Research Article  Open Access
Xianyi Chen, Haidong Zhong, Lizhi Xiong, Zhihua Xia, "Improved EncryptedSignalsBased Reversible Data Hiding Using Code Division Multiplexing and Value Expansion", Security and Communication Networks, vol. 2018, Article ID 1326235, 9 pages, 2018. https://doi.org/10.1155/2018/1326235
Improved EncryptedSignalsBased Reversible Data Hiding Using Code Division Multiplexing and Value Expansion
Abstract
Compared to the encryptedimagebased reversible data hiding (EIRDH) method, the encryptedsignalsbased reversible data hiding (ESRDH) technique is a novel way to achieve a greater embedding rate and better quality of the decrypted signals. Motivated by ESRDH using signal energy transfer, we propose an improved ESRDH method using code division multiplexing and value expansion. At the beginning, each pixel of the original image is divided into several parts containing a little signal and multiple equal signals. Next, all signals are encrypted by Paillier encryption. And then a large number of secret bits are embedded into the encrypted signals using code division multiplexing and value expansion. Since the sum of elements in any spreading sequence is equal to 0, lossless quality of directly decrypted signals can be achieved using code division multiplexing on the encrypted equal signals. Although the visual quality is reduced, highcapacity data hiding can be accomplished by conducting value expansion on the encrypted little signal. The experimental results show that our method is better than other methods in terms of the embedding rate and average PSNR.
1. Introduction
Encryption and data hiding are two common approaches for protecting against information leakage [1–3]; the former is used to protect the content itself [4], whereas the latter is used to protect the hidden data [5]. While it is a problem for sensitive applications, such as military images and medical images, reversible data hiding (RDH) is an effective method for these special scenarios, which aims to recover both embedded data and the original image. In the past two decades, many classic RDH algorithms have been proposed, such as lossless image compressionbased methods [6], difference expansion (DE) based methods [7], histogram shifting (HS) based methods [8], integertointeger transformbased methods [9], and dualimagebased methods [10].
However, with the popularity of outsourced storage services [11, 12], the traditional RDH is not suitable in these scenarios, especially with regard to the requirement of high security. Therefore, the research of privacy protection in cloud computing has attracted considerable attention in recent years [13–15]. Among these studies, encryptedimagebased reversible data hiding (EIRDH) provides the possibility that the image owner can encrypt the image before uploading it to the service provider, and then the service provider can embed some additional message into the incomprehensible encrypted image for steganography or authentication. The authorized users or receivers can recover both the additional message and the original image. The existing EIRDH methods can be grouped into three categories: vacating room after encryption (VRAE) methods [16–22], reserving room before encryption (RRBE) methods [23–25], and reversible image transform (RIT) methods [26, 27].
The framework of “VRAE” was proposed by Zhang [18], in which secret bits can be embedded after encrypting the original image. Specifically, the data hider can divide the encrypted image block into two sets and embed secret bits by flipping three LSBs of a set. To decrease the extractedbits error rate, Hong et al. [19] and Liao and Shu [20] evaluated the complexity of image blocks. Recently, Yi and Zhou [21] proposed a novel EIRDH method using binaryblock embedding for joint decryption and extraction, in which a bitlevel scrambling process can prevent secret bits from loss. The methods [18–21] can embed an additional message from the decrypted image. To extract secret bits in the encrypted image, Zhang [22] proposed a novel separable EIRDH method, in which three cases are considered according to the encryption key or data hiding key.
However, it is hard to use the traditional RDH method for the data hider in the VRAE since the correlation between neighbor pixels in the encrypted image is destroyed.
The framework of “RRBE” was designed by Ma et al. [23]. The data owner can reverse the room of LSBs using the traditional RDH method and then encrypt the selfembedded image. After that, the data hider embeds secret data into the reversed LSBs of the encrypted image. Cao et al. [24] compressed pixels in the local patch by sparse representation and achieved a higher reversed room than other previous methods.
