JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2017, Vol. 52 ›› Issue (7): 104-110.doi: 10.6040/j.issn.1671-9352.2.2016.212

Previous Articles    

A reversible image data hiding scheme in Homomorphic encrypted domain

DING Yi-tao1, YANG Hai-bin1,2, YANG Xiao-yuan1,2*, ZHOU Tan-ping1   

  1. 1. Key Laboratory of Network and Information Securityof the Chinese Armed Police Force, Electronic Department, Engineering College of the Armed Police Force, Xian 710086, Shaanxi, China;
    2. Information Security Research Institute, Engineering College of the Armed Police Force, Xian 710086, Shaanxi, China
  • Received:2016-08-18 Online:2017-07-20 Published:2017-07-07

Abstract: A reversible image data hiding scheme was proposed in homomorphic encryption domain. To reserve space for the embedded message, the original data is handled first of all. Then the image-owner used the receivers public key to encrypt the image and the sender embedded the message into the encrypted image. The receiver decrypted the encrypted image with the private key. The receiver got an image with contrast enhancement. The embedded message would be extracted and the image will be recovered if the receiver had the extracting key. At last, the MATLAB experiment proves the correctness of the scheme and better embedding rate.

Key words: information security, homomorphic encryption, reversible image data hiding algorithm in encrypted domain, image equalization

CLC Number: 

  • TP309
[1] RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2):120-126.
[2] PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[C] //International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 1999:223-238.
[3] BONEH D, GOH E J, NISSIM K. Evaluating 2-DNF formulas on ciphertexts[C] //Theory of Cryptography Conference. Berlin:Springer, 2005:325-341.
[4] BOS J W, LAUTER K, LOFTUS J, et al. Improved security for a ring-based fully homomorphic encryption scheme[C] //IMA International Conference on Cryptography and Coding. Berlin:Springer, 2013:45-64.
[5] TIAN J. Reversible data embedding using a difference expansion[J]. IEEE Trans Circuits Syst Video Techn, 2003, 13(8):890-896.
[6] DRAGOI I C, COLTUC D. Local-prediction-based difference expansion reversible watermarking[J]. IEEE Transactions on Image Processing, 2014, 23(4):1779-1790.
[7] CACIULA I, COLTUC D. Improved control for low bit-rate reversible watermarking[C] //2014 IEEE International Conference on Acoustics, Speech and Signal Processing(ICASSP). [S.l.] : IEEE, 2014: 7425-7429.
[8] ZHANG W, HU X, LI X, et al. Recursive histogram modification:establishing equivalency between reversible data hiding and lossless data compression[J]. IEEE Transactions on Image Processing, 2013, 22(7):2775-2785.
[9] JARALI A, RAO J. Unique LSB Compression Data Hiding Method[J]. International Journal of Emerging Science and Engineering, 2013, 2(3):17-21.
[10] LIAN S, LIU Z, REN Z, et al. Commutative encryption and watermarking in video compression[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2007, 17(6):774-778.
[11] CANCELLARO M, BATTISTI F, CARLI M, et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain[J]. Signal Processing:Image Communication, 2011, 26(1):1-12.
[12] ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258.
[13] MA K, ZHANG W, ZHAO X, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on information forensics and security, 2013, 8(3):553-562.
[14] YU J, ZHU G, LI X, et al. An improved algorithm for reversible data hiding in encrypted image[C] //International Workshop on Digital Watermarking. Berlin: Springer, 2012:384-394.
[15] LI M, XIAO D, PENG Z, et al. A modified reversible data hiding in encrypted images using random diffusion and accurate prediction[J]. ETRI Journal, 2014, 36(2):325-328.
[16] WU X, SUN W. High-capacity reversible data hiding in encrypted images by prediction error[J]. Signal processing, 2014, 104:387-400.
[17] ZHANG X, WANG J, WANG Z, et al. Lossless and reversible data hiding in encrypted images with public key cryptography[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2015, 26(9):1-1.
[18] QIAN Z, ZHANG X. Reversible Data Hiding in Encrypted Images With Distributed Source Encoding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(4):636-646.
[19] WU H T, DUGELAY J L, SHI Y Q. Reversible image data hiding with contrast enhancement[J]. IEEE Signal Processing Letters, 2015, 22(1):81-85.
[1] WANG Wei-li, HU Bin, ZHAO Xiu-feng. An efficient multi-identity-based fully homomorphic encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(5): 85-94.
[2] KANG Hai-yan, MA Yue-lei. Survey on application of data mining via differential privacy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 16-23.
[3] WU Zhi-jun,SHEN Dan-dan. Architecture and key technologies of network-enabled next generation global flight tracking based on information integration and sharing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(11): 1-6.
[4] ZHANG Jing, XUE Leng, CUI Yi, RONG Hui, WANG Jian-ping. Modeling and evaluation of a dual chaotic encryption algorithm for WSN [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(03): 1-5.
[5] KANG Hai-yan, YANG Kong-yu, CHEN Jian-ming. A method of personalized privacy preservation based on K-anonymization [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 142-149.
[6] HUANG Jing-wen. uzzy group decision making for information security risk factors analysis [J]. J4, 2012, 47(11): 45-49.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!