{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:50:52Z","timestamp":1762005052856},"reference-count":26,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>This article presents a new method which embeds multiple data from multiple users in an encrypted image. Here, the data from several users is embedded into an encrypted image. Initially, the image is encrypted by the owner followed by embedding phase, where the encrypted image is divided into four sets. Two of them are used to embed the secret data, while others are remain unaltered. The secret data from multiple users are embedded into Most Significant Bit (MSB) of the encrypted image using their location maps. In the extraction phase, an individual owner can extract the data from the encrypted image using the assigned private key. Subsequently, in the image decryption and recovery phase, images can be recovered using the unaltered neighbor pixels. However, the secret image can be recovered losslessly using the encryption key only. The proposed scheme allows the extraction of the embedded information only for the authorized user out of several users without knowing the cover information. Various simulations have been made related to this, which show the high embedding rate and accuracy.<\/jats:p>","DOI":"10.4018\/ijdcf.2019010104","type":"journal-article","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T20:19:21Z","timestamp":1539289161000},"page":"46-61","source":"Crossref","is-referenced-by-count":10,"title":["Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image"],"prefix":"10.4018","volume":"11","author":[{"given":"Asad","family":"Malik","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China"}]},{"given":"Hongxia","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China"}]},{"given":"Hanzhou","family":"Wu","sequence":"additional","affiliation":[{"name":"Institute of Automation, Chinese Academy of Sciences (CAS), Beijing, China & State Key Laboratory of Cryptology, Beijing, China"}]},{"given":"Sani M.","family":"Abdullahi","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China"}]}],"member":"2432","reference":[{"key":"IJDCF.2019010104-0","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2001.940043"},{"key":"IJDCF.2019010104-1","unstructured":"Barton, J. M. (1997). U.S. Patent No. 5,646,997. Washington, DC: U.S. Patent and Trademark Office."},{"key":"IJDCF.2019010104-2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.840686"},{"key":"IJDCF.2019010104-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2008.10.066"},{"key":"IJDCF.2019010104-4","doi-asserted-by":"publisher","DOI":"10.1117\/12.435400"},{"key":"IJDCF.2019010104-5","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2012.2187334"},{"key":"IJDCF.2019010104-6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.2009252"},{"key":"IJDCF.2019010104-7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2598528"},{"key":"IJDCF.2019010104-8","doi-asserted-by":"crossref","unstructured":"Hwang, J., Kim, J., & Choi, J. (2006). A reversible watermarking based on histogram shifting. In Digital Watermarking (pp. 348-361).","DOI":"10.1007\/11922841_28"},{"key":"IJDCF.2019010104-9","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.859373"},{"key":"IJDCF.2019010104-10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2248725"},{"key":"IJDCF.2019010104-11","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"IJDCF.2019010104-12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2418611"},{"key":"IJDCF.2019010104-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.06.009"},{"key":"IJDCF.2019010104-14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2020257"},{"key":"IJDCF.2019010104-15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2573308"},{"key":"IJDCF.2019010104-16","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2013.2245415"},{"key":"IJDCF.2019010104-17","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"IJDCF.2019010104-18","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2556585"},{"key":"IJDCF.2019010104-19","doi-asserted-by":"crossref","unstructured":"Wu, X., & Sun, W. (2014). High-capacity reversible data hiding in encrypted images by prediction error. Signal Processing, 104, 387-400.","DOI":"10.1016\/j.sigpro.2014.04.032"},{"key":"IJDCF.2019010104-20","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.12.012"},{"key":"IJDCF.2019010104-21","doi-asserted-by":"publisher","DOI":"10.1007\/11922841_26"},{"key":"IJDCF.2019010104-22","article-title":"Separable and error-free reversible data hiding in encrypted image with high payload.","author":"Z.Yin","year":"2014","journal-title":"The Scientific World Journal"},{"key":"IJDCF.2019010104-23","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.06.023"},{"key":"IJDCF.2019010104-24","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2114651"},{"key":"IJDCF.2019010104-25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2176120"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=215321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T08:14:18Z","timestamp":1651824858000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2019010104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":26,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2019010104","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}