To transform the original image into an encrypted image which looks like the target image, Zhang et al. [26] proposed the EIRDH framework based on RIT, in which an image block is paired by similar means and standard deviation between the original and target images. Since the correlation of transformed images is not destroyed, the data hider can embed secret bits by the traditional RDH method. However, this method has high image distortion since much auxiliary information must be selfembedded into the transformed image for recovering the original image. Recently, Hou et al. [27] improved the visual quality of camouflage images and reduced the auxiliary information for recording block indexes by adopting kmeans clustering.
Different from the EIRDH, Chen et al. [28] designed an encryptedsignalsbased reversible data hiding (ESRDH) method, in which the data owner divides each pixel of the cover image into two signals and then encrypts them by a public key. After that, the data hider embeds secret bits into the encrypted signals by the additive homomorphism. To reduce data expansion, Shiu et al. [29] adopted a difference expansion method to embed the message. Zhang et al. [30] proposed a lossless, a reversible, and a combined data hiding scheme for ciphertext images, respectively, which were encrypted by a public key cryptosystem with homomorphic properties. Recently, Wu et al. [31] presented an improved ESRDH method, in which the original image can be recovered completely by decrypting all signals. The method can achieve a higher embedding capacity and better quality of decrypted images than previous ESRDH methods. In addition, compared to the traditional EIRDH method, the cost spent, on a reliable key management system in a multiparty environment, is reduced since the receiver can share the public key with other identities.
In this paper, we propose an improved ESRDH method using code division multiplexing (CDM) and value expansion (VE), in which the traditional CDM technology is utilized to achieve lossless visual quality of decrypted signals, and VE technology is designed according to the RDH method based on DE for further increasing the embedding capacity. Compared to the current ESRDH method, the proposed method achieves a high embedding capacity and good visual quality.
The rest of this paper is arranged as follows. In Section 2, the related works are described. In particular, communication technology based on CDM, RDH method based on DE, and ESRDH method based on signal energy transfer are given. Section 3 presents a lossless visual quality ESRDH method using code division multiplexing and high embedding capacity ESRDH method using value expansion. Section 4 displays the performance of the proposed method by experimental results and Section 5 concludes this paper.
2. Related Works
2.1. Communication Technology Based on CDM
In communication systems, CDM is a kind of spectrum spreading technology for ensuring secure information transmission and channel multiplexing, in which the sender encodes tobetransmitted bits with a predetermined spreading sequence, and then the receiver can obtain the secret bits by the same spreading sequences. So, the sequences that are derived by Walsh Hadamard matrix play an important role in CDMbased communication technology. Walsh Hadamard matrix consists of 1 and −1. In addition to the first row (column) of the matrix, other row (column) vectors are selected as the spreading sequences, and they have two properties. First, the sum of elements is equal to 0 for any sequence. Second, they are orthogonal to each other of any two different sequences, so the crosscorrelation is 0.
Suppose the spreading sequences generated by Walsh Hadamard matrix are , and the compound sequence is the linear combination of ; when the secret bit is 0, the coefficient of is set as −1. Otherwise, the coefficient is set as 1. Thus, the receiver can decode the secret bits according to the results of dot product between and .
For example, three spreading sequences from a 4level Hadamard matrix are, , and . Obviously, , , and are zero means and orthogonal to each other. Suppose the secret bits are “010”; then, the sequences are denoted as , , and , respectively, and the three sequences are added to form the compound sequence .
On the receiver side, for the receiver with the spreading sequence , the decoding result is , which represents the notion that the secret bit is 1; for the receiver with , the result is , which represents bit 0; for the receiver with , the result is , which represents bit 1. Therefore, the secret bits can be extracted. Moreover, since a large number of secret bits are represented and transmitted by the compound sequences in different ways and it is impossible for an intruder to guess them, the CDMbased communication technology is secure and can provide high capacity.
2.2. RDH Method Based on DE
The RDH method based on DE was proposed by Tian. Assume the two neighbor pixels of the image are and . The sender can compute the average and the difference between and :Then, the secret bit can be embedded as the least significant bit () of . And the new difference value can be obtained:Finally, the corresponding values and can be computed and transmitted by the sender:From the pixels pair , the receiver can extract secret bits and recover the original image. The initial average value and new difference value can be computed:The secret bit and difference value can be obtained by :And the original pair can be recovered by and :
DE is a simple and efficient RDH method that utilizes the redundancy between two neighbor pixels to embed secret bits and achieve reversibility. In addition, we can use the dataembedding algorithm for an image more than once for multiplelayer embedding. When the difference is small, a higher embedding capacity and better visual quality of the cover image can be achieved. However, the transformed values and should be restricted in the range of .
