High-fidelity reversible data-hiding technique in encrypted images using pixel value ordering and center folding strategy

被引:0
|
作者
Midya, Shweta [1 ]
Chowdhuri, Partha [1 ]
Pal, Pabitra [2 ]
机构
[1] Vidyasagar Univ, Dept Comp Sci, Paschim Medinipur, W Bengal, India
[2] Maulana Abul Kalam Azad Univ Technol, Dept Comp Applicat, Nadia, W Bengal, India
关键词
pixel value ordering; center folding strategy; reversible data hiding; pixel value difference; image encryption; Industrial Internet of Things; SCHEME;
D O I
10.1117/1.JEI.33.5.053025
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a reversible data-hiding approach in encrypted images (RDHEI) to cope with the new security threats emerging with artificial intelligence and the Industrial Internet of Things (IIoT). This dual image-based high-capacity RDHEI technique ensures security with better embedding capacity. On the sender side, the correlations of adjacent pixels are disrupted by encryption. Hence, except for the intended receiver, no one can intercept the image. This encrypted image is used as a cover image, and pixel value ordering is applied. After that, the center folding strategy is used to form dual stego images for hiding data inside both images. Pixels with maximum and minimum values are employed for data hiding. The experimental results indicate the greater resilience and imperceptibility of the discussed technique over several current strategies. The suggested plan incorporates secret bits based on the image properties. One benefit of using the suggested technique is that the process of decrypting the image and extracting the data are independent. The recipient with just the data-hiding key may recover the concealed data without any compromise, while the receiver with only the decryption key can precisely retrieve the original image without any knowledge of the data-hiding key. This makes this scheme suitable for IIoT devices with a limited processing power for image collection. (c) 2024 SPIE and IS&T
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Improved reversible data hiding for encrypted images using full embedding strategy
    Li, Ming
    Xiao, Di
    Kulsoom, Ayesha
    Zhang, Yushu
    ELECTRONICS LETTERS, 2015, 51 (09) : 690 - U48
  • [42] Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer
    Xiang, Yanping
    Xiao, Di
    Zhang, Rui
    Liang, Jia
    Liu, Ran
    INFORMATION SCIENCES, 2021, 545 : 188 - 206
  • [43] Reversible data hiding in encrypted images with high payload
    Xu, Dawen
    IET INFORMATION SECURITY, 2022, 16 (04) : 301 - 313
  • [44] Context pixel-based reversible data hiding scheme using pixel value ordering
    Meikap, Sudipta
    Jana, Biswapati
    Lu, Tzu-Chuen
    VISUAL COMPUTER, 2023, 40 (5): : 3529 - 3552
  • [45] Context pixel-based reversible data hiding scheme using pixel value ordering
    Sudipta Meikap
    Biswapati Jana
    Tzu-Chuen Lu
    The Visual Computer, 2024, 40 : 3529 - 3552
  • [46] A Reversible Data-Hiding Method with Prediction-Error Expansion in Compressible Encrypted Images
    Motomura, Ryota
    Imaizumi, Shoko
    Kiya, Hitoshi
    APPLIED SCIENCES-BASEL, 2022, 12 (19):
  • [47] Enhanced reversible data hiding in encrypted images via median preserving pixel value ordering and block-wise difference preservation
    Weng, Chi-Yao
    Lin, Tsai-Wei
    Weng, Hao-Yu
    Huang, Cheng-Ta
    SIGNAL IMAGE AND VIDEO PROCESSING, 2025, 19 (06)
  • [48] Mean value based reversible data hiding in encrypted images
    Agrawal, Smita
    Kumar, Manoj
    OPTIK, 2017, 130 : 922 - 934
  • [49] Reversible data hiding algorithm for color images combining superpixel segmentation and pixel value ordering
    Zhao, Yan
    Bao, Xiaobing
    JOURNAL OF ELECTRONIC IMAGING, 2024, 33 (01)
  • [50] A DWT ordering Scheme for Hiding Data in Images using Pixel Value Difference
    Al-Asmari, Awad Kh.
    Salama, Ahmed
    Iliyasu, Abdullah M.
    Al-Qodah, Mohammed A.
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 553 - 557