Abstract
Reversible information hiding plays an important roles in the field of privacy protection. In this paper, a new reversible information hiding scheme is proposed which supports the direct operation in homomorphic encrypted domain. The proposed “Joint Hiding and Tracing, JHT” tactics and the “3 Level Integrity Authentication Scheme” devote to piracy tracing and integrity authentication. To enhance security, the Paillier homomorphic encryption and Arnold technology are employed. Furthermore, we present the dual region division tactics including Data/Signature region division and Texture/Smooth region division. Data/Signature region division is to circumvent conflicts, and Texture/Smooth region division is fit well with the human visual characteristics. Besides, neighboring quadratic optimization approach is presented to eliminate the smooth/texture isolated islands in the texture/smooth regions. In addition, Extended Integer Transform and position image are developed to achieve reversibility and circumvent overflow/underflow problems. Experimental results confirm the efficient of the proposed scheme, and demonstrate it not only realizes privacy protection, integrity authentication and piracy tracing, but also holds the characteristics of higher security, larger capacity and better restoration quality.
Similar content being viewed by others
References
Alassaf N, Alkazemi B, Gutub A (2017) Applicable light-weight cryptography to secure medical data in IoT systems[J]. J Res Eng Appl Sc (JREAS) 2(2):50–58
Aljuaid N, Gutub A. (2014) Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority[C]// Proceedings of 2014 International Conference on Advanced Engineering Technologies (AET-2014), Dubai UAE, 12(25–26): 250–256
Aljuaid N, Gutub A, Khan E. (2015) Stego-System for Hiding Text in Images of Personal Computers[C]// The 12th Learning and Technology Conference: Wearable Tech / Wearable Learning, Effat University, Jeddah, Kingdom of Saudi Arabia, 4:12–13
Al-Otaibi NA, Gutub AA (2014) 2-Leyer security system for hiding sensitive text data on personal computers[J]. Lecture Notes Inf Theory, Eng Technol Publishing 2(2):151–157
Al-Qershi OM, Khoo BE (2013) Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold[J]. Signal Process. 93(1):154–162
Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for medical images[J]. J. Syst. Softw. 85(4):883–894
Bouslimi D, Coatrieux G, Cozic M, Roux Ch. (2013) An a priori and a posterioriprotection by means of data hiding of encrypted images: application to ultrasound image[C]// Proceedings of International Conference on Health Informatics (ICHI), Vilamoura, Portugal. 42: 220–223
Cao X, Du L, Wei X et al (2016) High capacity reversible data hiding in encrypted images by patch-level sparse representation[J]. IEEE Trans Cybernetics 46(5):1132–1143
Chen YC, Shiu CW, Horng G (2014) Encrypted signal-based reversible information hiding with public key cryptosystem[J]. J. Vis. Commun. Image Represent. 25(5):1164–1170
Dongxu Q, Zou J, Han XA (2000) New class of scrambling transformation and its application in the image information covering[J]. SCIENCE CHINA Technol. Sci. 43(3):304–312
Elayan MA, Ahmad MO (2016) Digital watermarking scheme based on Arnold and Anti-Arnold transforms[J]. Image and Signal Processing 96(80):317–327
Feng DG, Zhang M, Li H (2014) Big data security and privacy protection[J]. Chinese Journal of Computers 37(1):246–258
Gibson J, Eveleigh D, Rondeau R, et al. (2012) Benefits and challenges of three cloud computing service models.// Proceeding s of the 4th International Conference on Computational Aspects of Social Networks. Sao Carlos, Brazil, 198–205
Gutub AA (2010) Pixel indicator technique for RGB image steganography[J]. J Emerging Technol Web Intell (JETWI) 2(1):56–64
Gutub AA, Khan AA (2013) Hybrid crypto hardware utilizing symmetric-key and public-key cryptosystems[C]// international conference on advanced computer Science applications and technologies. IEEE:116–121
Gutub A, Ankeer M, Abu-Ghalioun M, et al. (2008) Pixel Indicator high capacity Technique for RGB image Based Steganography[C]// WoSPA 2008 - 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, Sharjah, U.A.E., 3:18–20
Hong S, Kim H, Lee S, et al. (2008) Analyzing the Secure and Energy Efficient Transmissions of Compressed Fingerprint Images using Encryption and Watermarking[C]// International Conference on Information Security and Assurance. IEEE Comput Soc, 316–320