2.3. ESRDH Method Based on Signal Energy Transfer
ESRDH method based on signal energy transfer was proposed by Wu et al. It consists of three phases: image encryption phase, dataembedding phase, and data extraction and image recovery phase. There are three active identities in this method. They are image owner O, data hider , and receiver . The framework of this method is described in Figure 1.
Suppose the size of the cover image is and the pixel is , . Inspired by the signal energy transfer, one signal can be represented by the sum of other signals. Therefore, can be represented as , where is selected randomly from , is obtained by , is equal to , and is set to be . And then, the image owner can encrypt the three signals according to the public key that was generated by the Paillier encryption algorithm.
Let the encrypted pixels be represented by . The data hider embeds the secret bit into and and generates the marked signals and . If the secret bit is 0, then , . If the bit is 1, then , . Since and Paillier encryption maintains the additive homomorphic properties, then the embedded formulas can be reduced to
To extract the secret bit and recover the cover image, the receiver can decrypt the marked signals according to the private key generated by Paillier encryption and obtain the decrypted unit . Then, the decrypted pixel is denoted by . Because of , the decrypted image is a cover image. After that, the bit can be extracted by comparing and :
This method achieves a lossless visual quality since the decrypted image is the original one. It also can process encoded multimedia since each separated unit of the encoded multimedia can be recovered completely. Therefore, there is no underflow or overflow problem and there is no need to embed any auxiliary information.
3. The Proposed Method
3.1. Lossless Quality ESRDH Method Based on CDM
To maintain the lossless quality of the decrypted image and improve the embedding capacity, inspired by communication technology based on CDM, we propose a lossless visual quality ESRDH method only using CDM.
Suppose that the generated spreading sequences are and the length is denoted as , where must be the power of 2 such as . Therefore, the preprocess and encryption can be summarized as follows. Firstly, divide each pixel unit as , where is obtained by and are set to be . Secondly, define the vector as an embedded vector, so each unit can be represented as . Finally, the image owner encrypts each unit by a public key generated by Paillier encryption, and the encrypted unit is generated, where .
Now, the data hider can embed secret bits into using CDM. This means the number of bits which can be embedded into the pixel is . At the beginning, the secret bits can be transformed to which consist of −1 and 1:
Then, we can obtain the compound sequence by ; the elements of are . They can be encrypted by the public key and can generate an encrypted compound sequence . Since Paillier encryption has additive homomorphic properties, can be embedded into by the following formula:where the new vector can be denoted as .
Finally, the receiver can decrypt the marked signals by a private key and obtain . can be represented by or . Because of and for any different spreading sequences, they are zero means and orthogonal to each other; the result of dot product between and can be summarized asTherefore, can be obtained by the following formula:And can inversely be transformed by formula (9). Since the sum of elements is equal to 0 for any spreading sequences, we have
The directly decrypted pixel is , and we have . As a result, the decrypted pixel is the original one. In other words, based on CDM, ESRDH achieves lossless visual quality of images. And the dataembedding process does not cause an underflow/overflow problem. In addition, the embedding rate can be improved to be bits per pixel (bpp) such as . So, it can be determined by the number of spreading sequences .
3.2. High Embedding Capacity ESRDH Method Based on VE
In Wu et al.’s method and ESRDH method based on CDM, the signal is not used to embed secret bits. To further increase the embedding capacity, the ESRDH method based on VE is proposed. In Wu et al.’s method, the range of is , which will decrease the visual quality of the decrypted image because the absolute value of is too large. However, in the ESRDH method based on CDM, the range of is , and it is enough small, so the ESRDH based on VE is an efficient method.
In Section 3.1, the pixel unit is encrypted and sent to the data hider. Instead of only embedding secret bits into , also can embed bits in this section. Suppose is expanded times and the decimal number of is . So, LSBs of can be emptied to embedded secret bits by . Then, can be constructed by the sum of , and it can be reduced to . Since and , thus , where . Therefore, data embedding can possibly cause an overflow problem. To solve this problem, should be preprocessed, and the formula can be summarized as
The range of is changed from to . So, if , is the changeable one. Otherwise, it is the original one.
