Research Article

Reversible Data Hiding in Encrypted Domain Based on the Error-Correction Redundancy of Encryption Process

Figure 3

Two different mapping relationships between error vector and data to be embedded.