Rebuttal: On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction
Prior to the publication of our article in 2018, to our knowledge, there were no methods of achieving a favourable trade-off between the payload in bits-per-pixel (bpp) and the quality of the reconstructed image in terms of PSNR or SSIM. Indeed, a high payload value would lead to a degradation of th...
Saved in:
| Published in | IEEE transactions on information forensics and security Vol. 16; pp. 2445 - 2446 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
New York
IEEE
2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Institute of Electrical and Electronics Engineers |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1556-6013 1556-6021 1556-6021 |
| DOI | 10.1109/TIFS.2021.3055630 |
Cover
| Abstract | Prior to the publication of our article in 2018, to our knowledge, there were no methods of achieving a favourable trade-off between the payload in bits-per-pixel (bpp) and the quality of the reconstructed image in terms of PSNR or SSIM. Indeed, a high payload value would lead to a degradation of the reconstructed image's quality. Moreover, it should also be noted that almost all of the other state-of-the-art methods at the time, were based on Least Significant Bit (LSB) substitution and made little use of the redundancy between pixels in the clear domain to realize the data embedding of a secret message. In our proposed work <xref ref-type="bibr" rid="ref2">[2] , we have taken the opposing view by developing a Most Significant Bits (MSB) prediction-based reversible data hiding in encrypted images (RDHEI) method. In the EPE-HCRDH approach, the original image is encrypted without modification and information about the location of all pixels which cannot be correctly predicted is embedded by MSB substitution. In order to localize the prediction errors, flags of consecutive bits equal to 1 are used. With this information, the data hider can detect all the bits which can be marked and substitute them with bits of a secret message. In this case, the payload is slightly lower than 1 bpp, but perfect reversibility is achieved. So, the proposed EPE-HCRDH approach provides a high payload with a little complexity. But as highlighted by Dragoi and Coltuc <xref ref-type="bibr" rid="ref1">[1] , the fact of using flags, so that the data hider can embed a secret message introduces security flaws in the method. Despite this, the method has attracted the attention of many researchers, with 100 citations (according to Google Scholar on November 9, 2020) in several peer-reviewed journals of excellent reputation (IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY <xref ref-type="bibr" rid="ref3">[3] , IEEE TRANSACTIONS ON MULTIMEDIA <xref ref-type="bibr" rid="ref4">[4] -<xref ref-type="bibr" rid="ref5"/><xref ref-type="bibr" rid="ref6"/><xref ref-type="bibr" rid="ref7">[7] , IEEE ACCESS <xref ref-type="bibr" rid="ref8">[8] , IEEE TRANSACTIONS ON SIGNAL PROCESSING, and IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING <xref ref-type="bibr" rid="ref9">[9] . Today, we can say that high capacity RDHEI has become a hot topic. |
|---|---|
