Skip to main content
Log in

Encrypted images-based reversible data hiding in Paillier cryptosystem

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Homomorphic public key technology effectively protects privacy, allowing algebraic operations directly in the cipher-text. Therefore, it has been extensively studied in the field of cloud computing. In this study, an encrypted image-based data hiding (EIRDH) algorithm with homomorphic public key cryptosystem is presented. The key contributions are these two sides. (1) An improved fast Paillier homomorphic public key cryptosystem system is proposed for encrypting image. It improves the efficiency of encryption operations greatly. (2) A difference expansion (DE) scheme is developed by exploiting the cover pixel to construct a new pair of pixels for data hiding. Compared with other methods, the experimental results show that, the proposed method has larger payload and higher stego-image quality. It accomplishes the image quality’s increasing instead of general decreasing.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Alassaf N, Gutub A, Parah SA, Al Ghamdi M (2018) Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6801-z

    Article  Google Scholar 

  2. Caldelli R, Filippini F, Becarelli R (2010) Reversible watermarking techniques: an overview and a classification. EURASIP Journal on Information Security

  3. Chen YC, Shiu CW, Horng G (2014) Encrypted signal-based reversible data hiding with public key cryptosystem. J Vis Commun Image Represent 25:1164–1170

    Article  Google Scholar 

  4. Di F, Duan J, Zhang M, Liu J (2018) Encrypted image-based reversible data hiding with public key cryptography from interpolation-error expansion. Adv Internetw Data Web Technol: 138–149: doi:https://doi.org/10.1007/978-3-319-59463-7_14

    Google Scholar 

  5. Di F, Duan J, Zhang M, Zhang Y, Liu J (2018) Reversible image data hiding with homomorphic encryption and contrast enhancement. Advances in Internetworking, Data & Web Technologies:150–159. doi:https://doi.org/10.1007/978-3-319-59463-7_15

    Google Scholar 

  6. Gutub AA-A (2007) High speed hardware architecture to compute galois fields GF(p) Montgomery inversion with scalability features. IET Comput Digit Technol 1(4):389–396

    Article  Google Scholar 

  7. Gutub AA-A, Ferreira Tenca A. (2003) Efficient scalable hardware architecture for Montgomery inverse computation in GF(p),2003, IEEE Workshop on Signal Processing Systems (SIPS'03): 93–98. Seoul, Korea, August 27–29

  8. Gutub AA-A, Khan FA-A (2012) Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems. International Conference on Advanced Computer Science Applications and Technologies: 116–121

  9. Gutub AA-A, Ferreira Tenca A, Koç ÇK (2002) Scalable VLSI Architecture for GF(p) Montgomery Modular Inverse Computation, Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI.02): 46–51

  10. Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-5293-6

    Article  Google Scholar 

  11. Hong W, Chen TS, Wu HY (2011) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 9(4):199–202

    Article  Google Scholar 

  12. Janani S, P Poorani S (2014) In-dependable data hiding in an encrypted image using FCM-DH algorithm[J]. IJRCCT 3(2):223–225

    Google Scholar 

  13. Lagendijk RL, Zekeriya E, Barni M (2013) Encrypted signal processing for privacy protection: conveying the utility of homomorphic encryption and multiparty computation. IEEE Signal Process 30(1):82–105

    Article  Google Scholar 

  14. Li M, Li Y (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190–196

    Article  Google Scholar 

  15. Li M, Xiao D, Peng Z, Nan HA (2014) Modified reversible data hiding in encrypted images using random diffusion and accurate prediction [J]. ETRI J 36(2):325–328

    Article  Google Scholar 

  16. Li M, Xiao D, Kulsoom A, Zhang Y (2015) Improved reversible data hiding for encrypted images using full embedding strategy. Electron Lett 51(9):690–691

    Article  Google Scholar 

  17. Li M, Xiao D, Zhang Y, Nan H (2015) Reversible data hiding in encrypted images using cross division and additive homomorphism. Signal Process: Image Commun 39:234–248

