Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shuang Yi is active.

Publication


Featured researches published by Shuang Yi.


Signal Processing | 2017

Binary-block embedding for reversible data hiding in encrypted images

Shuang Yi; Yicong Zhou

This paper first introduces a binary-block embedding (BBE) method to embed secret data in a binary image. Using BBE, we propose an algorithm for reversible data hiding in encrypted images (BBE-RDHEI). It uses BBE to embed binary bits in lower bit-planes of the original image into its higher bit-planes such that the lower bit-planes can be reserved for hiding secret data in subsequent processes. BBE-RDHEI employs a bit-level scrambling process after secret data embedding to spread embedded secret data to the entire marked encrypted image so that it can prevent secret data from loss. A security key design mechanism is proposed to enhance the security level of BBE-RDHEI. The processes of BBE-RDHEI are fully reversible. The secret data and original image can be reconstructed independently and separately. Experiments and comparisons show that BBE-RDHEI has an embedding rate nearly twice larger than the state-of-the-art algorithms, generates the marked decrypted images with high quality, and is able to withstand the brute-force, differential, noise and data loss attacks. Improved embedding capacity.Separable method and can fully recover the original image and secret data.High visual quality in the marked decrypted images.It is able to withstand the brute-force, differential, noise and data loss attacks.


Signal Processing | 2018

Medical image encryption using high-speed scrambling and pixel adaptive diffusion

Zhongyun Hua; Shuang Yi; Yicong Zhou

We propose an encryption scheme to protect medical images using high-speed scrambling and pixel adaptive diffusion.It has a high security level as it can encrypt an identical image into different cipher-images, even when using the same secret key.We provide two implementations, which have high efficiency in hardware platforms and software platforms, respectively.The proposed encryption scheme has high security level, faster speed, and better robustness than several typical encryption schemes. This paper presents a new encryption scheme of protecting medical images. It has high efficiency and shows robustness of defending some impulse noise and data loss. First, some random data are inserted into surroundings of the image. Then, two rounds of high-speed scrambling and pixel adaptive diffusion are performed to randomly shuffle neighboring pixels and spread these inserted random data over the entire image. The proposed encryption scheme can be directly applied to medical images with any representation format. We provide two kinds of operations to implement the pixel adaptive diffusion: bitwise XOR and modulo arithmetic. The former has high efficiency in hardware platforms while the latter can achieve fast speed in software platforms. Simulations and evaluations show that both encryption schemes using bitwise XOR and modulo arithmetic have high security levels, can achieve much faster speeds, and can better adapt to impulse noise and data loss interference than several typical and state-of-the-art encryption schemes.


systems, man and cybernetics | 2016

Improved reversible data hiding in encrypted images using histogram modification

Shuang Yi; Yicong Zhou

Inspired by Zhang et al.s method that applies the integer discrete wavelet transform (DWT) to the original image, and embeds the secret data into the middle (LH, HL) and high (HH) frequency sub-bands of integer DWT coefficients with histogram modification based method, we propose a reversible data hiding method that embeds the secret data into the encrypted prediction error values. Compared with the LH, HL and HH integer DWT coefficients, the prediction error values generated by our proposed method are more concentrated to 0, and thus a high visual quality of the marked decrypted image can be achieved. Experimental results show that our proposed method has a better performance than Zhangs.


international conference on signal and information processing | 2015

An improved reversible data hiding in encrypted images

Shuang Yi; Yicong Zhou

This paper is an improved version of Zhangs reversibility improved data hiding method in encrypted images. The original work randomly selects p%(0 <; p ≤ 20) pixels from an original image to obtain the estimation error for secret data embedding. In this work, we estimate half of the pixels in the original image to obtain the estimation error so that the maximum embedding rate can be significantly improved while keeping a high image quality of the marked decrypted image. The experimental results show that our proposed method has a higher performance than Zhangs method.


systems, man and cybernetics | 2014

A new reversible data hiding algorithm in the encryption domain

Shuang Yi; Yicong Zhou; Chi-Man Pun; C. L. Philip Chen

This paper introduces a new reversible data hiding algorithm in the encryption domain. It integrates data hiding into the image encryption process to achieve different level of access right and security. Computer simulations and comparisons demonstrate that the proposed algorithm can withstand the differential attack and outperforms other existing methods in terms of security and the message embedding capacity that is 52% larger than the state-of-the-art method in the best scenario. The marked decrypted images of our proposed method show the best visual quality according to the PSNR results.


Signal Processing | 2018

Parametric reversible data hiding in encrypted images using adaptive bit-level data embedding and checkerboard based prediction

Shuang Yi; Yicong Zhou

Abstract In this paper, we first propose an adaptive bit-level data embedding (ABDE) method to embed secret data into a cover image and an adaptive checkerboard based prediction (ACBP) method to predict 3/4 of the pixels in an image using its remaining 1/4 of the pixels. Based on ABDE and ACBP, we further propose a parametric reversible data hiding method in encrypted images (PRDHEI). When parameter ɛ = 1 (e ∈ [1, 255]), PRDHEI is a full reversible method that both the original image and secret data can be completely recovered. The embedding rate is much higher than state-of-the-art RDHEI methods. Moreover, when e > 1, the embedding rate of PRDHEI increases significantly. The receiver can fully recover the secret data and reconstruct the original image with very high quality. When ɛ = 255 , PRDHEI reaches its maximum embedding rate of 4.5 bpp while the recovered images are of an average peak signal-to-noise ratio larger than 32 dB.


Proceedings of SPIE | 2014

A new collage steganographic algorithm using cartoon design

Shuang Yi; Yicong Zhou; Chi-Man Pun; C. L. Philip Chen

Existing collage steganographic methods suffer from low payload of embedding messages. To improve the payload while providing a high level of security protection to messages, this paper introduces a new collage steganographic algorithm using cartoon design. It embeds messages into the least significant bits (LSBs) of color cartoon objects, applies different permutations to each object, and adds objects to a cartoon cover image to obtain the stego image. Computer simulations and comparisons demonstrate that the proposed algorithm shows significantly higher capacity of embedding messages compared with existing collage steganographic methods.


IEEE Transactions on Systems, Man, and Cybernetics | 2018

Designing Hyperchaotic Cat Maps With Any Desired Number of Positive Lyapunov Exponents

Zhongyun Hua; Shuang Yi; Yicong Zhou; Chengqing Li; Yue Wu


IEEE Transactions on Image Processing | 2017

Combination of Sharing Matrix and Image Encryption for Lossless

Long Bao; Shuang Yi; Yicong Zhou


international conference on image processing | 2017

(k,n)

Shuang Yi; Yicong Zhou

Collaboration


Dive into the Shuang Yi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yue Wu

University of Southern California

View shared research outputs
Researchain Logo
Decentralizing Knowledge