Firstly, the encrypted unit can be obtained by a public key.
Secondly, should be encrypted to by the same key. And then it is embedded into , so a new encrypted value can be generated, which can be summarized as
Thirdly, the receiver decrypts by the corresponding private key and denotes it as . After that, the embedded bits can be obtained by extracting LSBs of . So, can be calculated bywhere is the decimal number of .
Finally, the original should be recovered byAnd the pixel can be recovered by the sum of other signals.
Based on ESRDH using CDM, the proposed method can further improve the embedding rate using VE. The embedded rate can be increased by bpp such as . Furthermore, there is no need to embed any auxiliary information to recover the original . However, there is a possibility that an overflow problem arises, which may cause image distortion.
3.3. Algorithm of ESRDH Method Based on CDM and VE
According to Sections 3.1 and 3.2, the framework of ESRDH method based on CDM and VE is shown in Figure 2, and the algorithm can be divided into three phases: preprocess and signal encryption phase, dataembedding phase, and data extraction and image recovery phase. The details are described as in Algorithm 1.

4. Experimental Results
As is shown in Figures 3(a)–3(d), four different grayscale images with different features are selected as the test images, which are Lena, Pepper, Sailboat, and Baboon. The size of these pictures is . The development tool is Myeclipse8.6, which is used on an Intel Core i5 CPU (2.8 GHz) with 8 GB of memory.
(a)
(b)
(c)
(d)
The embedding rate (ER) and visual quality of the decrypted image are two important indicators to measure the performance of the EIRDH method, and they can be calculated bywhere and are the original and modified pixel values, respectively.
In the proposed method, if the ESRDH method based on CDM is used to embed secret bits, the ER is bpp, and is . In Table 1, when and , the embedding capacity (EC) is and , and the corresponding ER is 1 bpp and 3 bpp, respectively. And lossless visual quality of the decrypted image can be achieved. The decrypted images with the hidden data were not further processed, as shown in Figure 4. The plain text images recovered from the four encrypted images were all identical to the original one. In addition, we can utilize the VE method to further improve ER, and up to bpp can be achieved. In addition, will be changed by setting . For example, bits can be embedded using CDM and VE methods when , . However, of Lena is decreased to 36.85 dB. The other results about EC, ER, and PSNR of different test images are shown in Table 1. Furthermore, although the ER of the four images is 3 bpp when , , or , the PSNR of these decrypted images are different.

(a)
(b)
(c)
(d)
To assess the time overheads on encryption, embedding, and decryption, we assessed the statistic efficiency performance of the proposed method for different test images when and in Table 2. In this table, the embedding time is small because secret bits are embedded by multiplication, which also reflects the notion that signals encryption and decryption spend a long time. However, since the operations of CDM and VE were all performed in a homomorphic encryption domain, the encrypted signals with the hidden data were protected by the Paillier cryptosystem. Therefore, the Paillier cryptosystem in our method is an important technology for protecting image content security although it is not efficient enough.

Table 3 denotes signal expansion between our method and the selected methods, including Wu et al. [31], Shiu et al. [29], and Chen et al. [28]. According to Paillier encryption, the size of the cipher space is square of the size of the message space. In the table, Paillier encryption with 512level security is adopted, and the plain text and the ciphertext are represented by 512 bits and 1024 bits, respectively. The output signal of our method is related to and can reach . To solve the problem of data expansion, three alternative methods can be considered. The first is to use a lower security level, such as a 128bit security level and 64bit security level. Thus, the length of output signal will be reduced to bits and bits, respectively. The second is to reduce the value of . When , it is and the same as Wu et al.’s method. The third is to use a pixel block instead of a single pixel as the input signal. If a 512bit security level is used, an pixel block can be adopted since such a block consists of bits. Now, the length of the output signal is times that of the input signal.
