Reversible Data Hiding in Homomorphic Encrypted Domain by Monitoring Ciphertext Group

Authors

  • V. Santhi  Assistant Professor, Dept. of Computer Applications, Bon Secours College for Women Tamil Nadu, India
  • M. Abinaya  M.Sc Computer Science, Bon Secours College for Women, Thanjavur, Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT1951102

Keywords:

Standard Data Hiding, Embedding Images

Abstract

Since few years, a new problem is trying to combine in a single step, compression, encryption and data hiding. So far, few solutions have been proposed to combine image encryption and compression for example. Nowadays, a new challenge consists to embed data in encrypted images. Since the entropy of encrypted image is maximal, the embedding step, considered like noise, is not possible by using standard data hiding algorithms. A new idea is to apply reversible data hiding algorithms on encrypted images by wishing to remove the embedded data before the image decryption. Recent reversible data hiding methods have been proposed with high capacity, but these methods are not applicable on encrypted images. In this paper we propose an analysis of the local standard deviation of the marked encrypted images in order to remove the embedded data during the decryption step. We have applied our method on various images, and we show and analyze the obtained results.

References

  1. P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Process.,vol. 89, pp. 1129-1143, 2009.
  2. M.Johnson, P.Ishwar, V.M.Prabhakaran, D.Schonberg, and K.Ramchandran, “On com-pressing encrypted data," IEEE Trans. Signal Process, vol. 52, no. 10 Oct 2004., pp. 2992-3006.
  3. W. Hong, T. Chen, and H.Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199-202, Apr. 2012.
  4. W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,” IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097-1102, Apr. 2010.
  5. V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.-Q. Shi, “Reversible watermarking algorithm using sorting and prediction, ”IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989-999, Jul. 2009.
  6. W. Zhang, B. Chen, and N. Yu, “Capacity-approaching codes for reversible data hiding,” in Proc 13th Information Hiding(IH’2011),LNCS 6958, 2011, pp. 255-269, Springer-Verlag.
  7. J. Tian, “Reversible data embedding using a difference expansion, ”IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890- 896, Aug. 2003.
  8. D.M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721-730, Mar. 2007.
  9. X. L. Li, B. Yang, and T. Y. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524-3533, Dec. 2011.
  10. Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst.Video Technol., vol. 16, no. 3, pp. 354- 362, Mar. 2006.
  11. L. Luo et al., “Reversible image watermarking using interpolation technique,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187-193, Mar. 2010.
  12. X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011.

Downloads

Published

2019-02-28

Issue

Section

Research Articles

How to Cite

[1]
V. Santhi, M. Abinaya, " Reversible Data Hiding in Homomorphic Encrypted Domain by Monitoring Ciphertext Group , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 1, pp.487-490, January-February-2019. Available at doi : https://doi.org/10.32628/CSEIT1951102