On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing

被引:38
作者
Xiong, Lizhi [1 ]
Shi, Yunqing [2 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, 219 Ningliu Rd, Nanjing 210044, Jiangsu, Peoples R China
[2] Univ Hts Newark, New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2018年 / 55卷 / 03期
基金
中国国家自然科学基金;
关键词
Cloud data security; re-encryption; reversible data hiding; cloud computing; privacy-preserving;
D O I
10.3970/cmc.2018.01791
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced cloud computing technology provides cost saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner(,)s private information because the data owners lose the control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. In this paper, two reversible data hiding schemes are proposed for encrypted image data in cloud computing: reversible data hiding by homomorphic encryption and reversible data hiding in encrypted domain. The former is that additional bits are extracted after decryption and the latter is that extracted before decryption. Meanwhile, a combined scheme is also designed. This paper proposes the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing, which not only ensures multimedia data security without relying on the trustworthiness of cloud servers, but also guarantees that reversible data hiding can be operated over encrypted images at the different stages. Theoretical analysis confirms the correctness of the proposed encryption model and justifies the security of the proposed scheme. The computation cost of the proposed scheme is acceptable and adjusts to different security levels.
引用
收藏
页码:523 / 539
页数:17
相关论文
共 22 条
[1]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[2]   High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation [J].
Cao, Xiaochun ;
Du, Ling ;
Wei, Xingxing ;
Meng, Dan ;
Guo, Xiaojie .
IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (05) :1132-1143
[3]  
di Vimercati S.D. C., 2007, P 33 INT C VERY LARG, P123
[4]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[5]   An Improved Reversible Data Hiding in Encrypted Images Using Side Match [J].
Hong, Wien ;
Chen, Tung-Shou ;
Wu, Han-Yan .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (04) :199-202
[6]   On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain [J].
Khelifi, Fouad .
SIGNAL PROCESSING, 2018, 143 :336-345
[7]   Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection [J].
Li, Xiaolong ;
Yang, Bin ;
Zeng, Tieyong .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2011, 20 (12) :3524-3533
[8]   An integer wavelet transform based scheme for reversible data hiding in encrypted images [J].
Xiong, Lizhi ;
Xu, Zhengquan ;
Shi, Yun-Qing .
MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2018, 29 (03) :1191-1202
[9]   Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption [J].
Ma, Kede ;
Zhang, Weiming ;
Zhao, Xianfeng ;
Yu, Nenghai ;
Li, Fenghua .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (03) :553-562
[10]   Reversible data hiding [J].
Ni, ZC ;
Shi, YQ ;
Ansari, N ;
Su, W .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2006, 16 (03) :354-362