The average PSNR of different images when and are shown in Figure 5. At the beginning, the secret bits can be embedded using CDM, and the embedding rate can reach 1 bpp. Since the decrypted image is the same as the original image, is . To further improve the embedding rate, the PSNR will be reduced and more secret bits will be embedded using VE. Compared with other related methods including Wu et al. [31], Shiu et al. [29], and Chen et al. [28], the proposed method has a better performance in terms of the embedding rate and PSNR.
Moreover, since the decrypted image is the original image, the proposed method, which only uses CDM, can be applied to deal with encoded media such as H.264 video and JPEG images. Besides, real reversibility can be achieved by the proposed method.
5. Conclusion
This paper proposes improved encrypted signalsbased reversible data hiding based on code division multiplexing and value expansion. When only using code division multiplexing to embed bits, lossless visual quality of directly decrypted images can be achieved, and the embedding rate can reach bpp. When using code division multiplexing and value expansion method, the decrypted image will have some distortion, but the embedding rate can be improved to bpp. The secret bits and the original image can be recovered from the decrypted image completely. However, the size of the encrypted image will be expanded because of Paillier encryption. In further work, the expansion problem may be solved using other encryption ways, and the property of multiplicative homomorphism may be utilized to further improve the performance on the embedding rate and PSNR.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This work is supported by the National Natural Science Foundation of China (NSFC) (61502242, U1536206, 61672294, 61702276, 61602253, 61373133, 61232016, 71501101, and U1405254), Jiangsu Basic Research ProgramsNatural Science Foundation (BK20150925), Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology (2014r026#), Open Fund of Demonstration Base of Internet Application Innovative Open Platform of Department of Education (KJRP1402), Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) Fund, Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) Fund, and National Ministry of Science and Technology Special Project Research (GYHY201301030, 2013DFG12860, and BC2013012).
References
 J. Shen, D. Liu, Q. Liu, and X. Sun, “A secure cloudassisted urban data sharing framework for ubiquitouscities,” Pervasive & Mobile Computing, 2017. View at: Google Scholar
 Z. Fu, F. Huang, X. Sun, A. V. Vasilakos, and C. Yang, “Enabling semantic search based on conceptual graphs over encrypted outsourced data,” in Proceedings of the IEEE Transactions on Services Computing, vol. 99, 1939. View at: Publisher Site  Google Scholar
 C. Yuan, X. Sun, and R. Lv, “Fingerprint liveness detection based on multiscale LPQ and PCA,” China Communications, vol. 13, no. 7, pp. 60–65, 2016. View at: Publisher Site  Google Scholar
 J. Shen, S. Chang, J. Shen, Q. Liu, and X. Sun, “A lightweight multilayer authentication protocol for wireless body area networks,” Future Generation Computer Systems, 2016. View at: Publisher Site  Google Scholar
 X. Chen, S. Chen, and Y. Wu, “Coverless information hiding method based on the Chinese character encoding,” Journal of Internet Technology, vol. 18, no. 2, pp. 313–320, 2017. View at: Publisher Site  Google Scholar
 J. Fridrich, M. Goljan, and R. Du, “Lossless data embeddingnew paradigm in digital watermarking,” EURASIP Journal on Applied Signal Processing, no. 2, pp. 185–196, 2002. View at: Google Scholar
 J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890–896, 2003. View at: Publisher Site  Google Scholar
 Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits Systems for Video Technology, vol. 16, no. 3, pp. 354–362, 2006. View at: Publisher Site  Google Scholar
 S. Lee, C. D. Yoo, and T. Kalker, “Reversible image watermarking based on integertointeger wavelet transform,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 321–330, 2007. View at: Publisher Site  Google Scholar
 H. Yao, C. Qin, Z. Tang, and Y. Tian, “Improved dualimage reversible data hiding method using the selection strategy of shiftable pixels' coordinates with minimum distortion,” Signal Processing, vol. 135, pp. 26–35, 2017. View at: Publisher Site  Google Scholar
 Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 9, pp. 2546–2559, 2016. View at: Publisher Site  Google Scholar
 Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, and K. Ren, “A privacypreserving and copydeterrence contentbased image retrieval scheme in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2594–2608, 2016. View at: Publisher Site  Google Scholar
 Y. Kong, M. Zhang, and D. Ye, “A belief propagationbased method for task allocation in open and dynamic cloud environments,” KnowledgeBased Systems, vol. 115, pp. 123–132, 2017. View at: Publisher Site  Google Scholar
 J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, “An efficient public auditing protocol with novel dynamic structure for cloud data,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2402–2415, 2017. View at: Publisher Site  Google Scholar
 Z. Fu, F. Huang, K. Ren, J. Weng, and C. Wang, “Privacypreserving Smart Semantic Search based on Conceptual Graphs over Encrypted Outsourced Data,” IEEE Transactions on Information Forensics Security, no. 99, p. 1, 2017. View at: Google Scholar
 X. Zhang, Z. Qian, G. Feng, and Y. Ren, “Efficient reversible data hiding in encrypted images,” Journal of Visual Communication and Image Representation, vol. 25, no. 2, pp. 322–328, 2014. View at: Publisher Site  Google Scholar
 L. Xiong, Z. Xu, and Y.Q. Shi, “An integer wavelet transform based scheme for reversible data hiding in encrypted images,” Multidimensional Systems and Signal Processing, pp. 1–12, 2017. View at: Publisher Site  Google Scholar
 X. P. Zhang, “Reversible data hiding in encrypted image,” IEEE Signal Processing Letters, vol. 18, no. 4, pp. 255–258, 2011. View at: Publisher Site  Google Scholar
 W. Hong, T.S. Chen, and H.Y. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Processing Letters, vol. 19, no. 4, pp. 199–202, 2012. View at: Publisher Site  Google Scholar
 X. Liao and C. Shu, “Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels,” Journal of Visual Communication and Image Representation, vol. 28, pp. 21–27, 2015. View at: Publisher Site  Google Scholar
 S. Yi and Y. Zhou, “Binaryblock embedding for reversible data hiding in encrypted images,” Signal Processing, vol. 133, pp. 40–51, 2017. View at: Publisher Site  Google Scholar
 X. P. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 826–832, 2012. View at: Publisher Site  Google Scholar
 K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 3, pp. 553–562, 2013. View at: Publisher Site  Google Scholar
 X. Cao, L. Du, X. Wei, D. Meng, and X. Guo, “High Capacity Reversible Data Hiding in Encrypted Images by PatchLevel Sparse Representation,” IEEE Transactions on Cybernetics, vol. 46, no. 5, pp. 1132–1143, 2016. View at: Publisher Site  Google Scholar
 W. M. Zhang, K. D. Ma, and N. H. Yu, “Reversibility improved data hiding in encrypted images,” Signal Processing, vol. 94, no. 1, pp. 118–127, 2014. View at: Publisher Site  Google Scholar
 W. Zhang, H. Wang, D. Hou, and N. Yu, “Reversible data hiding in encrypted images by reversible image transformation,” IEEE Transactions on Multimedia, vol. 18, no. 8, pp. 1469–1479, 2016. View at: Publisher Site  Google Scholar
 D. Hou, W. Zhang, and N. Yu, “Image camouflage by reversible image transformation,” Journal of Visual Communication and Image Representation, vol. 40, pp. 225–236, 2016. View at: Publisher Site  Google Scholar
 Y.C. Chen, C.W. Shiu, and G. Horng, “Encrypted signalbased reversible data hiding with public key cryptosystem,” Journal of Visual Communication and Image Representation, vol. 25, no. 5, pp. 1164–1170, 2014. View at: Publisher Site  Google Scholar
 C.W. Shiu, Y.C. Chen, and W. Hong, “Encrypted imagebased reversible data hiding with public key cryptography from difference expansion,” Signal Processing: Image Communication, vol. 39, pp. 226–233, 2015. View at: Publisher Site  Google Scholar
 X. Zhang, J. Long, Z. Wang, and H. Cheng, “Lossless and Reversible Data Hiding in Encrypted Images with PublicKey Cryptography,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 26, no. 9, pp. 1622–1631, 2016. View at: Publisher Site  Google Scholar
 X. Wu, B. Chen, and J. Weng, “Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer,” Journal of Visual Communication and Image Representation, vol. 41, pp. 58–64, 2016. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2018 Xianyi Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.