Skip to main content

On Improving Homomorphic Encryption-Based Reversible Data Hiding

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10039))

Included in the following conference series:

  • 1501 Accesses

Abstract

Reversible data hiding for encrypted images with improved performance is introduced in this paper. Each unit in the original image is separated into three components, and each component is encrypted by Paillier homomorphic encryption. Additional bits can be concealed into the encrypted image by manipulating the encrypted signals. Finally, the original image is obtained without error when the direct decryption is applied. The embedded bits are perfectly extracted as well. Optimal visual quality and improved embedding rate are obtained by the proposed approach, since the value of the directly decrypted unit is the same as the original one. Experimental results and comparisons are demonstrated to illustrate the effectiveness and advantages of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, B., Shu, H., Coatrieux, G., Chen, G., Sun, X., Coatrieux, J.L.: Color image analysis by quaternion-type moments. J. Math. Imaging Vis. 51(1), 124–144 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  2. Chen, Y.C., Shiu, C.W., Horng, G.: Encrypted signal-based reversible data hiding with public key cryptosystem. J. Vis. Commun. Image Represent. 25(5), 1164–1170 (2014)

    Article  Google Scholar 

  3. Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Sig. Process. Lett. 19(4), 199–202 (2012)

    Article  Google Scholar 

  4. Li, M., Xiao, D., Zhang, Y., Nan, H.: Reversible data hiding in encrypted images using cross division and additive homomorphism. Sig. Process. Image Commun. 39, 234–248 (2015)

    Article  Google Scholar 

  5. Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)

    Article  Google Scholar 

  6. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). doi:10.1007/3-540-48910-X_16

    Google Scholar 

  7. Puech, W., Chaumont, M., Strauss, O.: A reversible data hiding method for encrypted images. In: Proceedings of Electronic Imaging, p. 68191E. International Society for Optics and Photonics (2008)

    Google Scholar 

  8. Qian, Z., Han, X., Zhang, X.: Separable reversible data hiding in encrypted images by n-nary histogram modification. In: Proceedings of 3rd International Conference on Multimedia Technology, pp. 869–876. Atlantis Press (2013)

    Google Scholar 

  9. Shen, J., Tan, H., Wang, J., Wang, J., Lee, S.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1), 171–178 (2015)

    Google Scholar 

  10. Shiu, C.W., Chen, Y.C., Hong, W.: Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Sig. Process. Image Commun. 39, 226–233 (2015)

    Article  Google Scholar 

  11. Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)

    Article  Google Scholar 

  12. Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Sig. Process. 94, 118–127 (2014)

    Article  Google Scholar 

  13. Zhang, X.: Reversible data hiding in encrypted image. IEEE Sig. Process. Lett. 18(4), 255–258 (2011)

    Article  Google Scholar 

  14. Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)

    Article  Google Scholar 

  15. Zhang, X., Qian, Z., Feng, G., Ren, Y.: Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image Represent. 25(2), 322–328 (2014)

    Article  Google Scholar 

Download references

Acknowledgment

This work was partially supported by China Postdoctoral Science Foundation (Grant No. 2014M552269 and Grant No. 2015T80933), the National Nature Science Foundation of China under Grant Nos. 61401174 and 61602211 and PhD Research Startup Foundation of Huizhou University under Grant No. 156020023.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaotian Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Wu, X., Liang, Z., Chen, B., Liu, T. (2016). On Improving Homomorphic Encryption-Based Reversible Data Hiding. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48671-0_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48670-3

  • Online ISBN: 978-3-319-48671-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics