skip to main content
research-article

RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret Sharing

Authors Info & Claims
Published:05 January 2023Publication History
Skip Abstract Section

Abstract

Reversible Data Hiding in Encrypted Image (RDHEI) schemes may redistribute the data hiding procedure to other parties and can preserve privacy of the cover image. Recently, cloud computing technology has led to the rapid growth of networked media, and many multimedia rights are owned by multiple parties, such as a film's producer and multiple distributors. Thus, the data hiding task could be distributed to multiple distributed servers. Multi-party data hiding has become an important demand for networked media. In addition, it is essential to preserve multi-server and multi-message privacy and data integrity. However, most of the RDHEI schemes involve only one data hider. That inspired us to design the secure multi-party embedding over distributed encrypted-image servers as a solution for multi-party RDHEI applications. In this article, we propose a novel Reversible Data Hiding over Distributed Encrypted-Image Servers (RDH-DES) based on secret sharing. The Chinese remainder theorem, secret sharing, and block-level scrambling are developed as a lightweight cryptography to generate the encrypted image shares. These shares are distributed to different image servers and are used to embed secret data in the proposed framework. The marked encrypted image can be constructed through the marked encrypted shares from different parties, and the decryption and extraction can be completed by the receiver. The experimental results and theoretical analysis have demonstrated that the proposed scheme is secure and effective.

