Reversible data hiding based on Shamir's secret sharing for color images over cloud

被引:38
作者
Singh, Priyanka [1 ]
Raman, Balasubramanian [2 ]
机构
[1] SUNY Albany, Dept Comp Sci, Albany, NY 12222 USA
[2] Indian Inst Technol, Dept Comp Sci & Engn, Roorkee, Uttarakhand, India
关键词
Shamir's secret sharing; Encrypted domain; Rightful ownership; WATERMARKING SCHEME; STEGANOGRAPHY; ENCRYPTION; SYSTEM;
D O I
10.1016/j.ins.2017.08.077
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To reduce the vulnerability of the multimedia content against the wide attacking surface of the cloud-based paradigm, obscuring the information before dissemination becomes a necessary step. In this paper, a reversible data hiding scheme based on Shamir's secret sharing for rightful ownership verification in encrypted domain has been proposed. It obscures the cover information via distributing it into multiple random looking shares and embeds a secret information specific to the owner into some of these encrypted shares based on a secret key prior to outsourcing the media information to cloud servers. The shares reveal no information at the cloud servers and even if they get attacked at these cloud servers, the owner information can be extracted to provide the rightful ownership of the media. The scheme facilitates extraction of secret information either directly from the cloud servers or after recovery of the original media at the authentic entity end possessing the secret keys. The robustness of the scheme has been validated by considering different attack scenarios in the encrypted domain itself. The visual quality of the recovered media and the extracted secret information evaluated via peak signal to noise ratio (PSNR), normalized cross correlation metric (NCC) and structural similarity index (SSIM) prove the efficacy of the proposed scheme. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:77 / 97
页数:21
相关论文
共 31 条
[1]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[2]  
[Anonymous], MULTIMEDIA TOOLS APP
[3]  
BENALOH JC, 1987, LECT NOTES COMPUT SC, V263, P251
[4]   A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images [J].
Bouslimi, Dalel ;
Coatrieux, Gouenou ;
Cozic, Michel ;
Roux, Christian .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2012, 16 (05) :891-899
[5]   A commutative digital image watermarking and encryption method in the tree structured Haar transform domain [J].
Cancellaro, M. ;
Battisti, F. ;
Carli, M. ;
Boato, G. ;
De Natale, F. G. B. ;
Neri, A. .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2011, 26 (01) :1-12
[6]  
Casas I., 2016, J COMPUT SCI, DOI [10.1016/jjocs.2016.08.007, DOI 10.1016/JJOCS.2016.08.007]
[7]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[8]   Reversible data hiding with contrast enhancement and tamper localization for medical images [J].
Gao, Guangyong ;
Wan, Xiangdong ;
Yao, Shimao ;
Cui, Zongmin ;
Zhou, Caixue ;
Sung, Xingming .
INFORMATION SCIENCES, 2017, 385 :250-265
[9]   Secure watermarking scheme against watermark attacks in the encrypted domain [J].
Guo, Jianting ;
Zheng, Peijia ;
Huang, Jiwu .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2015, 30 :125-135
[10]   An Improved Reversible Data Hiding in Encrypted Images Using Side Match [J].
Hong, Wien ;
Chen, Tung-Shou ;
Wu, Han-Yan .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (04) :199-202