H. Cheng's scientific contributions

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (1)


Reversible data hiding for encrypted image based on image blocks grouping
  • Article

May 2016

·

47 Reads

·

241 Citations

H. Cheng

·

Z. Wang

·

X. Zhang

In order to achieve better performance, a reversible data hiding scheme for encrypted image was proposed based on image block grouping. Using this scheme, the original image of the content owner was encrypted by exploiting a stream cipher. When obtaining an encrypted image by the content owner, the encrypted image was divided into non-overlapping blocks by the data-hider, and the image blocks were grouped by the data hiding key. Subsequently, additional data was embedded into the encrypted image by modifying one of the image blocks in each group. With an encrypted image containing additional data, the receiver can readily gain decrypted version similar to the original image using the encryption key. Meanwhile, with the aid of spatial correlation in natural image, he or she can perfectly recover the original image and correctly extract additional data by comparing the smoothness of image blocks in each group. Experimented result shows that the proposed scheme can acquire a higher payload with good image quality. Furthermore, this scheme is suitable for practical application due to its simple operation and easy realization. © 2016, Editorial Department of Journal of Beijing University of Technology. All right reserved.

Share

Citations (1)


... The initial image, which is built on a VRAE framework, was immediately encrypted using conventional image encryption algorithms such stream cipher and the advanced encryption standard (AES) in the early Data Concealment approaches [20], [21], [22], [23], [24], and [25]. The encrypted image in [20] is split up into many chunks. ...

Reference:

Secure Image Sharing: Innovating Encryption and Concealment Methods
Reversible data hiding for encrypted image based on image blocks grouping
  • Citing Article
  • May 2016