REFERENCES

  1. [1] Shi Yun-Qing, Li Xiaolong, Zhang Xinpeng, Wu Hao-Tian, and Ma Bin. 2016. Reversible data hiding: Advances in the past two decades. IEEE Access 4 (2016), 32103237.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Singh Amit Kumar. 2020. Data hiding: Current trends, innovation and potential challenges. ACM Trans. Multimedia Comput. Commun. Appl. 16, 3s (Oct. 2020) Article 101. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Naskar Ruchira and Chakraborty Rajat Subhra. 2013. A generalized tamper localization approach for reversible watermarking algorithms. ACM Trans. Multimedia Comput. Commun. Appl. 9, 3 (June 2013), Article 19. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Wang Yaoming, Cai Zhanchuan, and He Wenguang. 2021. High capacity reversible data hiding in encrypted image based on intra-block lossless compression. IEEE Trans. Multimedia 23 (2021), 14661473. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Tian Jun. 2003. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13, 8 (2003), 890896.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Dragoi Ioan-Catalin and Coltuc Dinu. 2014. Local-prediction-based difference expansion reversible watermarking. IEEE Trans. Image Process. 23, 4 (2014), 17791790.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Weng Shaowei, Chen Yi, Hong Wien, Pan Jeng-Shyang, Chang Chin-Chen, and Liu Yijun. 2019. An improved integer transform combining with an irregular block partition. Symmetry 11, 1 (2019), 49. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Ni Zhicheng, Shi Yun-Qing, Ansari N., and Su Wei. 2006. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16, 3 (2006), 354362.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Gao Xinbo, An Lingling, Yuan Yuan, Tao Dacheng, and Li Xuelong. 2011. Lossless data embedding using generalized statistical quantity histogram. IEEE Trans. Circuits Syst. Video Technol. 21, 8 (2011), 10611070.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Dragoi Catalin and Coltuc Dinu. 2012. Improved rhombus interpolation for reversible watermarking by difference expansion. In Proceedings of the 2012 20th European Signal Processing Conference (EUSIPCO’12). IEEE, Los Alamitos, CA, 16881692.Google ScholarGoogle Scholar
  11. [11] Li Xiaolong, Li Bin, Yang Bin, and Zeng Tieyong. 2013. General framework to histogram-shifting-based reversible data hiding. IEEE Trans. Image Process. 22, 6 (2013), 21812191.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Li Xiaolong, Zhang Weiming, Gui Xinlu, and Yang Bin. 2013. A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans. Inf. Forensics Secur. 8, 7 (2013), 10911100.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Weng Shaowei, Zhang Guohao, Pan Jeng-Shyang, and Zhou Zhili. 2017. Optimal PPVO-based reversible data hiding. J. Vis. Commun. Image Represent. 48 (2017), 317328.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Wang Junxiang, Ni Jiangqun, Zhang Xing, and Shi Yun-Qing. 2017. Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans. Cybernetics 47, 2 (2017), 315326.Google ScholarGoogle Scholar
  15. [15] Thodi Diljith M. and Rodriguez Jeffrey J.. 2004. Prediction-error based reversible watermarking. In Proceedings of the IEEE International Conference on Information Processing. 15491552. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Thodi Diljith M. and Rodriguez Jeffrey J.. 2007. Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16, 3 (2007), 721730.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Coltuc Dinu. 2011. Improved embedding for prediction-based reversible watermarking. IEEE Trans. Inf. Forensics Secur. 6, 3 (2011), 873882.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] He Wenguang, Cai Zhanchuan, and Wang Yaomin. 2021. High-fidelity reversible image watermarking based on effective prediction error-pairs modification. IEEE Trans. Multimedia 23 (2021), 5263. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Dragoi Ioan-Catalin and Coltuc Dinu. 2015. On local prediction based reversible watermarking. IEEE Trans. Image Process. 24, 4 (2015), 12441246.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Dragoi Ioan-Catalin and Coltuc Dinu. 2016. Adaptive pairing reversible watermarking. IEEE Trans. Image Process. 25, 5 (2016), 24202422.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Xiong Lizhi and Dong Danping. 2019. Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion. J. Inf. Secur. Appl. 47 (2019), 7885.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Abdulla Alan Anwer. 2015. Exploiting Similarities between Secret and Cover Images for Improved Embedding Efficiency and Security in Digital Steganography. Ph.D. Dissertation. Department of Applied Computing, Buckingham University, Buckingham, UK.Google ScholarGoogle Scholar
  23. [23] Namasudra Suyel, Chakraborty Rupak, Majumder Abhishek, and Moparthi Nageswara Rao. 2020. Securing multimedia by using DNA-based encryption in the cloud computing environment. ACM Trans. Multimedia Comput. Commun. Appl. 16, 3s (October 2020), Article 99. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Frattolillo Franco. 2019. A multiparty watermarking protocol for cloud environments. J. Inf. Secur. Appl. 47 (2019), 246257.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Zhang Xinpeng. 2011. Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18, 4 (2011), 255258.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Puteaux Pauline and Puech William. 2018. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forensics Secur. 13, 7 (2018), 16701681.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Xiang Shijun and Luo Xinrong. 2018. Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group. IEEE Trans. Circuits Syst. Video Technol. 28, 11 (2018), 30993110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Chen Yu-Chi, Hung Tsung-Hsuan, Hsieh Sung-Hsien, and Shiu Chih-Wei. 2019. A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms. IEEE Trans. Inf. Forensics Secur. 