Abstract
In this modern era, a large amount of multimedia content plays an important role in various fields. For multimedia content, storage space and processing speed are more crucial. As a result, existing multimedia applications are moving to a cloud-based paradigm since it offers greater storage and faster processing capabilities. This ensures that more and more people choose to save and process their multimedia content on the cloud. However, this option might cause severe repercussions due to inadequate security. Homomorphic encryption is a type of encryption that enables users to do computations on encrypted data without having to decrypt it first. These resulting operations are then stored in an encrypted form, which when decrypted, produces the same outcomes as if the operations had been performed on the unencrypted data. This paper aims to present a promising solution to protect the data on the cloud through Reversible Data Hiding in an Encrypted Image (RDHEI), using homomorphic encryption and a rhombus pattern prediction scheme. Using this proposed method, any third party can perform data-hiding operations on an encrypted image without being aware of the original contents. Furthermore, this method has the advantage of protecting the image very securely. The entropy of the encrypted image is 7.999, deviations from ideality are 0.0245, diagonal correlation and vertical correlation are 0.0092 and − 0.0015, respectively, and embedding capacity is 0.498 bpp. Finally, flawless image recovery and covert extraction are possible.
Similar content being viewed by others
Data availability
The datasets generated during and/or analysed during the current study are available from the corresponding author upon reasonable request.
References
Agrawal S, Kumar M (2017) Mean value based reversible data hiding in encrypted images. Optik (Stuttg) 130:922–934
Amirtharajan R, Behera SK, Swarup MA et al (2010) Colour guided colour image steganography. arXiv Prepr arXiv10104007
Anushiadevi R, Amirtharajan R (2021) Reversible data hiding in an encrypted image using the homomorphic property of elliptic curve cryptography. J Intell Fuzzy Syst 41:5583–5594
Anushiadevi R, Pravinkumar P, Rayappan JBB, Amirtharajan R (2021) Uncover the cover to recover the hidden secret - A separable reversible data hiding framework. Multimed Tools Appl 80:19695–19714. https://doi.org/10.1007/s11042-021-10729-y
Anushiadevi R, Pravinkumar P, Rayappan JBB, Amirtharajan R (2020) A high payload separable reversible data hiding in cipher image with good decipher image quality. J Intell Fuzzy Syst 38(5):6403–6414
Anushiadevi R, Praveenkumar P, Rayappan JBB Amirtharajan R reversible data hiding method based on pixel expansion and homomorphic encryption. J Intell Fuzzy Syst 39(3):2977–2990
Chang C-C, Tai W-L, Chen K-N (2008) Lossless data hiding based on histogram modification for image authentication. In: Embedded and Ubiquitous Computing, 2008. EUC’08. IEEE/IFIP International Conference on, pp 506–511
Chaudhary P, Gupta BB, Singh AK (2022) XSS Armor: constructing XSS Defensive Framework for preserving Big Data privacy in internet-of-things (IoT) networks. J Circ Syst Comput 31(13):2250222. https://doi.org/10.1142/S021812662250222X
Chen Y-C, Shiu C-W, Horng G (2014) Encrypted signal-based reversible data hiding with public key cryptosystem. J Vis Commun Image Represent 25:1164–1170
Chen Y, Yin B, He H et al (2018) Reversible data hiding in classification-scrambling encrypted-image based on iterative recovery. Comput Mater Contin 56:299–312
Coatrieux G, Pan W, Cuppens-Boulahia N et al (2012) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inf Forensics Secur 8:111–120
Cvejic N, Seppanen T (2002) Increasing the capacity of LSB-based audio steganography. In: 2002 IEEE Workshop on Multimedia Signal Processing, pp 336–338
Dasgupta K, Mandal JK, Dutta P (2012) Hash based least significant bit technique for video steganography (HLSB). Int J Secur Priv Trust Manag 1:1–11
Fridrich J, Goljan M, Du R (2001) Invertible authentication. In: Security and Watermarking of Multimedia contents III, pp 197–209
Goljan M, Fridrich JJ, Du R (2001) Distortion-free data embedding for images. In: International Workshop on Information Hiding, pp 27–41
Hong W, Chen T-S, Wu H-Y (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19:199–202
Honsinger CW, Jones PW, Rabbani M, Stoffel JC (2001) Lossless recovery of an original image containing embedded data. Google Patents
