Abstract
In light of recent incidents involving the leakage of private photographs of Hollywood celebrities from iCloud, the need for robust methods to safeguard image content has gained paramount importance. This paper addresses this concern by introducing a novel framework for reversible image editing (RIT) supported by reversible data hiding with encrypted images (RDH-EI) techniques. Unlike traditional approaches vulnerable to hacking, this framework ensures both efficient and secure data embedding while maintaining the original image’s privacy. The framework leverages two established methods: secret writing and knowledge activity. While secret writing is susceptible to hacking due to the complex nature of cipher languages, RDH-EI-supported RIT adopts a more secure approach. It replaces the linguistic content of the original image with the semantics of a different image, rendering the encrypted image visually indistinguishable from a plaintext image. This novel substitution prevents cloud servers from detecting encrypted data, enabling the adoption of reversible data hiding (RDH) methods designed for plaintext images. The proposed framework offers several distinct advantages. Firstly, it ensures the confidentiality of sensitive information by concealing the linguistic content of the original image. Secondly, it supports reversible image editing, enabling the restoration of the original image from the encrypted version without any loss of data. Lastly, the integration of RDH techniques designed for plaintext images empowers the cloud server to embed supplementary data while preserving image quality. Incorporating convolutional neural network (CNN) and generative adversarial network (GAN) models, the framework ensures accurate data extraction and high-quality image restoration. The applications of this concealed knowledge are vast, spanning law enforcement, medical data privacy, and military communication. By addressing limitations of previous methods, it opens new avenues for image manipulation and secure data transmission. This research not only contributes a practical solution but also sets a benchmark for advancing the security and privacy paradigms in image-related technologies.
Similar content being viewed by others
Data availability
The data supporting the findings in our paper is available at following website. http://www.vision.caltech.edu/datasets/ It is also mentioned in 4.1 Dataset section. We are committed to making our research transparent and accessible to interested parties.
References
Zhang W, Wang H, Hou D, Yu N. Reversible data hiding in encrypted images by reversible image transformation. IEEE Trans Multimedia. 2016;18(8):1469–79.
Qian Z, Zhang X. Reversible data hiding in encrypted image with distributed source encoding. IEEE Trans Circuits Syst Video Technol. 2016;26(4):636–46.
Cao X, Du L, Wei X, Meng D. High capacity reversible data hiding in encrypted images by Patch-Level sparse representation. IEEE Trans Cybern. 2015;46(5):1132–43.
Zhang X, Long J, Wang Z, Cheng H. Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Trans Circuits Syst Video Technol. 2016;26(9):1622–31.
Zhou J, Sun W, Dong L, Liu X, Au OC, Tang YY. Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans Circuits Syst Video Technol. 2016;26(3):441–52. https://doi.org/10.1109/TCSVT.2015.2416591.
Li S, Hu L, Sun C, Chi L, Li T, Li H. A reversible data hiding algorithm based on prediction error with large amounts of data hiding in spatial domain. IEEE Access. 2020;8:214732–41. https://doi.org/10.1109/ACCESS.2020.3040048.
Lee C-F, Chen H-L. Reversible data hiding based on histogram modification of prediction-error. Imaging Sci J. 2011;59(5):278–92.
Zhou N, Zhang M, Wang H, Ke Y, Di F. Separable reversible data hiding scheme in homomorphic encrypted domain based on NTRU. IEEE Access. 2020;8:81412–24. https://doi.org/10.1109/ACCESS.2020.2990903.
Qiu Y, Ying Q, Lin X, Zhang Y, Qian Z. Reversible data hiding in encrypted images with dual data embedding. IEEE Access. 2020;8:23209–20. https://doi.org/10.1109/ACCESS.2020.2969252.
Rupa C, Greeshmanth, Shah MA. Novel secure data protection scheme using Martino homomorphic encryption. J Cloud Comput. 2023;12:47. https://doi.org/10.1186/s13677-023-00425-7.
Nagasree Y, Rupa C, Akshitha P, Srivastava G, Gadekallu TR, Lakshmanna K. Preserving privacy of classified authentic satellite lane imagery using proxy re-encryption and UAV technologies. Drones. 2023;7(1):53. https://doi.org/10.3390/drones7010053.
Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A. image steganography: a review of the recent advances. IEEE Access. 2021;9:23409–23.
Subramanian N, Cheheb I. End-to-end image steganography using deep convolutional autoencoders. IEEE Access. 2021;9:135585–93.
Duan X, Guo D, Liu N, Li B, Gou M, Qin C. A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network. IEEE Access. 2020;8:25777–88.
Tsai C-S, Wu H-C, Li Y-W, Ying JJ-C. “Applying GMEI-GAN to generate meaningful encrypted images in reversible data hiding techniques. In: Symmetry 2021, December 2021.
Sultana SA, Ch R, Malleswari RP. Keyless lightweight encipher using homomorphic and binomial coefficients for smart computing applications. In: 2023 2nd International conference on vision towards emerging trends in communication and networking technologies (ViTECoN), Vellore, India, 2023, pp. 1–6. https://doi.org/10.1109/ViTECoN58111.2023.10157660.
Shaik SS, Rupa C, Yadlapalli V. Secure medical data abstraction using convolutional neural network. In: 2023 11th International conference on internet of everything, microwave engineering, communication and networks (IEMECON), Jaipur, India, 2023, pp. 1–6. https://doi.org/10.1109/IEMECON56962.2023.10092311.
Motomura R, Imaizumi S, Kiya H. A reversible data-hiding method with prediction-error expansion in compressible encrypted images. Appl Sci. 2022;12(19):9418. https://doi.org/10.3390/app12199418.
Panchikkil S, Vegesana SP, Manikandan VM, Donta PK, Maddikunta PKR, Gadekallu TR. An ensemble learning approach for reversible data hiding in encrypted images with Fibonacci transform. Electronics. 2023;12(2):450. https://doi.org/10.3390/electronics12020450.
Panchikkil S, Manikandan VM. A prediction error based reversible data hiding scheme in encrypted image using block marking and cover image pre-processing. Multimedia Tools Appl. 2023. https://doi.org/10.1007/s11042-023-15319-8.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflict of interest to declare.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the topical collection “Diverse Applications in Computing, Analytics and Networks” guest edited by Archana Mantri and Sagar Juneja.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Nalavade, J.E., Patil, A., Buchade, A. et al. Deep Neural Network and GAN-Based Reversible Data Hiding in Encrypted Images: A Privacy-Preserving Approach. SN COMPUT. SCI. 5, 45 (2024). https://doi.org/10.1007/s42979-023-02347-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-023-02347-2