    Google Scholar 

  18. Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inform Forensics Sec 8(3):553–562

    Article  Google Scholar 

  19. Ou B, Li X, Zhao Y, Ni R (2013) Reversible data hiding based on PDE predictor. J Syst Softw 86(10):2700–2709

    Article  Google Scholar 

  20. Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. Proceeding of the Advances Cryptology, EUROCRYPT99,LNCS 1592:223–238

    Article  MathSciNet  Google Scholar 

  21. Qian Z, Zhang X (2015) Reversible data hiding in encrypted image with distributed source encoding. IEEE Transactions on Circuits and Systems for Video Technology

  22. Shiu C-W, Chen Y-C, Hong W (2015) Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process Image Commun 39:226–233

    Article  Google Scholar 

  23. Tang Z, Wang F, Zhang XQ (2017) Image encryption based on random projection partition and chaotic system. Multimed Tools Applic 76(6):8257–8283

    Article  Google Scholar 

  24. Tang Z, Xu S, Ye D, Wang J, Zhang X, Yu C (2018) Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image. J Real-Time Image Proc. https://doi.org/10.1007/s11554-018-0838-0

    Article  Google Scholar 

  25. Tang Z, Xu S, Yao H, Qin C (2018) Reversible data hiding with differential compression in encrypted image. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6567-3

    Article  Google Scholar 

  26. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 3(8):890–896

    Article  Google Scholar 

  27. USC-SIPI image database 〈http://sipi.usc.edu/database〉

  28. Xiang SJ, Luo XR (2016) Reversible data hiding in encrypted image based on homomorphic public key cryptosystem. Ruan Jian Xue Bao/Journal of Software 27(6):1592–1601 (in Chinese). http://www.jos.org.cn /1000-9825/5007.htm

    MathSciNet  MATH  Google Scholar 

  29. Xiang S, Luo X (2017) Efficient reversible data hiding in encrypted image with public key cryptosystem. EURASIP J Adv Signal Process 2017:59

    Article  Google Scholar 

  30. Xiang S, Luo X (2018) Reversible data hiding in homomorphic encrypted domain by mirroring Ciphertext group. IEEE Trans Circ Syst Video Technol 28(11):3099–3110

    Article  MathSciNet  Google Scholar 

  31. Xiao D, Chen S (2014) Separable data hiding in encrypted image based on compressive sensing [J]. Electron Lett 50(8):598–600

    Article  Google Scholar 

  32. Yin Z., Luo B, Hong W (2014) Separable and error-free reversible data hiding in encrypted image with high payload [J]. Sci World J

  33. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258

    Article  Google Scholar 

  34. Zhang X (2011) Lossy compression and iterative reconstruction for encrypted image. IEEE Trans Inform Forensics Sec 6(1):53–58

    Article  Google Scholar 

  35. Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inform Forensics Sec 7(2):826–832

    Article  Google Scholar 

  36. Zhang X (2014) Reversibility improved data hiding in encrypted images. Signal Process 94(0):118–127

    Article  Google Scholar 

  37. Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94:118–127

    Article  Google Scholar 

  38. Zhang S, Gao T, Sheng G (2014) A joint encryption and reversible data hiding scheme based on integer-DWT and arnold map permutation [J]. Journal of Applied Mathematics

  39. Zhang XP, Long J, Wang Z, Cheng H (2016) Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Trans Circ Syst Video Technol 26(9):1622–1631

    Article  Google Scholar 

Download references

Acknowledgements

The authors are grateful for the anonymous reviewers’ insightful comments and valuable suggestions sincerely, which can substantially improve the quality of this study. This work is partially supported by the National Natural Science Foundation of China (No.61371150).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cuiling Jiang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jiang, C., Pang, Y. Encrypted images-based reversible data hiding in Paillier cryptosystem. Multimed Tools Appl 79, 693–711 (2020). https://doi.org/10.1007/s11042-019-07874-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-07874-w

Keywords

Navigation