| AbstractList | Prior to the publication of our article in 2018, to our knowledge, there were no methods of achieving a favourable trade-off between the payload in bits-per-pixel (bpp) and the quality of the reconstructed image in terms of PSNR or SSIM. Indeed, a high payload value would lead to a degradation of the reconstructed image's quality. Moreover, it should also be noted that almost all of the other state-of-the-art methods at the time, were based on Least Significant Bit (LSB) substitution and made little use of the redundancy between pixels in the clear domain to realize the data embedding of a secret message. In our proposed work <xref ref-type="bibr" rid="ref2">[2] , we have taken the opposing view by developing a Most Significant Bits (MSB) prediction-based reversible data hiding in encrypted images (RDHEI) method. In the EPE-HCRDH approach, the original image is encrypted without modification and information about the location of all pixels which cannot be correctly predicted is embedded by MSB substitution. In order to localize the prediction errors, flags of consecutive bits equal to 1 are used. With this information, the data hider can detect all the bits which can be marked and substitute them with bits of a secret message. In this case, the payload is slightly lower than 1 bpp, but perfect reversibility is achieved. So, the proposed EPE-HCRDH approach provides a high payload with a little complexity. But as highlighted by Dragoi and Coltuc <xref ref-type="bibr" rid="ref1">[1] , the fact of using flags, so that the data hider can embed a secret message introduces security flaws in the method. Despite this, the method has attracted the attention of many researchers, with 100 citations (according to Google Scholar on November 9, 2020) in several peer-reviewed journals of excellent reputation (IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY <xref ref-type="bibr" rid="ref3">[3] , IEEE TRANSACTIONS ON MULTIMEDIA <xref ref-type="bibr" rid="ref4">[4] -<xref ref-type="bibr" rid="ref5"/><xref ref-type="bibr" rid="ref6"/><xref ref-type="bibr" rid="ref7">[7] , IEEE ACCESS <xref ref-type="bibr" rid="ref8">[8] , IEEE TRANSACTIONS ON SIGNAL PROCESSING, and IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING <xref ref-type="bibr" rid="ref9">[9] . Today, we can say that high capacity RDHEI has become a hot topic. Prior to the publication of our article in 2018, to our knowledge, there were no methods of achieving a favourable trade-off between the payload in bits-per-pixel (bpp) and the quality of the reconstructed image in terms of PSNR or SSIM. Indeed, a high payload value would lead to a degradation of the reconstructed image’s quality. Moreover, it should also be noted that almost all of the other state-of-the-art methods at the time, were based on Least Significant Bit (LSB) substitution and made little use of the redundancy between pixels in the clear domain to realize the data embedding of a secret message. In our proposed work [2] , we have taken the opposing view by developing a Most Significant Bits (MSB) prediction-based reversible data hiding in encrypted images (RDHEI) method. In the EPE-HCRDH approach, the original image is encrypted without modification and information about the location of all pixels which cannot be correctly predicted is embedded by MSB substitution. In order to localize the prediction errors, flags of consecutive bits equal to 1 are used. With this information, the data hider can detect all the bits which can be marked and substitute them with bits of a secret message. In this case, the payload is slightly lower than 1 bpp, but perfect reversibility is achieved. So, the proposed EPE-HCRDH approach provides a high payload with a little complexity. But as highlighted by Dragoi and Coltuc [1] , the fact of using flags, so that the data hider can embed a secret message introduces security flaws in the method. Despite this, the method has attracted the attention of many researchers, with 100 citations (according to Google Scholar on November 9, 2020) in