Open Access Open Access  Restricted Access Subscription or Fee Access

Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography

G. Jayamurugan

Abstract


A lossless, reversible, and combined data hiding schemes for ciphertext images encrypted by public key cryptosystems with probabilistic and homomorphic properties is proposed. In the lossless scheme, the ciphertext pixels are replaced with new values to embed the additional data into several LSB-planes of ciphertext pixels by multi-layer wet paper coding. Then, the embedded data can be directly extracted from the encrypted domain, and the data embedding operation does not affect the decryption of original plaintext image. In the reversible scheme, a preprocessing is employed to shrink the image histogram before image encryption, so that the modification on encrypted images for data embedding will not cause any pixel oversaturation in plaintext domain. Although a slight distortion is introduced, the embedded data can be extracted and the original image can be recovered from the directly decrypted image. Due to the compatibility between the lossless and reversible schemes, the data embedding operations in the two manners can be simultaneously performed in an encrypted image. With the combined technique, a receiver may extract a part of embedded data before decryption, and extract another part of embedded data and recover the original plaintext image after decryption.


Keywords


Reversible Data Hiding, Lossless Data Hiding, Image Encryption

Full Text:

PDF

References


N. A. Saleh, H. N. Boghdad, S. I. Shaheen, A. M. Darwish, “High Capacity Lossless Data Embedding Technique for Palette Images Based on Histogram Analysis,” Digital Signal Processing, 20, pp. 1629−1636, 2010.

J. Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Trans. on Circuits and Systems for Video Technology, 13(8), pp. 890−896, 2003.

Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” IEEE Trans. on Circuits and Systems for Video Technology, 16(3), pp. 354−362, 2006.

M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless Generalized-LSB Data Embedding,” IEEE Trans. on Image Processing, 14(2), pp. 253–266, 2005.

X. Hu, W. Zhang, X. Li, and N. Yu, “Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding,” IEEE Trans. on Information Forensics and Security, 10(3), pp. 653-664, 2015.

X. Zhang, “Reversible Data Hiding with Optimal Value Transfer,” IEEE Trans. on Multimedia, 15(2), 316−325, 2013.

W. Zhang, X. Hu, X. Li, and N. Yu, “Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications,” IEEE Trans. on Image Processing, 24(1), pp. 294-304, 2015.

S. Lian, Z. Liu, Z. Ren, and H. Wang, “Commutative Encryption and Watermarking in Video Compression,” IEEE Trans. on Circuits and Systems for Video Technology, 17(6), pp. 774−778, 2007.

M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. Natale, and A. Neri, “A Commutative Digital Image Watermarking and Encryption Method in the Tree Structured Haar Transform Domain,” Signal Processing: Image Communication, 26(1), pp. 1−12, 2011.

X. Zhang, “Commutative Reversible Data Hiding and Encryption,” Security and Communication Networks, 6, pp. 1396−1403, 2013.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.