A high payload separable reversible data hiding in cipher image with good decipher image quality

被引:9
作者
Anushiadevi, R. [1 ]
Pravinkumar, Padmapriya [2 ]
Rayappan, John Bosco Balaguru [2 ]
Amirtharajan, Rengarajan [2 ]
机构
[1] SASTRA Deemed Univ, Sch Comp, Thirumalaisamudram, Thanjavur, India
[2] SASTRA Deemed Univ, Sch Elect & Elect Engn SEEE, Thirumalaisamudram, Thanjavur, India
关键词
Reversible data hiding; pixel expansion; embedding capacity; imperceptibility; SRDHIEI; DIFFERENCE; STEGANOGRAPHY;
D O I
10.3233/JIFS-179721
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Reversible Data Hiding (RDH) is a technique that is used to protect the secret by using digital cover media to hide it and to retrieve the cover after extracting the secret. The Reversible Data Hiding In an Encrypted Image (RDHIEI) protects the privacy of secret information and also the cover by hiding confidential information in a cipher image. Some of the algorithms in RDHIEI can extract the information if and only if the cipher image is already decrypted and some algorithms can decrypt the image if only if the data has already been extracted from the cipher image. In those algorithms, the extraction and decryption cannot be separated. But some applications like healthcare and army image processing require that image recovery and information extraction to be separate processes; this new technique is called Separable Reversible Data Hiding In an Encrypted Image (SRDHIEI). In this paper, a novel SRDHIEI is suggested with high payload and good quality decipher image by embedding information in a cipher image on two levels. In the first level data is embedded by the Least Significant Bit(LSB) substitution method and in the second level data is embedded by using Pixel Expansion (PE) method. For image confidentiality, the cover image is encrypted by using an additive homomorphism technique. The benefits of the proposed method is to transfer the cover image in an extremely secure manner with PSNR of 8.6813 dB, -0.0077 correlation and 7.998 entropy. The average embedding capacity of the proposed method is 217579 bits, and the decrypted image PSNR is 29.5 dB. 100% restoration of the host image and 100% lossless secret information extraction can be achieved.
引用
收藏
页码:6403 / 6414
页数:12
相关论文
共 26 条
[1]  
[Anonymous], 2014, RES J INFORM TECHNOL
[2]   New product introductions for low-income consumers in emerging markets [J].
Arunachalam, S. ;
Bahadir, S. Cem ;
Bharadwaj, Sundar G. ;
Guesalaga, Rodrigo .
JOURNAL OF THE ACADEMY OF MARKETING SCIENCE, 2020, 48 (05) :914-940
[3]   Lossless Data Hiding Based on Histogram Modification for Image Authentication [J].
Chang, Chin-Chen ;
Tai, Wei-Liang ;
Chen, Kuo-Nan .
EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 1, MAIN CONFERENCE, 2008, :506-+
[4]   Chaos assisted variable bit steganography in transform domain [J].
Dhivya, R. ;
Padmapriya, V. ;
Sundararaman, R. ;
Rayappan, J. B. B. ;
Amirtharajan, R. .
ELECTRONICS LETTERS, 2018, 54 (23) :1332-1333
[5]   Invertible authentication [J].
Fridrich, J ;
Gojan, M ;
Du, R .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 :197-208
[6]  
Goljan M., 2001, 4th Information Hiding Workshop, LNCS, V2137, P27, DOI DOI 10.1007/3-540-45496-9
[7]   An Improved Reversible Data Hiding in Encrypted Images Using Side Match [J].
Hong, Wien ;
Chen, Tung-Shou ;
Wu, Han-Yan .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (04) :199-202
[8]  
Honsinger CW, 2001, United States patent US, Patent No. [6278791, 6,278,791]
[9]   Indicator-based lightweight steganography on 32-bit RISC architectures for IoT security [J].
Janakiraman, Siva ;
Thenmozhi, K. ;
Rayappan, John Bosco Balaguru ;
Amirtharajan, Rengarajan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (22) :31485-31513
[10]   A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S8 permutation [J].
Khan, Fadia Ali ;
Ahmed, Jameel ;
Khan, Jan Sher ;
Ahmad, Jawad ;
Khan, Muazzam A. .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2017, 33 (06) :3753-3765