Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Soft Computing and Intelligent Systems: Techniques and Applications
Guest editors: Sabu M. Thampi, El-Sayed M. El-Alfy and Ljiljana Trajkovic
Article type: Research Article
Authors: Anushiadevi, R.a | Amirtharajan, Rengarajanb; *
Affiliations: [a] School of Computing, SASTRA Deemed University, Thirumalaisamudram, Thanjavur, India | [b] School of Electrical & Electronics Engineering (SEEE), SASTRA Deemed University, Thirumalaisamudram, Thanjavur, India
Correspondence: [*] Corresponding author. Rengarajan Amirtharajan, School of Electrical & Electronics Engineering (SEEE), SASTRA Deemed University, Thirumalaisamudram, Thanjavur, India. E-mail: amir@ece.sastra.edu.
Abstract: Reversible Data Hiding (RDH) schemes have recently gained much interest in protecting the secret information and sensitive cover images. For cloud security applications, the third party’s data embedding can be done (e.g., cloud service). In such a scenario, to protect the cover image from unauthorized access, it is essential to encrypt before embedding it. It can be overcome by combining the RDH scheme with encryption. However, the key challenge in integrating RDH with encryption is that the correlation between adjacent pixels begins to disappear after encryption, so reversibility cannot be accomplished. RDH with elliptic curve cryptography is proposed to overcome this challenge. In this paper (ECC-RDH) by adopting additive homomorphism property; the proposed method, the stego image decryption gives the sum of the original image and confidential data. The significant advantages of this method are, the cover image is transferred with high security, the embedding capacity is 0.5 bpp with a smaller location map size of 0.05 bpp. The recovered image and secrets are the same as in the original, and thus 100% reversibility is proved.
Keywords: Elliptic curve cryptography, reversible data hiding, additive homomorphism, lossless data hiding, reversible steganography
DOI: 10.3233/JIFS-189878
Journal: Journal of Intelligent & Fuzzy Systems, vol. 41, no. 5, pp. 5583-5594, 2021
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl