{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T09:55:42Z","timestamp":1773741342986,"version":"3.50.1"},"reference-count":42,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T00:00:00Z","timestamp":1621555200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["19F020039"],"award-info":[{"award-number":["19F020039"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"name":"open fund of Anhui Provincial Key Laboratory of Network and Information Security","award":["AHNIS2019004"],"award-info":[{"award-number":["AHNIS2019004"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>With the rapid development of cloud storage, an increasing number of users store their images in the cloud. These images contain many business secrets or personal information, such as engineering design drawings and commercial contracts. Thus, users encrypt images before they are uploaded. However, cloud servers have to hide secret data in encrypted images to enable the retrieval and verification of massive encrypted images. To ensure that both the secret data and the original images can be extracted and recovered losslessly, researchers have proposed a method that is known as reversible data hiding in encrypted images (RDHEI). In this paper, a new RDHEI method using median edge detector (MED) and two\u2019s complement is proposed. The MED prediction method is used to generate the predicted values of the original pixels and calculate the prediction errors. The adaptive-length two\u2019s complement is used to encode the most prediction errors. To reserve room, the two\u2019s complement is labeled in the pixels. To record the unlabeled pixels, a label map is generated and embedded into the image. After the image has been encrypted, it can be embedded with the data. The experimental results indicate that the proposed method can reach an average embedding rate of 2.58 bpp, 3.04 bpp, and 2.94 bpp on the three datasets, i.e., UCID, BOSSbase, BOWS-2, which outperforms the previous work.<\/jats:p>","DOI":"10.3390\/sym13060921","type":"journal-article","created":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T02:32:43Z","timestamp":1621823563000},"page":"921","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Reversible Data Hiding in Encrypted Images Using Median Edge Detector and Two\u2019s Complement"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9721-2103","authenticated-orcid":false,"given":"Rui","family":"Wang","sequence":"first","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China"}]},{"given":"Guohua","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0017-9026","authenticated-orcid":false,"given":"Qiuhua","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China"}]},{"given":"Lifeng","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China"},{"name":"Anhui Provincial Key Laboratory of Network and Infomation Security, Wuhu 240002, China"}]},{"given":"Zhen","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China"}]},{"given":"Gongxun","family":"Miao","sequence":"additional","affiliation":[{"name":"Zhongfu Information Co., Ltd., Jinan 250101, China"}]}],"member":"1968","published-online":{"date-parts":[[2021,5,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","article-title":"Techniques for data hiding","volume":"35","author":"Bender","year":"1996","journal-title":"IBM Syst. J."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","article-title":"Hiding data in images by simple LSB substitution","volume":"37","author":"Chan","year":"2004","journal-title":"Pattern Recognit."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TIP.2004.840686","article-title":"Lossless generalized-LSB data embedding","volume":"14","author":"Celik","year":"2005","journal-title":"IEEE Trans. Image Process."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1109\/TCSVT.2009.2017409","article-title":"Reversible data hiding based on histogram modification of pixel differences","volume":"19","author":"Tai","year":"2009","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3823","DOI":"10.1007\/s11042-013-1801-5","article-title":"A novel reversible data hiding scheme based on AMBTC compression technique","volume":"74","author":"Lin","year":"2015","journal-title":"Multimedia Tools Appl."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"15803","DOI":"10.1007\/s11042-017-5156-1","article-title":"Recovery based high capacity reversible data hiding scheme using even-odd embedding","volume":"77","author":"Malik","year":"2018","journal-title":"Multimedia Tools Appl."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"22977","DOI":"10.1007\/s11042-019-7640-2","article-title":"An optimal high capacity reversible data hiding scheme using move to front coding for LZW codes","volume":"78","author":"Kumar","year":"2019","journal-title":"Multimedia Tools Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1779","DOI":"10.1109\/TIP.2014.2307482","article-title":"Local-prediction-based difference expansion reversible watermarking","volume":"23","author":"Dragoi","year":"2014","journal-title":"IEEE Trans. Image Process."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.sigpro.2017.02.001","article-title":"Multiple layer data hiding scheme based on difference expansion of quad","volume":"137","author":"Arham","year":"2017","journal-title":"Signal Process."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1049\/iet-ipr.2017.0151","article-title":"Reversible data hiding scheme based on significant-bit-difference expansion","volume":"11","author":"Wang","year":"2017","journal-title":"IET Image Process."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.jvcir.2015.05.005","article-title":"Reversible data hiding based on local histogram shifting with multilayer embedding","volume":"31","author":"Pan","year":"2015","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_13","first-page":"315","article-title":"Rate and distortion optimization for reversible data hiding using multiple histogram shifting","volume":"47","author":"Wang","year":"2016","journal-title":"IEEE Trans. Cybern."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.sigpro.2019.05.020","article-title":"Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting","volume":"163","author":"Jia","year":"2019","journal-title":"Signal Process."},{"key":"ref_15","first-page":"763","article-title":"A reversible data hiding scheme using pixel location","volume":"15","author":"Kumar","year":"2018","journal-title":"Int. Arab. J. Inf. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"13445","DOI":"10.1007\/s11042-017-4960-y","article-title":"An Improved Histogram-Shifting-Imitated reversible data hiding based on HVS characteristics","volume":"77","author":"Kumar","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_17","first-page":"146","article-title":"A reversible high capacity data hiding scheme using combinatorial strategy","volume":"3","author":"Kumar","year":"2018","journal-title":"Int. J. Multimedia Intell. Secur."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1469","DOI":"10.1109\/TMM.2016.2569497","article-title":"Reversible Data Hiding in Encrypted Images by Reversible Image Transformation","volume":"18","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Multimed."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Yang, C.T., Shih, W.C., Chen, G.H., and Yu, S.C. (2010, January 6\u20139). Implementation of a cloud computing environment for hiding huge amounts of data. Proceedings of the International Symposium on Parallel and Distributed Processing with Applications, Taipei, Taiwan.","DOI":"10.1109\/ISPA.2010.96"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Abbasy, M.R., and Shanmugam, B. (2011, January 4\u20139). Enabling data hiding for resource sharing in cloud computing environments based on DNA sequences. Proceedings of the 2011 IEEE World Congress on Services, Washington, DC, USA.","DOI":"10.1109\/SERVICES.2011.45"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MIC.2010.86","article-title":"Trusted cloud computing with secure resources and data coloring","volume":"14","author":"Hwang","year":"2010","journal-title":"IEEE Int. Comput."},{"key":"ref_22","first-page":"523","article-title":"On the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing","volume":"55","author":"Xiong","year":"2018","journal-title":"Comput. Mater. Contin."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.jvcir.2015.06.009","article-title":"Effective reversible data hiding in encrypted image with privacy protection for image content","volume":"31","author":"Qin","year":"2015","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Puech, W., Chaumont, M., and Strauss, O. (2008, January 18). A reversible data hiding method for encrypted images. Proceedings of the Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA.","DOI":"10.1117\/12.766754"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","article-title":"Reversible data hiding in encrypted image","volume":"18","author":"Zhang","year":"2011","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","article-title":"An improved reversible data hiding in encrypted images using side match","volume":"19","author":"Hong","year":"2012","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","article-title":"Reversible data hiding in encrypted images by reserving room before encryption","volume":"8","author":"Ma","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Mathew, T., and Wilscy, M. (2014, January 27\u201329). Reversible data hiding in encrypted images by active block exchange and room reservation. Proceedings of the 2014 International Conference on Contemporary Computing and Informatics, Mysore, India.","DOI":"10.1109\/IC3I.2014.7019628"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","article-title":"Reversibility improved data hiding in encrypted images","volume":"953","author":"Zhang","year":"2014","journal-title":"Signal Process."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Puteaux, P., Trinel, D., and Puech, W. (2016, January 12\u201315). High-capacity data hiding in encrypted images using MSB prediction. Proceedings of the 2016 Sixth International Conference on Image Processing Theory, Tools and Applications, Oulu, Finland.","DOI":"10.1109\/IPTA.2016.7820991"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1670","DOI":"10.1109\/TIFS.2018.2799381","article-title":"An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images","volume":"13","author":"Puteaux","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Puyang, Y., Yin, Z., and Qian, Z. (2018, January 11\u201313). Reversible data hiding in encrypted images with two-MSB prediction. Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, Hong Kong, China.","DOI":"10.1109\/WIFS.2018.8630785"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Puteaux, P., and Puech, W. (2018, January 11\u201313). EPE-based huge-capacity reversible data hiding in encrypted images. Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, Hong Kong, China.","DOI":"10.1109\/WIFS.2018.8630788"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1016\/j.jvcir.2018.12.023","article-title":"High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement","volume":"58","author":"Chen","year":"2019","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1109\/TMM.2019.2936314","article-title":"Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding","volume":"22","author":"Yin","year":"2019","journal-title":"IEEE Trans. Multimed."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/TMM.2018.2844679","article-title":"Separable and reversible data hiding in encrypted images using parametric binary tree labeling","volume":"21","author":"Yi","year":"2019","journal-title":"IEEE Trans. Multimed."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1929","DOI":"10.1109\/TMM.2019.2952979","article-title":"An improved reversible data hiding in encrypted images using parametric binary tree labeling","volume":"22","author":"Wu","year":"2020","journal-title":"IEEE Trans. Multimed."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"18067","DOI":"10.1007\/s11042-017-4957-6","article-title":"Reversible data hiding in encrypted AMBTC images","volume":"77","author":"Yin","year":"2018","journal-title":"Multimedia Tools Appl."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.image.2019.01.003","article-title":"An interpolative AMBTC-based high-payload RDH scheme for encrypted images","volume":"74","author":"Shiu","year":"2019","journal-title":"Signal Process. Image Commun."},{"key":"ref_40","unstructured":"Schaefer, G., and Stich, M. (2003, January 18). UCID: An uncompressed color image database. Proceedings of the Storage and Retrieval Methods and Applications for Multimedia 2004, San Jose, CA, USA."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Bas, P., Filler, T., and Pevny, T. (2011, January 18\u201320). Break our steganographic: The ins and outs of organizing BOSS. Proceedings of the International Workshop on Information Hiding, Berlin, Germany.","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"ref_42","unstructured":"(2021, April 01). Image Databased of BOWS-2. Available online: http:\/\/bows2.ec-lille.fr\/."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/6\/921\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:05:13Z","timestamp":1760162713000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/6\/921"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,21]]},"references-count":42,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2021,6]]}},"alternative-id":["sym13060921"],"URL":"https:\/\/doi.org\/10.3390\/sym13060921","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,21]]}}}