Skip to main content
Log in

A homomorphic encrypted reversible information hiding scheme for integrity authentication and piracy tracing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Reversible information hiding plays an important roles in the field of privacy protection. In this paper, a new reversible information hiding scheme is proposed which supports the direct operation in homomorphic encrypted domain. The proposed “Joint Hiding and Tracing, JHT” tactics and the “3 Level Integrity Authentication Scheme” devote to piracy tracing and integrity authentication. To enhance security, the Paillier homomorphic encryption and Arnold technology are employed. Furthermore, we present the dual region division tactics including Data/Signature region division and Texture/Smooth region division. Data/Signature region division is to circumvent conflicts, and Texture/Smooth region division is fit well with the human visual characteristics. Besides, neighboring quadratic optimization approach is presented to eliminate the smooth/texture isolated islands in the texture/smooth regions. In addition, Extended Integer Transform and position image are developed to achieve reversibility and circumvent overflow/underflow problems. Experimental results confirm the efficient of the proposed scheme, and demonstrate it not only realizes privacy protection, integrity authentication and piracy tracing, but also holds the characteristics of higher security, larger capacity and better restoration quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Alassaf N, Alkazemi B, Gutub A (2017) Applicable light-weight cryptography to secure medical data in IoT systems[J]. J Res Eng Appl Sc (JREAS) 2(2):50–58

    Google Scholar 

  2. Aljuaid N, Gutub A. (2014) Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority[C]// Proceedings of 2014 International Conference on Advanced Engineering Technologies (AET-2014), Dubai UAE, 12(25–26): 250–256

  3. Aljuaid N, Gutub A, Khan E. (2015) Stego-System for Hiding Text in Images of Personal Computers[C]// The 12th Learning and Technology Conference: Wearable Tech / Wearable Learning, Effat University, Jeddah, Kingdom of Saudi Arabia, 4:12–13

  4. Al-Otaibi NA, Gutub AA (2014) 2-Leyer security system for hiding sensitive text data on personal computers[J]. Lecture Notes Inf Theory, Eng Technol Publishing 2(2):151–157

    Google Scholar 

  5. Al-Qershi OM, Khoo BE (2013) Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold[J]. Signal Process. 93(1):154–162

    Article  Google Scholar 

  6. Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for medical images[J]. J. Syst. Softw. 85(4):883–894

    Article  Google Scholar 

  7. Bouslimi D, Coatrieux G, Cozic M, Roux Ch. (2013) An a priori and a posterioriprotection by means of data hiding of encrypted images: application to ultrasound image[C]// Proceedings of International Conference on Health Informatics (ICHI), Vilamoura, Portugal. 42: 220–223

  8. Cao X, Du L, Wei X et al (2016) High capacity reversible data hiding in encrypted images by patch-level sparse representation[J]. IEEE Trans Cybernetics 46(5):1132–1143

    Article  Google Scholar 

  9. Chen YC, Shiu CW, Horng G (2014) Encrypted signal-based reversible information hiding with public key cryptosystem[J]. J. Vis. Commun. Image Represent. 25(5):1164–1170

    Article  Google Scholar 

  10. Dongxu Q, Zou J, Han XA (2000) New class of scrambling transformation and its application in the image information covering[J]. SCIENCE CHINA Technol. Sci. 43(3):304–312

    Article  MathSciNet  MATH  Google Scholar 

  11. Elayan MA, Ahmad MO (2016) Digital watermarking scheme based on Arnold and Anti-Arnold transforms[J]. Image and Signal Processing 96(80):317–327

    Google Scholar 

  12. Feng DG, Zhang M, Li H (2014) Big data security and privacy protection[J]. Chinese Journal of Computers 37(1):246–258

    Google Scholar 

  13. Gibson J, Eveleigh D, Rondeau R, et al. (2012) Benefits and challenges of three cloud computing service models.// Proceeding s of the 4th International Conference on Computational Aspects of Social Networks. Sao Carlos, Brazil, 198–205

  14. Gutub AA (2010) Pixel indicator technique for RGB image steganography[J]. J Emerging Technol Web Intell (JETWI) 2(1):56–64

    Google Scholar 

  15. Gutub AA, Khan AA (2013) Hybrid crypto hardware utilizing symmetric-key and public-key cryptosystems[C]// international conference on advanced computer Science applications and technologies. IEEE:116–121

  16. Gutub A, Ankeer M, Abu-Ghalioun M, et al. (2008) Pixel Indicator high capacity Technique for RGB image Based Steganography[C]// WoSPA 2008 - 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, Sharjah, U.A.E., 3:18–20

  17. Hong S, Kim H, Lee S, et al. (2008) Analyzing the Secure and Energy Efficient Transmissions of Compressed Fingerprint Images using Encryption and Watermarking[C]// International Conference on Information Security and Assurance. IEEE Comput Soc, 316–320

  18. Huang FJ, Huang JW, Shi YQ (2016) New framework for reversible information hiding in encrypted domain[J]. IEEE Trans Info Forensics Sec 11(12):2777–2789

    Article  Google Scholar 

  19. Khalifa N, Filali R L, Benrejeb M. (2015) On secure image transmission combining chaotic encryption and watermarking using dead beat synchronization of 4D Henon maps[C]// International Conference on Control, Engineering & Information Technology. IEEE, 1–4