several peer-reviewed journals of excellent reputation (IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY [3] , IEEE TRANSACTIONS ON MULTIMEDIA [4] – [7] , IEEE ACCESS [8] , IEEE TRANSACTIONS ON SIGNAL PROCESSING, and IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING [9] . Today, we can say that high capacity RDHEI has become a hot topic. This rebuttal is a response to the correspondence [3] from Dragoi and Coltuc about the security flaws in our proposed approach, "Embedded Prediction Errors-based High Capacity Reversible Data Hiding (EPE-HCRDH) in encrypted images" published in IEEE Transactions on Information Forensics and Security in 2018 [4]. After providing an examination of the EPE-HCRDH approach, we detail several solutions that have already been proposed using state-of-the-art methods. Through visual security level analysis, we show that the very recent methods described are efficient to correct the security flaws. |
| Author | Puech, William Puteaux, Pauline |
| Author_xml | – sequence: 1 givenname: Pauline orcidid: 0000-0002-3236-4664 surname: Puteaux fullname: Puteaux, Pauline email: pauline.puteaux_@lirmm.fr organization: Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier, Centre National de la Recherche Scientifique, University of Montpellier, Montpellier, France – sequence: 2 givenname: William orcidid: 0000-0001-9383-2401 surname: Puech fullname: Puech, William email: william.puech_@lirmm.fr organization: Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier, Centre National de la Recherche Scientifique, University of Montpellier, Montpellier, France |
| BackLink | https://hal.science/hal-03161509$$DView record in HAL |
| BookMark | eNp9kU1P3DAQhi1EJT7aH1BxscSph13GceKNuVG-dqWtqFh66MlynDEYBWexHar8-yYKohJIPc1o9D4zr18fkF3feiTkK4M5YyBP7lZXm3kGGZtzKArBYYfss6GZiWG2-9YzvkcOYnwEyHMmyn3y-xarLiXdnNIbT9MD0g2aLrjU09bSW3zBEF3VIL3QSdOlq52_p87TS29Cv01Y09WTvsdIq57-2HynPwPWziTX-s_kk9VNxC-v9ZD8urq8O1_O1jfXq_Oz9czwBaSZRAt5XYCtKoPGQrUwEgyKvJaA1oishgxkqSuRS8OYQckEs0VhazRGMMEPSTbt7fxW939006htcE869IqBGsNRydmoxnDUazgD9G2CHvQ_eaudWp6t1TgDPpwpQL6wQXs8abehfe4wJvXYdsEPb1JZLrOyKMtstMEmlQltjAHtBxfjF713sXjHGJf0GF4K2jX_JY8m0iHi2yXJc-Bywf8CapSdtA |
| CODEN | ITIFA6 |
| CitedBy_id | crossref_primary_10_1007_s11227_024_06712_7 crossref_primary_10_3390_e24020284 crossref_primary_10_1007_s00371_022_02613_z crossref_primary_10_1007_s11042_023_15939_0 crossref_primary_10_1109_ACCESS_2022_3171578 crossref_primary_10_3390_s22051773 |
| Cites_doi | 10.1109/TCSVT.2020.2992817 10.1109/TMM.2018.2844679 10.1109/TMM.2020.2985537 10.1109/TIFS.2018.2799381 10.1109/WIFS.2018.8630788 10.1016/j.jvcir.2018.12.023 10.1109/WIFS.2018.8630785 10.1109/TMM.2019.2936314 10.1109/ACCESS.2019.2916355 10.1109/TMM.2019.2952979 10.1109/TDSC.2020.3019490 10.1109/TIFS.2020.3006382 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 Distributed under a Creative Commons Attribution 4.0 International License |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 – notice: Distributed under a Creative Commons Attribution 4.0 International License |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D 1XC VOOES ADTOC UNPAY |
| DOI | 10.1109/TIFS.2021.3055630 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Hyper Article en Ligne (HAL) Hyper Article en Ligne (HAL) (Open Access) Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Civil Engineering Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1556-6021 |
| EndPage | 2446 |
| ExternalDocumentID | oai:HAL:hal-03161509v1 10_1109_TIFS_2021_3055630 9340397 |
| Genre | comment-reply |
| GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D 1XC VOOES ADTOC UNPAY |
