{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T02:08:55Z","timestamp":1740103735986,"version":"3.37.3"},"reference-count":31,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T00:00:00Z","timestamp":1603324800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572444"],"award-info":[{"award-number":["61572444"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2020,10,22]]},"abstract":"<jats:p>With the development of cloud computing, high-capacity reversible data hiding in an encrypted image (RDHEI) has attracted increasing attention. The main idea of RDHEI is that an image owner encrypts a cover image, and then a data hider embeds secret information in the encrypted image. With the information hiding key, a receiver can extract the embedded data from the hidden image; with the encryption key, the receiver reconstructs the original image. In this paper, we can embed data in the form of random bits or scanned documents. The proposed method takes full advantage of the spatial correlation in the original images to vacate the room for embedding information before image encryption. By jointly using Sudoku and Arnold chaos encryption, the encrypted images retain the vacated room. Before the data hiding phase, the secret information is preprocessed by a halftone, quadtree, and S-BOX transformation. The experimental results prove that the proposed method not only realizes high-capacity reversible data hiding in encrypted images but also reconstructs the original image completely.<\/jats:p>","DOI":"10.1155\/2020\/6989452","type":"journal-article","created":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T00:35:16Z","timestamp":1603413316000},"page":"1-12","source":"Crossref","is-referenced-by-count":3,"title":["High-Capacity Reversible Data Hiding in Encrypted Images by Information Preprocessing"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0648-0343","authenticated-orcid":true,"given":"Xi-Yan","family":"Li","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University, Zhengzhou 450001, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6497-8118","authenticated-orcid":true,"given":"Xia-Bing","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Soochow University, Suzhou 215006, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1156-1108","authenticated-orcid":true,"given":"Qing-Lei","family":"Zhou","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University, Zhengzhou 450001, China"},{"name":"School of Information Engineering of, Zhengzhou University, Zhengzhou 450001, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2538-0738","authenticated-orcid":true,"given":"Shi-Jing","family":"Han","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University, Zhengzhou 450001, China"},{"name":"Nanning Normal University, Nanning 530000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2456-0868","authenticated-orcid":true,"given":"Zheng","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University, Zhengzhou 450001, China"},{"name":"Henan University of Animal Husbandry and Economy, School of Information on Engineering, Zhengzhou 450001, China"}]}],"member":"311","reference":[{"first-page":"197","article-title":"Invertible authentication","author":"J. Fridrich","key":"1"},{"first-page":"572","article-title":"Lossless data embedding for all image formats","author":"J. Fridrich","key":"2"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2004.840686"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2003.815962"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2004.828418"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2006.891046"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2012.07.025"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2014.05.003"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.01.002"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2006.869964"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.09.005"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2008.12.017"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2015.2423678"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.06.023"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2015.09.014"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.07.021"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.12.023"},{"article-title":"Reversible data hiding in encrypted images based on MSB prediction and huffman coding","year":"2019","author":"Y. Xiang","key":"18"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2799381"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.043"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.03.016"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.04.032"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.12.044"},{"issue":"6","key":"24","first-page":"1211","article-title":"Reversible data hiding in encrypted image based on neighborhood prediction using XOR-permutation encryption","volume":"55","author":"Y. Shu","year":"2018","journal-title":"Journal of Computer Research and Development"},{"key":"25","first-page":"127","article-title":"Lossless and reversible data hiding in encrypted images with public key cryptography","volume":"10","author":"M. Bartwal","year":"2017","journal-title":"Rice"},{"article-title":"High-capacity reversible data hiding in encrypted images using MSB prediction","author":"P. Puteaux","key":"26","doi-asserted-by":"crossref","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-319"},{"volume-title":"Ergodic Problems of Classical Mechanics","year":"1968","author":"V. I. Arnold","key":"27"},{"issue":"2","key":"28","first-page":"123","article-title":"Data-hiding based on Sudoku and generalized exploiting modification direction","volume":"16","author":"J.-C. Cheng","year":"2018","journal-title":"Journal of Electronic Science and Technology"},{"article-title":"High capacity image data hiding of scanned text documents using improved quadtree","year":"2018","author":"S. H. Soleymani","key":"29"},{"volume-title":"Modern Cryptography","year":"2008","author":"L. Chen","key":"30"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1080\/13682199.2017.1355089"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/6989452.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/6989452.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/6989452.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T00:35:25Z","timestamp":1603413325000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/complexity\/2020\/6989452\/"}},"subtitle":[],"editor":[{"given":"Toshikazu","family":"Kuniya","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,10,22]]},"references-count":31,"alternative-id":["6989452","6989452"],"URL":"https:\/\/doi.org\/10.1155\/2020\/6989452","relation":{},"ISSN":["1099-0526","1076-2787"],"issn-type":[{"type":"electronic","value":"1099-0526"},{"type":"print","value":"1076-2787"}],"subject":[],"published":{"date-parts":[[2020,10,22]]}}}