Huang FJ, Huang JW, Shi YQ (2016) New framework for reversible information hiding in encrypted domain[J]. IEEE Trans Info Forensics Sec 11(12):2777–2789
Khalifa N, Filali R L, Benrejeb M. (2015) On secure image transmission combining chaotic encryption and watermarking using dead beat synchronization of 4D Henon maps[C]// International Conference on Control, Engineering & Information Technology. IEEE, 1–4
Khan F, Gutub A A. (2007) Message Concealment Techniques using Image based Steganography[C]// The 4th IEEE GCC Conference and Exhibition, Gulf International Convention Centre, Manamah, Bahrain, 11:11–14
Lei B, Tan EL, Chen S et al (2014) Reversible watermarking scheme for medical image based on differential evolution[J]. Expert Syst. Appl. 41(7):3178–3188
Liu MJ, Wang A (2014) Fully homomorphic encrypting and its applications[J]. J Comput Res Dev 21(12):2593–2603
Menezes A J, Van Oorschot P C, Vanstone S A. (1997) Handbook of Applied Cryptography. USA:CRC Press
Metkar S P, Lichade M V. (2013) Digital image security improvement by integrating watermarking and encryption technique[C]// IEEE International Conference on Signal Processing, Computing and Control. IEEE, 1–6
Nasr D B, Bahig H M, Daoud S S. (2011) Visualizing Secure Hash Algorithm (SHA-1) on the Web[C]// Active Media Technology-International Conference, Amt 2011, Lanzhou, China, September 7–9, 2011. Proceedings. 101–112
Oghaz HR, Firoozabadi B, Saidi MS et al (2015) A teleassistance protocol based on joint watermarking–encryption evidence for identification of liabilities in case of litigation[J]. Res Innovation Biomed Eng 36(5):279–286
Peng F, Li XL, Yang B (2012) Adaptive reversible information hiding scheme based on integer transform[J]. Signal Process 92(1):54–62
Qian ZX, Zhang XP, Feng GR (2016) Reversible information hiding in encrypted images based on progressive recovery[J]. IEEE Signal Process Lett 23(11):1–1
Qian ZX, Zhang XP, Ren YL et al (2016) Block cipher based separable reversible information hiding in encrypted images[J]. Multimed Tools Appl 75(21):13749–13763
Qiu Q, Ma XH (2015) Reversible grayscale watermarking using integer wavelet transform and multi-objective genetic algorithm[J]. J Comput Aided Des Comput 27(7):1290–1297
Qiu YQ, Yu L (2015) Expanded generalized integer transform based lossless information hiding method[J]. J. Electron. Inf. Technol. 37(12):2830–2837
Rial A, Deng M, Bianchi T et al (2010) A provably secure anonymous buyer–seller watermarking protocol[J]. IEEE Trans Info Forensics Sec 5(4):920–931
Saraladevi B, Pazhaniraja N, Paul PV et al (2015) Big information and hadoop-a study in security perspective[J]. Procedia Comput Sci 50:596–601
Shi H, Li MC (2014) Safe variable-capacity self-recovery watermarking scheme [J]. J Comput Res Dev 51(8):1715–1726
Thayananthan V, Albeshri A (2015) Big information security issues based on quantum cryptography and privacy with authentication for mobile information center[J]. Procedia Comput Sci 50:149–156
Van D M, Gentry C, Halevi S, et al. (2010) Fully homomorphic encryption over the integers[C]. //LNCS, Berlin: Springer, 6110:24–43
Wang X, Li XL, Yang B et al (2010) Efficient generalized integer transform for reversible watermarking[J]. IEEE Signal Process Lett 17(6):567–570
Wang XF, Han X, Xi JH et al (2016) Reversible information hiding in encrypted image with separable information extraction from image decryption[J]. Multimed Tools Appl:1–16
Xiang W, Xiao-long L, Bin Y et al (2010) Efficient generalized integer transform for reversible watermarking[J]. IEEE Signal Process Lett 17(6):567–570
Xiang SJ, Luo XR, Shi SXA (2016) Novel reversible image watermarking algorithm in homomorphic encrypted domain[J]. Chinese J Comput 39(3):571–581
Zhang X (2011) Separable reversible information hiding in encrypted image[J]. IEEE Trans Inf Forensics Sec 7(2):826–832
Zhang X (2012) Separable reversible data hiding in encrypted image[J]. IEEE Trans Inf Forensics Sec 7(2):826–832
Acknowledgments
This work has been supported by the National Youth Science Foundation of China (61601214), Liaoning Research Project for Institutions of Higher Education of China (L201683681).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shi, H., Liu, D., Lu, H. et al. A homomorphic encrypted reversible information hiding scheme for integrity authentication and piracy tracing. Multimed Tools Appl 77, 20535–20567 (2018). https://doi.org/10.1007/s11042-017-5446-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-5446-7