| ID | FETCH-LOGICAL-c370t-9ef04d50fbbcecf0b7c90ce64d90efc62d02098ab649c11ce9161f55fdecc6163 |
| IEDL.DBID | UNPAY |
| ISSN | 1556-6013 1556-6021 |
| IngestDate | Sun Oct 26 04:12:25 EDT 2025 Tue Oct 14 20:43:43 EDT 2025 Sun Jun 29 16:45:08 EDT 2025 Wed Oct 01 03:15:43 EDT 2025 Thu Apr 24 23:09:51 EDT 2025 Wed Aug 27 02:50:46 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | reversible data hiding Image encryption MSB prediction image security |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0 other-oa |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c370t-9ef04d50fbbcecf0b7c90ce64d90efc62d02098ab649c11ce9161f55fdecc6163 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-3236-4664 0000-0001-9383-2401 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://hal.science/hal-03161509 |
| PQID | 2492858826 |
| PQPubID | 85506 |
| PageCount | 2 |
| ParticipantIDs | unpaywall_primary_10_1109_tifs_2021_3055630 crossref_primary_10_1109_TIFS_2021_3055630 crossref_citationtrail_10_1109_TIFS_2021_3055630 hal_primary_oai_HAL_hal_03161509v1 ieee_primary_9340397 proquest_journals_2492858826 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20210000 2021-00-00 20210101 2021 |
| PublicationDateYYYYMMDD | 2021-01-01 |
| PublicationDate_xml | – year: 2021 text: 20210000 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on information forensics and security |
| PublicationTitleAbbrev | TIFS |
| PublicationYear | 2021 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Institute of Electrical and Electronics Engineers |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) – name: Institute of Electrical and Electronics Engineers |
| References | ref8 ref12 ref7 ref9 ref4 ref3 ref6 ref11 ref10 ref5 ref2 ref1 |
| References_xml | – ident: ref3 doi: 10.1109/TCSVT.2020.2992817 – ident: ref4 doi: 10.1109/TMM.2018.2844679 – ident: ref7 doi: 10.1109/TMM.2020.2985537 – ident: ref2 doi: 10.1109/TIFS.2018.2799381 – ident: ref11 doi: 10.1109/WIFS.2018.8630788 – ident: ref12 doi: 10.1016/j.jvcir.2018.12.023 – ident: ref10 doi: 10.1109/WIFS.2018.8630785 – ident: ref5 doi: 10.1109/TMM.2019.2936314 – ident: ref8 doi: 10.1109/ACCESS.2019.2916355 – ident: ref6 doi: 10.1109/TMM.2019.2952979 – ident: ref9 doi: 10.1109/TDSC.2020.3019490 – ident: ref1 doi: 10.1109/TIFS.2020.3006382 |
| SSID | ssj0044168 |
| Score | 2.378994 |
| Snippet | Prior to the publication of our article in 2018, to our knowledge, there were no methods of achieving a favourable trade-off between the payload in... This rebuttal is a response to the correspondence [3] from Dragoi and Coltuc about the security flaws in our proposed approach, "Embedded Prediction... |
| SourceID | unpaywall hal proquest crossref ieee |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 2445 |
| SubjectTerms | Computer Science Cryptography and Security Embedding Encryption Flags Flaw detection Forensics Image coding Image encryption Image quality Image reconstruction image security Labeling MSB prediction Multimedia Payloads Pixels Predictions Redundancy reversible data hiding Security Signal and Image Processing Signal processing Substitutes Transaction processing Visualization |
