CLC number:
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 0000-00-00
Cited: 0
Clicked: 767
Yongning GUO, Guodong SU, Zhiqiang YAO, Wang ZHOU. Reversible data hiding scheme for encrypted JPEG bitstreams using adaptive RZLs rotation*#[J]. Frontiers of Information Technology & Electronic Engineering, 1998, -1(-1): .
@article{title="Reversible data hiding scheme for encrypted JPEG bitstreams using adaptive RZLs rotation*#",
author="Yongning GUO, Guodong SU, Zhiqiang YAO, Wang ZHOU",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="-1",
number="-1",
pages="",
year="1998",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2300749"
}
%0 Journal Article
%T Reversible data hiding scheme for encrypted JPEG bitstreams using adaptive RZLs rotation*#
%A Yongning GUO
%A Guodong SU
%A Zhiqiang YAO
%A Wang ZHOU
%J Journal of Zhejiang University SCIENCE C
%V -1
%N -1
%P
%@ 2095-9184
%D 1998
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2300749
TY - JOUR
T1 - Reversible data hiding scheme for encrypted JPEG bitstreams using adaptive RZLs rotation*#
A1 - Yongning GUO
A1 - Guodong SU
A1 - Zhiqiang YAO
A1 - Wang ZHOU
J0 - Journal of Zhejiang University Science C
VL - -1
IS - -1
SP -
EP -
%@ 2095-9184
Y1 - 1998
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2300749
Abstract: JPEG format is extensively used for images in many practical applications due to its excellent compression ratio and satisfactory image quality. Considering compelling concerns about the invasion of privacy, this paper proposes an effective reversible data hiding scheme for encrypted JPEG bitstreams, to provide security and privacy for both secret messages and valuable carriers. First, a format-compatibility and file size preserving encryption algorithm is applied to encipher the plaintext JPEG image into a noise-like version. Then, we present an effective reversible data hiding scheme in encrypted JPEG bitstreams using adaptive RZLs rotation, where the secret messages are concealed with the sequence of RZL pairs. When the authorized user receives the marked encrypted JPEG bitstreams, the error-free extraction of secret messages and the lossless recovery of the original plaintext JPEG image can be accomplished separately. Extensive experiments are conducted to show that, compared to some state-of-the-art schemes, the proposed scheme has a superior performance in terms of embedding capacity, while keeping file size preservation and format compatibility.
Open peer comments: Debate/Discuss/Question/Opinion
<1>