOwtjjKmLz8zAXdZ7-XqhKrdUdsqjmGL87EEvzVhzVqv1uhjVm2NvScICTDIiv4MZUn56eTGaYiY4DAeeD2srBvW-uArIurXKFsq8VRVLsfkh5vMbAWe0B5N2qE2dyddBVcqB-vkbi-P_fss9uOuRJzlrTOU-7JhiH_barg7ET_J9uHODovAAPuP_r0pE6C_Jh4IgWiRT3_GOLCz5ZOqqDjk35I0oBRnPXCgks4KcF2q1WSKcJRff0GWtidyQyfQV-bhyO0POGh7A1ej88vU48O0YAhWltAy4sTTWCbVSKqMslaniVBkWa06NVWyoEXryTEgWcxWGyiDyDG2SWI1mwhD3PYTdYlGYQyA6ppnkyiC4k86DiGFolWU2dfRhKjV9oK2CcuW5yl3LjHle5yyU506nudNp7nXah2fdI8uGqONfwk9Q652co9gen73L3T10co4jn38P-3Dg1NZJeY314aQ1ktzP93XueBezBLMV1ofnneH8MZByZtdbAzn6-zuO4baTapZ6TmC3XFXmEYKfUj6urf4X1kH9ug
  priority: 102
  providerName: IEEE
Title Rebuttal: On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction
URI https://ieeexplore.ieee.org/document/9340397
https://www.proquest.com/docview/2492858826
https://hal.science/hal-03161509
UnpaywallVersion submittedVersion
Volume 16
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1556-6021
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0044168
  issn: 1556-6021
  databaseCode: RIE
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fb9MwED5t3QPigcEGWtCYLMQTKMVuEqfmrcCqDrEx0VXaniL_1CpKVrXppvLXc06dsoI0iTcrukhO7vP5O_n8HcAbmSvKjDJxolgXExQtY4XejQWXqaSJSU3dteT0jA9G6ZfL7HILSHMX5hoZZ4j9fhwj5rxkudiGHZ4h227BzujsvHdVy6BmPMZ8Ivkz7rBwcMmoeF-Nndfj7rB2kMHa2Hq2r33hY91RZYNcPlqUU7m8k5PJvX2mv7uqd5zX8oS-vORHe1Gptv71l3jjQ5_wFJ4Ekkl6K1Q8gy1b7sFu08CBhPW8B4_vqRHuwxX-6kWFZPwD-VYSJIZkGJrbkRtHvtu6gENNLPksK0kGY7_rkXFJjks9W06RuZKTnxid5kQtyenwIzmf-UMg7_jnMOofX3waxKHzQqyTnFaxsI6mJqNOKW21oyrXgmrLUyOodZp3DLJM0ZWKp0Izpi2STOayzBlEBEeK9wJa5U1pD4CYlHaV0BZ5nPLBQnaY04673CuF6dxGQBunFDrIkvvuGJOiTk-oKC5O-sPC-7EIfozg7fqV6UqT4yHj1-iEtZ1X0x70vhb-WeOYWxbBvgfC2kokKUWiFsFhA4wiLO154SUWuxkmJjyCd2uw_DMRj76Nibz8L-tDaFWzhX2FjKdSR_W1xKMA_d90Wvr2
linkProvider Unpaywall
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9NAEB215VA4UGhBGAqsECfA6TpeO1luBRo5kBREUqk9Wd4vERGcKLFB4dcza6-tBhDiZlm78lpvdubNfrwBeJ71BA2UUH4ogj4mKDLzBaLr8zhjGQ0VU1XVkvF5nFyw95fR5Q68au_CaK2rw2e6Yx-rvXy1kKVdKjvhIaMYP3fhRsQYi-rbWo3fxbheX3yLotjHNCN0e5gB5SfT4WCCuWA36DhFrK0otPvFnoGsiqts8cz9Ml9mmx_ZfH4t5AwOYNwMtj5p8rVTFqIjf_6m4_i_f3MHbjvuSU5rY7kLOzo_hIOmrgNx0_wQbl0TKTyCK0SgLJCjvyYfc4J8kUxczTuyMOSzrs51iLkm77IiI8nMBkMyy8lZLlebJRJaMvyGTmtNxIaMJ2_Ip5XdG7L2cA8uBmfTt4nvCjL4MuzRwufaUKYiaoSQWhoqepJTqWOmONVGxl2F5JP3MxEzLoNAauSegYkio9BQYmR-92EvX-T6ARDFaF9wqZHeCetDsm5gpIlNzwqIyZ72gDYApdKplduiGfO0ylooTy2mqcU0dZh68KLtsqylOv7V-Bmi3razItvJ6Si179DNWZV8_j3w4MjC1rZyiHlw3BhJ6mb8OrXKi_0I85XYg5et4fwxkGJm1lsDefj3bzyF_WQ6HqWj4fmHR3DT9qgXfo5hr1iV-jFSoUI8qWbAL0NeARY
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1db9MwFL3augfEA4MNRNCYLMQTKMVuEqfeWxmrOsTGRFdpe4r8qVWUrGpTpvLruU6dsoI0iTcrupGcnGP7XOXmXIC3MleUGWXiRLEuJihaxgrRjQWXqaSJSU3dteTsnA9G6eer7GoLSPMvzA0qzrD3-3GMnPOW5WIbdniGarsFO6Pzi951bYOa8RjzieTPuMPCh0tGxYdq7Lwfd4e1gw3WxtGzfeMLH-uOKhvi8tGinMrlnZxM7p0z_d1VveO8tif05SXf24tKtfWvv8wbH3qEp_AkiEzSW7HiGWzZcg92mwYOJKznPXh8z41wH67xVS8qFONH5GtJUBiSYWhuR24d-WbrAg41seSTrCQZjP2pR8YlOSn1bDlF5UpOf-DuNCdqSc6GH8nFzH8E8sA_h1H_5PJ4EIfOC7FOclrFwjqamow6pbTVjqpcC6otT42g1mneMagyRVcqngrNmLYoMpnLMmeQERwl3gtolbelfQnEpLSrhLao45TfLGSHOe24y71TmM5tBLQBpdDBltx3x5gUdXpCRXF52h8WHsci4BjBu_Ut05Unx0PBbxCEdZx30x70vhT-WgPMTxbBvifCOkokKUWhFsFBQ4wiLO154S0WuxkmJjyC92uy_DMRz76Nibz6r-gDaFWzhX2NiqdSh4H0vwGXzfn1
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Rebuttal%3A+On+the+Security+of+Reversible+Data+Hiding+in+Encrypted+Images+by+MSB+Prediction&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Puteaux%2C+Pauline&rft.au=Puech%2C+William&rft.date=2021&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=16&rft.spage=2445&rft.epage=2446&rft_id=info:doi/10.1109%2FTIFS.2021.3055630&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TIFS_2021_3055630
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon