On the Security of a Stream Cipher in Reversible Data Hiding Schemes Operating in the Encrypted Domain
- Submitting institution
-
University of Northumbria at Newcastle
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 22062876
- Type
- D - Journal article
- DOI
-
10.1016/j.sigpro.2017.09.020
- Title of journal
- Signal Processing
- Article number
- -
- First page
- 336
- Volume
- 143
- Issue
- -
- ISSN
- 0165-1684
- Open access status
- Compliant
- Month of publication
- September
- Year of publication
- 2017
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
0
- Research group(s)
-
E - Intelligent Systems Research Group (iSRG)
- Citation count
- 20
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- This paper discloses the weakness of current state-of-the-art reversible data hiding systems in the encrypted domain and proposes two alternatives to combat the Cyphertext-Only Attack (COA). Among the proposed solutions, the first idea on random permutation of pixels prior to encryption was adopted in a recent work supported by NSF China (61461047, U1536110) (see https://www.researchgate.net/publication/327362814_Reversible_data_hiding_in_classification-scrambling_encrypted-image_based_on_iterative_recovery ). Moreover, the second proposed solution on image-dependent key stream was adopted recently in a research work supported by the NNSF China under Grant 61562007 and Grant 61762017 and by the Guangxi Natural Science Foundation under Grant 2017GXNSFAA198222 (see https://ieeexplore.ieee.org/document/8544104).
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -