Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem

被引:6
作者
Shah, Mohsin [1 ]
Zhang, Weiming [1 ]
Hu, Honggang [1 ]
Dong, Xiaojuan [1 ]
Yu, Nenghai [1 ]
机构
[1] Univ Sci & Technol China, Sch Informat Sci & Technol, Hefei 230026, Anhui, Peoples R China
关键词
public key cryptography; cryptography; image watermarking; image processing; data encapsulation; data privacy; image coding; cloud computing; encrypted image; embedded data; RDH-EI; homomorphic public key cryptosystems; existing mature RDH schemes; prediction error expansion-based RDH; data embedding; data extraction; state-of-the-art encrypted domain schemes; prediction error expansion-based reversible data hiding; public key cryptosystem; additional data; HIGH-CAPACITY;
D O I
10.1049/iet-ipr.2018.6120
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Advances in signal processing in the encrypted domain and cloud computing have given rise to privacy-preserving technologies. In recent years, reversible data hiding in encrypted images (RDH-EI) has received attention from the research community because additional data can be embedded into an encrypted image without accessing its original content, and the encrypted image can be losslessly recovered after extracting the embedded data. Although the recent development of RDH-EI compatible with homomorphic public key cryptosystems has intensified research interest, most of the existing mature RDH schemes cannot be transplanted to the encrypted domain due to the limitations of the underlying cryptosystems. In this paper, prediction error expansion based RDH-ED using probabilistic and homomorphic properties of the Paillier cryptosystem is presented. This work implements non-integer mean value computation in the encrypted domain without any interactive protocol between the content owner and the cloud server. This work presents mathematical detail of pixel prediction (mean), prediction error, error expansion and data embedding in the encrypted domain and data extraction and content recovery in the plain domain. Experimental results from standard test images reveal that the proposed scheme outperforms other state-of-the-art encrypted domain schemes.
引用
收藏
页码:1705 / 1713
页数:9
相关论文
共 43 条
  • [1] [Anonymous], 1978, FDN SEC COMPUT
  • [2] Barton J.M., 1997, United States Patent, Patent No. 5646997
  • [3] Encrypted domain DCT based on homomorphic cryptosystems
    Bianchi T.
    Piva A.
    Barni M.
    [J]. EURASIP Journal on Information Security, 2009 (1):
  • [4] On the numerical factors of the arithmetic forms alpha(n +/-) beta (n) .
    Carmichael, RD
    [J]. ANNALS OF MATHEMATICS, 1913, 15 : 30 - 48
  • [5] Lossless generalized-LSB data embedding
    Celik, MU
    Sharma, G
    Tekalp, AM
    Saber, E
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (02) : 253 - 266
  • [6] Encrypted signal-based reversible data hiding with public key cryptosystem
    Chen, Yu-Chi
    Shiu, Chih-Wei
    Horng, Gwoboa
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) : 1164 - 1170
  • [7] Damgård I, 2001, LECT NOTES COMPUT SC, V1992, P119
  • [8] A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS
    ELGAMAL, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) : 469 - 472
  • [9] Writing on wet paper
    Fridrich, J
    Goljan, M
    Lisonek, P
    Soukal, D
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (10) : 3923 - 3935
  • [10] Fridrich J., 2002, EURASIP J ADV SIG PR, V2002