Lossless Data Hiding in Encrypted Images Compatible With Homomorphic Processing

被引:13
|
作者
Wu, Hao-Tian [1 ]
Cheung, Yiu-Ming [2 ]
Zhuang, Zhenwei [1 ]
Xu, Lingling [1 ]
Hu, Jiankun [3 ]
机构
[1] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Peoples R China
[2] Hong Kong Baptist Univ, Dept Comp Sci, Hong Kong, Peoples R China
[3] Univ New South Wales, Australian Def Force Acad, Sch Engn & Informat Technol, Canberra, ACT 2610, Australia
基金
中国国家自然科学基金;
关键词
Cryptography; Ciphers; Technological innovation; Redundancy; Additives; Probabilistic logic; Homomorphic encryption; Homomorphic processing; image encryption; lossless data hiding; Paillier cryptosystem; randomness; WATERMARKING; DOMAIN;
D O I
10.1109/TCYB.2022.3163245
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reversible data hiding in ciphertext has potential applications for privacy protection and transmitting extra data in a cloud environment. For instance, an original plain-text image can be recovered from the encrypted image generated after data embedding, while the embedded data can be extracted before or after decryption. However, homomorphic processing can hardly be applied to an encrypted image with hidden data to generate the desired image. This is partly due to that the image content may be changed by preprocessing or/and data embedding. Even if the corresponding plain-text pixel values are kept unchanged by lossless data hiding, the hidden data will be destroyed by outer processing. To address this issue, a lossless data hiding method called random element substitution (RES) is proposed for the Paillier cryptosystem by substituting the to-be-hidden bits for the random element of a cipher value. Moreover, the RES method is combined with another preprocessing-free algorithm to generate two schemes for lossless data hiding in encrypted images. With either scheme, a processed image will be obtained after the encrypted image undergoes processing in the homomorphic encrypted domain. Besides retrieving a part of the hidden data without image decryption, the data hidden with the RES method can be extracted after decryption, even after some processing has been conducted on encrypted images. The experimental results show the efficacy and superior performance of the proposed schemes.
引用
收藏
页码:3688 / 3701
页数:14
相关论文
共 50 条
  • [21] Reversible data hiding in encrypted AMBTC images
    Yin, Zhaoxia
    Niu, Xuejing
    Zhang, Xinpeng
    Tang, Jin
    Luo, Bin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18067 - 18083
  • [22] High Payload Reversible Data Hiding for Encrypted Image with Homomorphic Encryption
    LI Xinyan
    MOU Huajian
    WuhanUniversityJournalofNaturalSciences, 2020, 25 (05) : 445 - 451
  • [23] n Lossless Data Hiding for Color Images
    Huang, Ching-Hui
    Lee, Chih-Chiang
    Wu, Hsien-Chu
    Wang, Chung-Ming
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 632 - +
  • [24] Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group
    Xiang, Shijun
    Luo, Xinrong
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2018, 28 (11) : 3099 - 3110
  • [25] Encrypted data processing with Homomorphic Re-Encryption
    Ding, Wenxiu
    Yan, Zheng
    Deng, Robert H.
    INFORMATION SCIENCES, 2017, 409 : 35 - 55
  • [26] Hiding in encrypted images: a three tier security data hiding technique
    Shabir A. Parah
    Javaid A. Sheikh
    Umer I. Assad
    Ghulam M. Bhat
    Multidimensional Systems and Signal Processing, 2017, 28 : 549 - 572
  • [27] Hiding in encrypted images: a three tier security data hiding technique
    Parah, Shabir A.
    Sheikh, Javaid A.
    Assad, Umer I.
    Bhat, Ghulam M.
    MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2017, 28 (02) : 549 - 572
  • [28] Reversible Data Hiding in Encrypted Images With Dual Data Embedding
    Qiu, Yingqiang
    Ying, Qichao
    Lin, Xiaodan
    Zhang, Yaowen
    Qian, Zhenxing
    IEEE ACCESS, 2020, 8 (08): : 23209 - 23220
  • [29] A Reversible Data Hiding Method in Compressible Encrypted Images
    Imaizumi, Shoko
    Izawa, Yusuke
    Hirasawa, Ryoichi
    Kiya, Hitoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (12) : 1579 - 1588
  • [30] A Proactive Approach to Reversible Data Hiding in Encrypted Images
    Nair, Nirmal S.
    Mathew, Tojo
    Neethu, A. S.
    Viswanath, Viswajith P.
    Nair, Madhu S.
    Wilscy, M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 1510 - 1517