Li X, Li J, Li B, Yang B (2013) High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Sig Process 93:198–205. https://doi.org/10.1016/j.sigpro.2012.07.025
Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Inf Forensics Secur 8:1091–1100. https://doi.org/10.1109/TIFS.2013.2261062
Li M, Xiao D, Zhang Y, Nan H (2015) Reversible data hiding in encrypted images using cross division and additive homomorphism. Signal Process Image Commun 39:234–248
Li J, Liang X, Dai C, Xiang S (2019) Reversible data hiding algorithm in fully homomorphic encrypted domain. Entropy 21:625
Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21–27
Luo L, Chen Z, Chen M et al (2009) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5:187–193
Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8:1075–1083
Mo Q, Yao H, Cao F et al (2019) Reversible data hiding in encrypted image based on block classification permutation. CMC Comput Mater Contin 59:119–133
Mstafa RJ, Elleithy KM (2014) A highly secure video steganography using Hamming code (7, 4). In: IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014, pp 1–6
Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans circuits Syst video Technol 16:354–362
Raj MG, Pani SK (2022) Chaotic whale crow optimization algorithm for secure routing in the IoT environment. Int J Semant Web Inf Syst 18:1–25
Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA chaos blend to secure medical privacy. IEEE Trans Nanobioscience 16(8):850–858. https://doi.org/10.1109/TNB.2017.2780881
Ravichandran D, Praveenkumar P, Rajagopalan S, Rayappan JBB, Amirtharajan R (2021) ROI-based medical image watermarking for accurate tamper detection, localisation and recovery. Med Biol Eng Comput 59:1355–1372. https://doi.org/10.1007/s11517-021-02374-2
Rengarajan Amirtharajan M, Revathi G, Reddy JB et al (2013) Rubiks cube: a way for Random Image Steganography. Inf Technol 5:329–340
Sachnev V, Kim HJ, Nam J et al (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst Video Technol 19:989–999
Shirali-Shahreza MH, Shirali-Shahreza M (2006) A new approach to Persian/Arabic text steganography. In: 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse (ICIS-COMSAR’06), pp 310–315
Shiu C-W, Chen Y-C, Hong W (2019) Reversible data hiding in permutation-based encrypted images with strong privacy. TIIS 13:1020–1042
Shiu C-W, Chen Y-C, Hong W (2015) Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process Image Commun 39:226–233
Tang Z, Xu S, Ye D et al (2019) Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image. J Real-Time Image Process 16:709–724
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13:890–896. https://doi.org/10.1109/TCSVT.2003.815962
Wang Z, Bovik AC, Sheikh HR et al (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612
Xiong L, Xu Z, Shi Y-Q (2018) An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidimens Syst Signal Process 29:1191–1202
Yang H, Vijayakumar P, Shen J, Gupta BB (2022) A location-based privacy-preserving oblivious sharing scheme for indoor navigation. Future Gener Comput Syst 137:42–52
Yin Z, Abel A, Tang J et al (2017) Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multimed Tools Appl 76:3899–3920
Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18:255–258
Zhang X, Qian Z, Feng G, Ren Y (2014) Efficient reversible data hiding in encrypted images. J Vis Commun Image Represent 25:322–328
Zheng S, Li D, Hu D et al (2016) Lossless data hiding algorithm for encrypted images with high capacity. Multimed Tools Appl 75:13765–13778
Acknowledgements
Authors thank Department of Science & Technology, New Delhi for the FIST funding (SR/FST/ET-I/2018/221(C)). Also, Authors wish to thank the Intrusion Detection Lab at School of Electrical & Electronics Engineering, SASTRA Deemed University for providing infrastructural support to carry out this research work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethics approval
This article does not contain any studies with human participants performed by any authors.
Conflict of interest
The authors declare no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Anushiadevi, R., Amirtharajan, R. Design and development of reversible data hiding- homomorphic encryption & rhombus pattern prediction approach. Multimed Tools Appl 82, 46269–46292 (2023). https://doi.org/10.1007/s11042-023-15455-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15455-1