  20. Khan F, Gutub A A. (2007) Message Concealment Techniques using Image based Steganography[C]// The 4th IEEE GCC Conference and Exhibition, Gulf International Convention Centre, Manamah, Bahrain, 11:11–14

  21. Lei B, Tan EL, Chen S et al (2014) Reversible watermarking scheme for medical image based on differential evolution[J]. Expert Syst. Appl. 41(7):3178–3188

    Article  Google Scholar 

  22. Liu MJ, Wang A (2014) Fully homomorphic encrypting and its applications[J]. J Comput Res Dev 21(12):2593–2603

    Google Scholar 

  23. Menezes A J, Van Oorschot P C, Vanstone S A. (1997) Handbook of Applied Cryptography. USA:CRC Press

  24. Metkar S P, Lichade M V. (2013) Digital image security improvement by integrating watermarking and encryption technique[C]// IEEE International Conference on Signal Processing, Computing and Control. IEEE, 1–6

  25. Nasr D B, Bahig H M, Daoud S S. (2011) Visualizing Secure Hash Algorithm (SHA-1) on the Web[C]// Active Media Technology-International Conference, Amt 2011, Lanzhou, China, September 7–9, 2011. Proceedings. 101–112

  26. Oghaz HR, Firoozabadi B, Saidi MS et al (2015) A teleassistance protocol based on joint watermarking–encryption evidence for identification of liabilities in case of litigation[J]. Res Innovation Biomed Eng 36(5):279–286

    Google Scholar 

  27. Peng F, Li XL, Yang B (2012) Adaptive reversible information hiding scheme based on integer transform[J]. Signal Process 92(1):54–62

    Article  Google Scholar 

  28. Qian ZX, Zhang XP, Feng GR (2016) Reversible information hiding in encrypted images based on progressive recovery[J]. IEEE Signal Process Lett 23(11):1–1

    Article  Google Scholar 

  29. Qian ZX, Zhang XP, Ren YL et al (2016) Block cipher based separable reversible information hiding in encrypted images[J]. Multimed Tools Appl 75(21):13749–13763

    Article  Google Scholar 

  30. Qiu Q, Ma XH (2015) Reversible grayscale watermarking using integer wavelet transform and multi-objective genetic algorithm[J]. J Comput Aided Des Comput 27(7):1290–1297

    Google Scholar 

  31. Qiu YQ, Yu L (2015) Expanded generalized integer transform based lossless information hiding method[J]. J. Electron. Inf. Technol. 37(12):2830–2837

    Google Scholar 

  32. Rial A, Deng M, Bianchi T et al (2010) A provably secure anonymous buyer–seller watermarking protocol[J]. IEEE Trans Info Forensics Sec 5(4):920–931

    Article  Google Scholar 

  33. Saraladevi B, Pazhaniraja N, Paul PV et al (2015) Big information and hadoop-a study in security perspective[J]. Procedia Comput Sci 50:596–601

    Article  Google Scholar 

  34. Shi H, Li MC (2014) Safe variable-capacity self-recovery watermarking scheme [J]. J Comput Res Dev 51(8):1715–1726

    Google Scholar 

  35. Thayananthan V, Albeshri A (2015) Big information security issues based on quantum cryptography and privacy with authentication for mobile information center[J]. Procedia Comput Sci 50:149–156

    Article  Google Scholar 

  36. Van D M, Gentry C, Halevi S, et al. (2010) Fully homomorphic encryption over the integers[C]. //LNCS, Berlin: Springer, 6110:24–43

  37. Wang X, Li XL, Yang B et al (2010) Efficient generalized integer transform for reversible watermarking[J]. IEEE Signal Process Lett 17(6):567–570

    Article  Google Scholar 

  38. Wang XF, Han X, Xi JH et al (2016) Reversible information hiding in encrypted image with separable information extraction from image decryption[J]. Multimed Tools Appl:1–16

  39. Xiang W, Xiao-long L, Bin Y et al (2010) Efficient generalized integer transform for reversible watermarking[J]. IEEE Signal Process Lett 17(6):567–570

    Article  Google Scholar 

  40. Xiang SJ, Luo XR, Shi SXA (2016) Novel reversible image watermarking algorithm in homomorphic encrypted domain[J]. Chinese J Comput 39(3):571–581

    MathSciNet  Google Scholar 

  41. Zhang X (2011) Separable reversible information hiding in encrypted image[J]. IEEE Trans Inf Forensics Sec 7(2):826–832

    Article  Google Scholar 

  42. Zhang X (2012) Separable reversible data hiding in encrypted image[J]. IEEE Trans Inf Forensics Sec 7(2):826–832

    Article  Google Scholar 

Download references

Acknowledgments

This work has been supported by the National Youth Science Foundation of China (61601214), Liaoning Research Project for Institutions of Higher Education of China (L201683681).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Shi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shi, H., Liu, D., Lu, H. et al. A homomorphic encrypted reversible information hiding scheme for integrity authentication and piracy tracing. Multimed Tools Appl 77, 20535–20567 (2018). https://doi.org/10.1007/s11042-017-5446-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5446-7

Keywords

Navigation