Abstract
Reversible Data Hiding in Encrypted Image (RDHEI) schemes may redistribute the data hiding procedure to other parties and can preserve privacy of the cover image. Recently, cloud computing technology has led to the rapid growth of networked media, and many multimedia rights are owned by multiple parties, such as a film's producer and multiple distributors. Thus, the data hiding task could be distributed to multiple distributed servers. Multi-party data hiding has become an important demand for networked media. In addition, it is essential to preserve multi-server and multi-message privacy and data integrity. However, most of the RDHEI schemes involve only one data hider. That inspired us to design the secure multi-party embedding over distributed encrypted-image servers as a solution for multi-party RDHEI applications. In this article, we propose a novel Reversible Data Hiding over Distributed Encrypted-Image Servers (RDH-DES) based on secret sharing. The Chinese remainder theorem, secret sharing, and block-level scrambling are developed as a lightweight cryptography to generate the encrypted image shares. These shares are distributed to different image servers and are used to embed secret data in the proposed framework. The marked encrypted image can be constructed through the marked encrypted shares from different parties, and the decryption and extraction can be completed by the receiver. The experimental results and theoretical analysis have demonstrated that the proposed scheme is secure and effective.
- [1] . 2016. Reversible data hiding: Advances in the past two decades. IEEE Access 4 (2016), 3210–3237.Google ScholarCross Ref
- [2] . 2020. Data hiding: Current trends, innovation and potential challenges. ACM Trans. Multimedia Comput. Commun. Appl. 16, 3s (Oct. 2020)
Article 101 .DOI: Google ScholarDigital Library - [3] . 2013. A generalized tamper localization approach for reversible watermarking algorithms. ACM Trans. Multimedia Comput. Commun. Appl. 9, 3 (June 2013),
Article 19 .DOI: Google ScholarDigital Library - [4] . 2021. High capacity reversible data hiding in encrypted image based on intra-block lossless compression. IEEE Trans. Multimedia 23 (2021), 1466–1473.
DOI: Google ScholarDigital Library - [5] . 2003. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13, 8 (2003), 890–896.Google ScholarDigital Library
- [6] . 2014. Local-prediction-based difference expansion reversible watermarking. IEEE Trans. Image Process. 23, 4 (2014), 1779–1790.Google ScholarDigital Library
- [7] . 2019. An improved integer transform combining with an irregular block partition. Symmetry 11, 1 (2019), 49.
DOI: Google ScholarCross Ref - [8] . 2006. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16, 3 (2006), 354–362.Google ScholarDigital Library
- [9] . 2011. Lossless data embedding using generalized statistical quantity histogram. IEEE Trans. Circuits Syst. Video Technol. 21, 8 (2011), 1061–1070.Google ScholarDigital Library
- [10] . 2012. Improved rhombus interpolation for reversible watermarking by difference expansion. In Proceedings of the 2012 20th European Signal Processing Conference (EUSIPCO’12). IEEE, Los Alamitos, CA, 1688–1692.Google Scholar
- [11] . 2013. General framework to histogram-shifting-based reversible data hiding. IEEE Trans. Image Process. 22, 6 (2013), 2181–2191.Google ScholarDigital Library
- [12] . 2013. A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans. Inf. Forensics Secur. 8, 7 (2013), 1091–1100.Google ScholarDigital Library
- [13] . 2017. Optimal PPVO-based reversible data hiding. J. Vis. Commun. Image Represent. 48 (2017), 317–328.Google ScholarDigital Library
- [14] . 2017. Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans. Cybernetics 47, 2 (2017), 315–326.Google Scholar
- [15] . 2004. Prediction-error based reversible watermarking. In Proceedings of the IEEE International Conference on Information Processing. 1549–1552.
DOI: Google ScholarCross Ref - [16] . 2007. Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16, 3 (2007), 721–730.Google ScholarDigital Library
- [17] . 2011. Improved embedding for prediction-based reversible watermarking. IEEE Trans. Inf. Forensics Secur. 6, 3 (2011), 873–882.Google ScholarDigital Library
- [18] . 2021. High-fidelity reversible image watermarking based on effective prediction error-pairs modification. IEEE Trans. Multimedia 23 (2021), 52–63.
DOI: Google ScholarCross Ref - [19] . 2015. On local prediction based reversible watermarking. IEEE Trans. Image Process. 24, 4 (2015), 1244–1246.Google ScholarDigital Library
- [20] . 2016. Adaptive pairing reversible watermarking. IEEE Trans. Image Process. 25, 5 (2016), 2420–2422.Google ScholarDigital Library
- [21] . 2019. Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion. J. Inf. Secur. Appl. 47 (2019), 78–85.Google ScholarDigital Library
- [22] . 2015. Exploiting Similarities between Secret and Cover Images for Improved Embedding Efficiency and Security in Digital Steganography. Ph.D. Dissertation. Department of Applied Computing, Buckingham University, Buckingham, UK.Google Scholar
- [23] . 2020. Securing multimedia by using DNA-based encryption in the cloud computing environment. ACM Trans. Multimedia Comput. Commun. Appl. 16, 3s (October 2020),
Article 99 .DOI: Google ScholarDigital Library - [24] . 2019. A multiparty watermarking protocol for cloud environments. J. Inf. Secur. Appl. 47 (2019), 246–257.Google ScholarDigital Library
- [25] . 2011. Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18, 4 (2011), 255–258.Google ScholarCross Ref
- [26] . 2018. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forensics Secur. 13, 7 (2018), 1670–1681.Google ScholarCross Ref
- [27] . 2018. Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group. IEEE Trans. Circuits Syst. Video Technol. 28, 11 (2018), 3099–3110.Google ScholarDigital Library
- [28] . 2019. A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms. IEEE Trans. Inf. Forensics Secur. 14, 12 (2019), 3332–3343.Google ScholarDigital Library
- [29] . 2016. New framework for reversible data hiding in encrypted domain. IEEE Trans. Inf. Forensics Secur. 11, 12 (2016), 2777–2789.Google ScholarDigital Library
- [30] . 2020. Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding. IEEE Trans. Multimedia 22, 4 (2020), 874–884.Google ScholarDigital Library
- [31] . 2020. Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain. IEEE Trans. Circuits Syst. Video Technol. 30, 8 (2020), 2353–2365.Google ScholarDigital Library
- [32] . 2018. Adopting secret sharing for reversible data hiding in encrypted images. Signal Process. 143 (2018), 269–281.Google ScholarDigital Library
- [33] . 2014. Encrypted signal-based reversible data hiding with public key cryptosystem. J. Vis. Commun. Image Represent. 25, 5 (2014), 1164–1170.Google ScholarCross Ref
- [34] . 2016. Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Trans. Circuits Syst. Video Technol. 26, 9 (2016), 1622–1631.Google ScholarDigital Library
- [35] . 2021. Lightweight multi-party authentication and key agreement protocol in IoT-based E-healthcare service. ACM Trans. Multimedia Comput. Commun. Appl. 17, 2s (June 2021),
Article 64 .DOI: Google ScholarDigital Library - [36] . 2015. Double verification secret sharing mechanism based on adaptive pixel pair matching. ACM Trans. Multimedia Comput. Commun. Appl. 11, 3 (January 2015),
Article 36 .DOI: Google ScholarDigital Library - [37] . 2014. Steganography based on pixel intensity value decomposition. Proc. SPIE 9120 (2014), 912005.
DOI: Google ScholarCross Ref - [38] . 2020. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders. IEEE Trans. Dependable Secure Comput. Early access, July 27, 2020.
DOI: Google ScholarCross Ref - [39] . 2017. A secure image watermarking using Chinese remainder theorem based on Haar wavelet transform. In Proceedings of the 2017 4th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE’17). IEEE, Los Alamitos, CA, 208–212, 2017.
DOI: Google ScholarCross Ref - [40] . 2017. Imperceptible image watermarking based on Chinese remainder theorem over the edges. In Proceedings of the International Conference on Electrical Engineering, Computer Science, and Informatics (EECSI’17). IEEE, Los Alamitos, CA, 1–5.
DOI: Google ScholarCross Ref - [41] . 2014. A digital watermarking algorithm based on Chinese remainder theorem. In Proceedings of the 2014 10th International Conference on Communications (COMM’14). IEEE, Los Alamitos, CA, 1–4.
DOI: Google ScholarCross Ref - [42] . 2012. A robust steganography-based software watermarking. In Proceedings of the 2012 ACM Research in Applied Computation Symposium (RACS’12). ACM, New York, NY, 333–337.
DOI: Google ScholarDigital Library - [43] . 2020. Reversible image secret sharing. IEEE Trans. Inf. Forensics Secur. 15 (2020), 3848–3858.
DOI: Google ScholarDigital Library - [44] . 2006. Chinese remainder theorem-based secret sharing scheme. J. Electron. Inf. Technol. 28, 12 (2006), 2378–2381.Google Scholar
- [45] . 2021. Robust secret image sharing resistant to noise in shares. ACM Trans. Multimedia Comput. Commun. Appl. 17, 1 (April 2021),
Article 24 .DOI: Google ScholarDigital Library - [46] . 2018. Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 144 (2018), 134–144.Google ScholarDigital Library
- [47] . 2011. Break our steganographic system—The ins and outs of organizing BOSS. In Information Hiding. Lecture Notes in Computer Science, 6958. Springer, 59–70.
DOI: Google ScholarCross Ref - [48] . 2022. Image Database of BOWS-2. Retrieved March 1, 2022 from http://bows2.eclille.fr/.Google Scholar
- [49] . 2004. UCID—An uncompressed color image database. Proc. SPIE 5307 (2004), 472–480.
DOI: Google ScholarCross Ref - [50] . 1997. The USC-SIPI Image Database: Version 5. Technical Report 315. USC Viterbi School of Engineering, Signal and Image Processing Institute, Los Angeles, CA.Google Scholar
Index Terms
- RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret Sharing
Recommendations
Reversible data hiding method using meaningful encrypted images
Encrypted image-based reversible data hiding methods have recently been introduced to conduct research on data encryption. In these methods, an image provider generates encrypted images that are supplied to a data sender. The data sender embeds secret ...
Adopting secret sharing for reversible data hiding in encrypted images
Secret sharing is adopted for reversible data hiding in encrypted images.Difference distance is preserved in encrypted images.Reduce the data expansion.Increase the embedding capacity. Secret sharing is an alternative method for protecting an image by ...
Reversible secret image sharing scheme in encrypted images
The previous secret image sharing schemes did not provide a copyright and privacy for cover images. The reason is that a dealer selects a cover image by itself and embeds directly the secret data into the cover image. In this paper, a reversible secret ...
Comments