Reversible data hiding in encrypted images using chaos theory and Chinese Remainder Theorem

被引:0
作者
Yavuz, Erdem [1 ]
机构
[1] Bursa Tech Univ, Fac Engn & Nat Sci, Dept Comp Engn, Yildirim, Bursa, Turkiye
关键词
Chaos theory; Chinese remainder theorem; Image encryption; Information security; Reversible data hiding; RDHEI; SCHEME; PRIVACY; SYSTEM;
D O I
10.1007/s10044-025-01495-w
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Reversible data hiding in encrypted images (RDHEI) has recently garnered attention for embedding secret data within anonymized images, overcoming the spatial-correlation dependency of traditional RDH methods. In particular, this paper introduces a new RDHEI scheme based on chaos theory and Chinese Remainder Theorem (CRT). Initially, the host image is encrypted using a chaos-based symmetric cipher that adheres to strong cryptographic principles and demonstrates robust security features. Next, bits from the secret image are XORed with a random bit sequence generated by a chaotic function, initiated by a data-hiding key. Subsequently, a new data embedding method, based on pixel fusion and the CRT, is introduced. This data-hiding and encoding process, which incorporates two encrypted image bytes and one secret image bit, maintains a consistent embedding capacity of 0.5 bits per pixel (BPP), independent of the host image's complexity, while ensuring reversibility. At the receiving end, both the original host image and the embedded secret data can be flawlessly recovered. Furthermore, the proposed scheme enables extraction of the secret image based solely on the data-hiding key, without necessitating the decryption key, thereby achieving the method's semi-separability property. Experimental results indicate that the proposed scheme, which offers a fixed embedding capacity and induces only a minimal increase in the watermarked-to-original image size ratio (WOSR), upholds essential theoretical values necessary for encryption and withstands common cryptographic attacks. Moreover, as a fully reversible and semi-separable technique, the proposed scheme demonstrates both feasibility and efficiency in data hiding, surpassing several state-of-the-art methods in certain performance metrics.
引用
收藏
页数:25
相关论文
共 43 条
[1]   A practical, secure, and auditable e-voting system [J].
AboSamra, Kareem M. ;
AbdelHafez, Ahmed A. ;
Assassa, Ghazy M. R. ;
Mursi, Mona F. M. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 36 :69-89
[2]   A new hybrid digital chaotic system with applications in image encryption [J].
Alawida, Moatsum ;
Samsudin, Azman ;
Sen Teh, Je ;
Alkhawaldeh, Rami S. .
SIGNAL PROCESSING, 2019, 160 :45-58
[3]   Reversible data hiding in encrypted image using bit-plane based label-map encoding with optimal block size [J].
Ankur ;
Kumar, Rajeev ;
Sharma, Ajay K. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 90
[4]  
[Anonymous], SIPI Image Database
[5]  
Baker G L., 1996, Chaotic Dynamics: An Introduction, V2, DOI DOI 10.1017/CBO9781139170864
[6]   Statistical privacy protection for secure data access control in cloud ☆ [J].
Baseri, Yaser ;
Hafid, Abdelhakim ;
Firoozjaei, Mahdi Daghmehchi ;
Cherkaoui, Soumaya ;
Ray, Indrakshi .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 84
[7]   An enhanced separable reversible and secure patient data hiding algorithm for telemedicine applications [J].
Bhardwaj, Rupali ;
Aggarwal, Ashutosh .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 186
[8]   An enhanced reversible patient data hiding algorithm for E-healthcare [J].
Bhardwaj, Rupali .
BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2021, 64
[9]  
Cox I. J., 2007, Digital watermarking and steganography, V2nd
[10]  
Fridrich J., 2009, STEGANOGRAPHY DIGITA, DOI 10.1017/CBO9781139192903