Research Article

Reversible Data Hiding in Encrypted Domain Based on the Error-Correction Redundancy of Encryption Process

Figure 10

The Lena Image in different stages. (a) Original image. (b) Encrypted image. (c) Decrypted image.
(a)
(b)
(c)