Skip to main content

Table 1 Comprehensive comparison between the proposed schemes and two previous methods

From: Efficient reversible data hiding in encrypted image with public key cryptosystem

 

Features

   

Methods

Preprocessing

Extra data expansion

Separable ?

Protection mechanism of the hidden data

Method [25]

Yes

Yes

No

Homomorphic and probabilistic mechanism

Method [26]

Yes

No

Yes

WPC mechanism

The proposed schemes

No

No

Yes

Homomorphic and probabilistic mechanism