Integrated Hamming Coding Operation to Reversible Data Hiding Scheme for Encrypted Images

Yi Hui Chen, Pei Yu Lin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Cloud service is a convenient but insecure platform, which might suffer from the potential security risks, such as personal privacy leakage and illegal broadcasting. This paper proposed a reversible data embedding scheme in encrypted images using hamming coding. The sensitive data can be embedded into an encrypted image for privacy preserving. Later, the encrypted image can be restored back to the original one after extracting the hidden data. In comparison with schemes [1]-[5], the proposed scheme provides higher hiding capacity. The experiments show the positive result to confirm its feasibility.

Original languageEnglish
Title of host publicationProceedings - 22nd IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2021-Fall
EditorsHer-Terng Yau, Roland Stenzel, Mei-Ling Shyu, Hsiung-Cheng Lin
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages198-201
Number of pages4
ISBN (Electronic)9781665404037
DOIs
StatePublished - 2021
Event22nd IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2021-Fall - Virtual, Taichung, Taiwan
Duration: 24 11 202126 11 2021

Publication series

NameProceedings - 22nd IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2021-Fall

Conference

Conference22nd IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2021-Fall
Country/TerritoryTaiwan
CityVirtual, Taichung
Period24/11/2126/11/21

Bibliographical note

Publisher Copyright:
© 2021 IEEE.

Keywords

  • Hamming coding
  • Image encryption
  • Reversible data hiding

Fingerprint

Dive into the research topics of 'Integrated Hamming Coding Operation to Reversible Data Hiding Scheme for Encrypted Images'. Together they form a unique fingerprint.

Cite this