Asynchronous updating Boolean network encryption algorithm

S Gao, R Wu, X Wang, J Liu, Q Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
An asynchronous updating Boolean network is employed to simulate and analyze the gene
expression of a particular tissue or species, revealing the life activity process from a system …

Medical image encryption based on Josephus scrambling and dynamic cross-diffusion for patient privacy security

Z Zhang, J Tang, F Zhang, T Huang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In recent years, smart healthcare mode has been gradually maturing with the evolution of
Internet cloud computing technology. However, due to the open and shared features of the …

Reversible data hiding with adaptive difference recovery for encrypted images

C Yu, X Zhang, G Li, S Zhan, Z Tang - Information Sciences, 2022 - Elsevier
Vacating room after encryption (VRAE) is a popular framework of reversible data hiding for
encrypted images (RDHEI). Most VRAE based RDHEI methods do not make a desirable …

Reversible data hiding over encrypted images via preprocessing-free matrix secret sharing

Z Hua, X Liu, Y Zheng, S Yi… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud service is a natural choice to store and manage the exponentially produced images.
Data privacy is one of the most concerned points in cloud-based image services. Reversible …

Image encryption via complementary embedding algorithm and new spatiotemporal chaotic system

P Liu, X Wang, Y Su - … Transactions on Circuits and Systems for …, 2022 - ieeexplore.ieee.org
Although image encryption is developing rapidly, it lacks the pertinence of specific
scenarios. This paper proposes a complementary embedding encryption strategy. The …

Reversible data hiding in encrypted images using cipher-feedback secret sharing

Z Hua, Y Wang, S Yi, Y Zhou… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Reversible data hiding in encrypted images (RDH-EIs) has attracted increasing attention
since it can protect the privacy of original images while exactly extracting the embedded …

A reversible data hiding scheme in encrypted domain for secret image sharing based on Chinese remainder theorem

Y Ke, M Zhang, X Zhang, J Liu, T Su… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Schemes of reversible data hiding in encrypted domain (RDH-ED) based on symmetric or
public key encryption are mainly applied in the scenarios of end-to-end communication. To …

Reversible data hiding in encrypted images with secret sharing and hybrid coding

C Yu, X Zhang, C Qin, Z Tang - IEEE Transactions on Circuits …, 2023 - ieeexplore.ieee.org
Reversible data hiding in encrypted images (RDHEI) is an essential data security technique.
Most RDHEI methods cannot perform well in embedding capacity and security. To address …

Matrix-based secret sharing for reversible data hiding in encrypted images

Z Hua, Y Wang, S Yi, Y Zheng, X Liu… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Traditional schemes for reversible data hiding in encrypted images (RDH-EI) focus on one
data hider and cannot resist the single point of failure. Besides, the image security is …

High-capacity framework for reversible data hiding in encrypted image using pixel prediction and entropy encoding

Y Qiu, Q Ying, Y Yang, H Zeng, S Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
While the existing reserving room before encryption (RRBE) based reversible data hiding in
encrypted image (RDHEI) schemes can achieve decent embedding capacity, the capacity of …