Reversible data hiding in encrypted image based on homomorphic public key cryptosystem

被引:0
|
作者
Xiang S.-J. [1 ]
Luo X.-R. [1 ]
机构
[1] Department of Electronic Engineering, School of Information Science and Technology, Ji'nan University, Guangzhou
来源
Xiang, Shi-Jun (Shijun_Xiang@qq.com) | 1600年 / Chinese Academy of Sciences卷 / 27期
基金
中国国家自然科学基金;
关键词
Cloud computing; Homomorphic cryptosystem; Image encryption; Image security protection; Reversible data-hiding;
D O I
10.13328/j.cnki.jos.005007
中图分类号
学科分类号
摘要
Homomorphic encryption, which protects privacy effectively and allows algebraic operations directly in the ciphertext, has been a active topic in the study of cloud computing. Due to security threats in cloud computing, the security protection and integrity authentication of encrypted data remain critical problems. The challenge lies in how to retrieve the encrypted data. To achieve more effective management and security protection of encrypted images on-line, this paper proposes a reversible data hiding scheme for ciphertext based on the public key cryptosystems with homomorphic and probabilistic properties. In the proposed scheme, partial pixels are selected as target pixels by a secret key and all bits of the target pixels are embedded into the other pixels with difference expansion (DE) to vacate room before encryption. As a bonus, secret data can be embedded directly in homomorphic encrypted domain by altering the target pixels with the fake pixels which are comprised of secret data. With the legal key, the receiver can extract the embedded data from the encrypted image and the directly decrypted image. Furthermore, user can accurately recover the original image after decryption and data extraction. Finally, experimental results show that extra data can be embedded more efficiently in homomorphic encrypted domain while keeping the quantity of data unchanged. Besides, the embedded data can be extracted in both ciphertext and plaintext. © Copyright 2016, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:1592 / 1601
页数:9
相关论文
共 21 条
  • [1] Hsu C.Y., Lu C.S., Pei S.C., Image feature extraction in encrypted domain with privacy-preserving SIFT, IEEE Trans. on Image Processing, 21, 11, pp. 4593-4607, (2012)
  • [2] Creeger M., Cloud computing: An overview, ACM Queue, 7, 5, pp. 1-5, (2009)
  • [3] Hurwitz J., Bloor R., Kaufman M., Halper F., Cloud Computing for Dummies, (2009)
  • [4] Chow R., Golle P., Jakobsson M., Shi E., Staddon J., Masuoka R., Molina J., Controlling data in the cloud: Outsourcing computation without outsourcing control, Proc. of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009), pp. 85-90, (2009)
  • [5] Lagendijk R.L., Zekeriya E., Barni M., Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation, IEEE Signal Processing, 30, 1, pp. 82-105, (2013)
  • [6] Feng D.G., Zhang M., Zhang Y., Xu Z., Study on cloud computing security, Ruan Jian Xue Bao/Journal of Software, 22, 1, pp. 71-83, (2011)
  • [7] Zhang X.P., Reversible data hiding in encrypted image, IEEE Signal Processing Letters, 18, 4, pp. 255-258, (2011)
  • [8] Zheng H.Y., Gao Z., Xiao D., Novel reversible data embedding algorithm for encrypted image, Computer Engineering and Applications, 50, 7, pp. 186-189, (2014)
  • [9] Hong W., Chen T.S., Wu H.Y., An improved reversible data hiding in encrypted image using side match, IEEE Signal Processing Letters, 19, 4, pp. 199-202, (2012)
  • [10] Hong W., Chen T.S., Kao Y.H., Reversible data embedment for encrypted cartoon images using unbalanced bit flipping, Advances on Swarm Intelligence Lecture Notes in Computer Science, 7929, pp. 208-214, (2013)