Image data privacy protection technology based on reversible information hiding and robust secret sharing

被引:0
作者
Si, Wenjun [1 ]
机构
[1] Zibo Vocat Inst, Dept Animat Arts, Zibo 255300, Peoples R China
来源
INTELLIGENT SYSTEMS WITH APPLICATIONS | 2024年 / 23卷
关键词
Image data privacy; Reversible information hiding; Robust secret sharing; Embedding rate; PSNR evaluation;
D O I
10.1016/j.iswa.2024.200396
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the digital age, image data security and privacy issues are critical challenges for society, commerce, and technology. By dividing images into multiple copies and distributing them among participants, highly secure sharing of secret information is achieved. Reversible information hiding technology is then used to embed secret information, enhancing privacy protection. Experimental analysis confirms the robustness and performance of this method under different noise and tampering conditions. Results demonstrate the method's effectiveness, maintaining an average peak signal-to-noise ratio of 31.26 dB even under heavy tampering. Despite a noise intensity of 0.005 and a 50 % tampering area, the peak signal-to-noise ratio remains at 46.57 and 31.78, respectively, preserving image quality. Compared to existing schemes, the method improves embedding rates by 2.99bpp and 3.0bpp. This study expands the field and finds practical applications in safeguarding different types of data with optimized algorithm performance.
引用
收藏
页数:10
相关论文
共 20 条
[1]   Increasing Participants Using Counting-Based Secret Sharing via Involving Matrices and Practical Steganography [J].
Al-Shaarani, Faiza ;
Gutub, Adnan .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2022, 47 (02) :2455-2477
[2]   An image encryption scheme based on a new hybrid chaotic map and optimized substitution box [J].
Ben Farah, M. A. ;
Farah, A. ;
Farah, T. .
NONLINEAR DYNAMICS, 2020, 99 (04) :3041-3064
[3]   A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms [J].
Chen, Yu-Chi ;
Hung, Tsung-Hsuan ;
Hsieh, Sung-Hsien ;
Shiu, Chih-Wei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (12) :3332-3343
[4]   ST-SIGMA: Spatio-temporal semantics and interaction graph aggregation for multi-agent perception and trajectory forecasting [J].
Fang, Yang ;
Luo, Bei ;
Zhao, Ting ;
He, Dong ;
Jiang, Bingbing ;
Liu, Qilie .
CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2022, 7 (04) :744-757
[5]   Quadruple histogram shifting-based reversible information hiding approach for digital images [J].
Faragallah, Osama S. ;
Elaskily, Mohamed A. ;
Alenezi, Abdullah F. ;
El-sayed, Hala S. ;
Kelash, Hamdy M. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (17) :26297-26317
[6]   Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing [J].
Gutub, Adnan .
CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2023, 8 (02) :440-452
[7]   Hiding shares by multimedia image steganography for optimized counting-based secret sharing [J].
Gutub, Adnan ;
Al-Ghamdi, Maimoona .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) :7951-7985
[8]  
Joe CV, 2021, Journal of Artificial Intelligence and Capsule Networks, V3, P259, DOI [10.36548/jaicn.2021.3.008, 10.36548/jaicn.2021.3.008, DOI 10.36548/JAICN.2021.3.008]
[9]   Secure, privacy-preserving and federated machine learning in medical imaging [J].
Kaissis, Georgios A. ;
Makowski, Marcus R. ;
Ruckert, Daniel ;
Braren, Rickmer F. .
NATURE MACHINE INTELLIGENCE, 2020, 2 (06) :305-311
[10]   Federated Learning-Based Insulator Fault Detection for Data Privacy Preserving [J].
Luan, Zhirong ;
Lai, Yujun ;
Xu, Zhicong ;
Gao, Yu ;
Wang, Qian .
SENSORS, 2023, 23 (12)