14, 12 (2019), 33323343.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Huang Fangjun, Huang Jiwu, and Shi Yun-Qing. 2016. New framework for reversible data hiding in encrypted domain. IEEE Trans. Inf. Forensics Secur. 11, 12 (2016), 27772789.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Yin Zhaoxia, Xiang Youzhi, and Zhang Xinpeng. 2020. Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding. IEEE Trans. Multimedia 22, 4 (2020), 874884.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Ke Yan, Zhang Min-Qing, Liu Jia, Su Ting-Ting, and Yang Xiao-Yuan. 2020. Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain. IEEE Trans. Circuits Syst. Video Technol. 30, 8 (2020), 23532365.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Wu Xiaotian, Weng Jian, and Yan WeiQi. 2018. Adopting secret sharing for reversible data hiding in encrypted images. Signal Process. 143 (2018), 269281.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Chen Yu-Chi, Shiu Chih-Wei, and Horng Gwoboa. 2014. Encrypted signal-based reversible data hiding with public key cryptosystem. J. Vis. Commun. Image Represent. 25, 5 (2014), 11641170.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Zhang Xinpeng, Long Jing, Wang Zichi, and Cheng Hang. 2016. Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Trans. Circuits Syst. Video Technol. 26, 9 (2016), 16221631.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Kumar Sahu Amiya, Sharma Suraj, and Puthal Deepak. 2021. Lightweight multi-party authentication and key agreement protocol in IoT-based E-healthcare service. ACM Trans. Multimedia Comput. Commun. Appl. 17, 2s (June 2021), Article 64. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Lin Pei-Yu. 2015. Double verification secret sharing mechanism based on adaptive pixel pair matching. ACM Trans. Multimedia Comput. Commun. Appl. 11, 3 (January 2015), Article 36. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Anwar Abdulla Alan, Sellahewa Harin, and Jassim Sabah A.. 2014. Steganography based on pixel intensity value decomposition. Proc. SPIE 9120 (2014), 912005. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Chen Bing, Lu Wei, Huang Jiwu, Weng Jian, and Zhou Yicong. 2020. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders. IEEE Trans. Dependable Secure Comput. Early access, July 27, 2020. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Sudibyo Usman, Eranisa Fatma, Rachmawanto Eko Hari, Setiadi De Rosal Ignatius Moses, and Sari Christy Atika. 2017. A secure image watermarking using Chinese remainder theorem based on Haar wavelet transform. In Proceedings of the 2017 4th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE’17). IEEE, Los Alamitos, CA, 208212, 2017. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Adi Prajanto Wahyu, Astuti Yani Parti, and Subhiyakto Egia Rosi. 2017. Imperceptible image watermarking based on Chinese remainder theorem over the edges. In Proceedings of the International Conference on Electrical Engineering, Computer Science, and Informatics (EECSI’17). IEEE, Los Alamitos, CA, 15. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Feng Luo Xiao, Xu Qiaozhi, and Zhang Junxing. 2014. A digital watermarking algorithm based on Chinese remainder theorem. In Proceedings of the 2014 10th International Conference on Communications (COMM’14). IEEE, Los Alamitos, CA, 14. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Jeon Cheol and Cho Yookun. 2012. A robust steganography-based software watermarking. In Proceedings of the 2012 ACM Research in Applied Computation Symposium (RACS’12). ACM, New York, NY, 333337. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] Yan Xuehu, Lu Yuliang, Liu Lintao, and Song Xianhua. 2020. Reversible image secret sharing. IEEE Trans. Inf. Forensics Secur. 15 (2020), 38483858. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. [44] Xi Guo-Bao, Chen Hui-Fang, and Zhao Wen-Dao. 2006. Chinese remainder theorem-based secret sharing scheme. J. Electron. Inf. Technol. 28, 12 (2006), 23782381.Google ScholarGoogle Scholar
  45. [45] Yan Xuehu, Liu Lintao, Li Longlong, and Lu Yuliang. 2021. Robust secret image sharing resistant to noise in shares. ACM Trans. Multimedia Comput. Commun. Appl. 17, 1 (April 2021), Article 24. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. [46] Hua Zhongyun, Yi Shuang, and Zhou Yicong. 2018. Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 144 (2018), 134144.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Bas Patrick, Filler Tomás, and Pevný Tomás. 2011. Break our steganographic system—The ins and outs of organizing BOSS. In Information Hiding. Lecture Notes in Computer Science, 6958. Springer, 5970. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  48. [48] Bas Patrick and Furon Teddy. 2022. Image Database of BOWS-2. Retrieved March 1, 2022 from http://bows2.eclille.fr/.Google ScholarGoogle Scholar
  49. [49] Schaefer Gerald and Stich Michal. 2004. UCID—An uncompressed color image database. Proc. SPIE 5307 (2004), 472480. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  50. [50] Weber Allan G.. 1997. The USC-SIPI Image Database: Version 5. Technical Report 315. USC Viterbi School of Engineering, Signal and Image Processing Institute, Los Angeles, CA.Google ScholarGoogle Scholar

Index Terms

  1. RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret Sharing

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Multimedia Computing, Communications, and Applications
        ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 19, Issue 1
        January 2023
        505 pages
        ISSN:1551-6857
        EISSN:1551-6865
        DOI:10.1145/3572858
        • Editor:
        • Abdulmotaleb El Saddik
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 5 January 2023
        • Online AM: 9 March 2022
        • Accepted: 19 January 2022
        • Received: 13 July 2021
        Published in tomm Volume 19, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format