| SummonAdditionalLinks | – databaseName: IEEE Electronic Library (IEL) dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fb9MwED6tewEeGGygdRvIQjwB6ZwmcWLeBqzqEAVEN2k8Rf4pKkpatQmo_PWcEydaASHeouiiOLnz3Xf2-TuApyKVNNRSB5EMM0xQlAgkajfgTMSCRjrWddeSyXs2vorfXifXO_CiOwtjjKmLz8zAXdZ7-XqhKrdUdsqjmGL87EEvzVhzVqv1uhjVm2NvScICTDIiv4MZUn56eTGaYiY4DAeeD2srBvW-uArIurXKFsq8VRVLsfkh5vMbAWe0B5N2qE2dyddBVcqB-vkbi-P_fss9uOuRJzlrTOU-7JhiH_barg7ET_J9uHODovAAPuP_r0pE6C_Jh4IgWiRT3_GOLCz5ZOqqDjk35I0oBRnPXCgks4KcF2q1WSKcJRff0GWtidyQyfQV-bhyO0POGh7A1ej88vU48O0YAhWltAy4sTTWCbVSKqMslaniVBkWa06NVWyoEXryTEgWcxWGyiDyDG2SWI1mwhD3PYTdYlGYQyA6ppnkyiC4k86DiGFolWU2dfRhKjV9oK2CcuW5yl3LjHle5yyU506nudNp7nXah2fdI8uGqONfwk9Q652co9gen73L3T10co4jn38P-3Dg1NZJeY314aQ1ktzP93XueBezBLMV1ofnneH8MZByZtdbAzn6-zuO4baTapZ6TmC3XFXmEYKfUj6urf4X1kH9ug priority: 102 providerName: IEEE |
| Title | Rebuttal: On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction |
| URI | https://ieeexplore.ieee.org/document/9340397 https://www.proquest.com/docview/2492858826 https://hal.science/hal-03161509 |
| UnpaywallVersion | submittedVersion |
| Volume | 16 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1556-6021 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0044168 issn: 1556-6021 databaseCode: RIE dateStart: 20060101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fb9MwED5t3QPigcEGWtCYLMQTKMVuEqfmrcCqDrEx0VXaniL_1CpKVrXppvLXc06dsoI0iTcrukhO7vP5O_n8HcAbmSvKjDJxolgXExQtY4XejQWXqaSJSU3dteT0jA9G6ZfL7HILSHMX5hoZZ4j9fhwj5rxkudiGHZ4h227BzujsvHdVy6BmPMZ8Ivkz7rBwcMmoeF-Nndfj7rB2kMHa2Hq2r33hY91RZYNcPlqUU7m8k5PJvX2mv7uqd5zX8oS-vORHe1Gptv71l3jjQ5_wFJ4Ekkl6K1Q8gy1b7sFu08CBhPW8B4_vqRHuwxX-6kWFZPwD-VYSJIZkGJrbkRtHvtu6gENNLPksK0kGY7_rkXFJjks9W06RuZKTnxid5kQtyenwIzmf-UMg7_jnMOofX3waxKHzQqyTnFaxsI6mJqNOKW21oyrXgmrLUyOodZp3DLJM0ZWKp0Izpi2STOayzBlEBEeK9wJa5U1pD4CYlHaV0BZ5nPLBQnaY04673CuF6dxGQBunFDrIkvvuGJOiTk-oKC5O-sPC-7EIfozg7fqV6UqT4yHj1-iEtZ1X0x70vhb-WeOYWxbBvgfC2kokKUWiFsFhA4wiLO154SUWuxkmJjyCd2uw_DMRj76Nibz8L-tDaFWzhX2FjKdSR_W1xKMA_d90Wvr2 |
| linkProvider | Unpaywall |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9NAEB215VA4UGhBGAqsECfA6TpeO1luBRo5kBREUqk9Wd4vERGcKLFB4dcza6-tBhDiZlm78lpvdubNfrwBeJ71BA2UUH4ogj4mKDLzBaLr8zhjGQ0VU1XVkvF5nFyw95fR5Q68au_CaK2rw2e6Yx-rvXy1kKVdKjvhIaMYP3fhRsQYi-rbWo3fxbheX3yLotjHNCN0e5gB5SfT4WCCuWA36DhFrK0otPvFnoGsiqts8cz9Ml9mmx_ZfH4t5AwOYNwMtj5p8rVTFqIjf_6m4_i_f3MHbjvuSU5rY7kLOzo_hIOmrgNx0_wQbl0TKTyCK0SgLJCjvyYfc4J8kUxczTuyMOSzrs51iLkm77IiI8nMBkMyy8lZLlebJRJaMvyGTmtNxIaMJ2_Ip5XdG7L2cA8uBmfTt4nvCjL4MuzRwufaUKYiaoSQWhoqepJTqWOmONVGxl2F5JP3MxEzLoNAauSegYkio9BQYmR-92EvX-T6ARDFaF9wqZHeCetDsm5gpIlNzwqIyZ72gDYApdKplduiGfO0ylooTy2mqcU0dZh68KLtsqylOv7V-Bmi3razItvJ6Si179DNWZV8_j3w4MjC1rZyiHlw3BhJ6mb8OrXKi_0I85XYg5et4fwxkGJm1lsDefj3bzyF_WQ6HqWj4fmHR3DT9qgXfo5hr1iV-jFSoUI8qWbAL0NeARY |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1db9MwFL3augfEA4MNRNCYLMQTKMVuEqfeWxmrOsTGRFdpe4r8qVWUrGpTpvLruU6dsoI0iTcrupGcnGP7XOXmXIC3MleUGWXiRLEuJihaxgrRjQWXqaSJSU3dteTsnA9G6eer7GoLSPMvzA0qzrD3-3GMnPOW5WIbdniGarsFO6Pzi951bYOa8RjzieTPuMPCh0tGxYdq7Lwfd4e1gw3WxtGzfeMLH-uOKhvi8tGinMrlnZxM7p0z_d1VveO8tif05SXf24tKtfWvv8wbH3qEp_AkiEzSW7HiGWzZcg92mwYOJKznPXh8z41wH67xVS8qFONH5GtJUBiSYWhuR24d-WbrAg41seSTrCQZjP2pR8YlOSn1bDlF5UpOf-DuNCdqSc6GH8nFzH8E8sA_h1H_5PJ4EIfOC7FOclrFwjqamow6pbTVjqpcC6otT42g1mneMagyRVcqngrNmLYoMpnLMmeQERwl3gtolbelfQnEpLSrhLao45TfLGSHOe24y71TmM5tBLQBpdDBltx3x5gUdXpCRXF52h8WHsci4BjBu_Ut05Unx0PBbxCEdZx30x70vhT-WgPMTxbBvifCOkokKUWhFsFBQ4wiLO154S0WuxkmJjyC92uy_DMRz76Nibz6r-gDaFWzhX2NiqdSh4H0vwGXzfn1 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Rebuttal%3A+On+the+Security+of+Reversible+Data+Hiding+in+Encrypted+Images+by+MSB+Prediction&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Puteaux%2C+Pauline&rft.au=Puech%2C+William&rft.date=2021&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=16&rft.spage=2445&rft.epage=2446&rft_id=info:doi/10.1109%2FTIFS.2021.3055630&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TIFS_2021_3055630 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon |