Reversible Data Hiding in Encrypted Text Using Paillier Cryptosystem

被引:0
作者
Malik, Asad [1 ]
Ashraf, Aeyan [2 ]
Wu, Hanzhou [3 ]
Kuribayashi, Minoru [4 ]
机构
[1] Aligarh Muslim Univ, Dept Comp Sci, Aligarh 202002, Uttar Pradesh, India
[2] Aligarh Muslim Univ, Dept Comp Engn, Aligarh 202002, Uttar Pradesh, India
[3] Shanghai Univ, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
[4] Okayama Univ, Grad Sch Nat Sci & Technol, Okayama 7008530, Japan
来源
PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC) | 2022年
关键词
Reversible Data Hiding; Encrypted Domain; Homomorphic Cryptography; Cloud Computing; IMAGES;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Reversible Data Hiding in Encrypted Domain (RDHED) is an innovative method that can keep cover information secret and allows the data hider to insert additional information into it. This article presents a novel data hiding technique in an encrypted text called Reversible Data Hiding in Encrypted Text (RDHET). Initially, the original text is converted into their ASCII values. After that, the Paillier cryptosystem is adopted to encrypt all ASCII values of the original text and send it to the data hider for further processing. At the data hiding phase, the secret data are embedded into homomorphically encrypted text using a technique that does not lose any information, i.e., the homomorphic properties of the Paillier cryptosystem. Finally, the embedded secret data and the original text are recovered at the receiving end without any loss. Experimental results show that the proposed scheme is vital in the context of encrypted text processing at cloud-based services. Moreover, the scheme works well, especially for the embedding phase, text recovery, and performance on different security key sizes.
引用
收藏
页码:1495 / 1499
页数:5
相关论文
共 28 条
[1]   Encrypted signal-based reversible data hiding with public key cryptosystem [J].
Chen, Yu-Chi ;
Shiu, Chih-Wei ;
Horng, Gwoboa .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) :1164-1170
[2]   Practical steganalysis of digital images - State of the art [J].
Fridrich, J ;
Goljan, M .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 :1-13
[3]   An Improved Reversible Data Hiding in Encrypted Images Using Side Match [J].
Hong, Wien ;
Chen, Tung-Shou ;
Wu, Han-Yan .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (04) :199-202
[4]  
Khan AN, 2019, 2019 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMMUNICATION AND COMPUTATIONAL TECHNIQUES (ICCT), P224, DOI [10.1109/icct46177.2019.8969030, 10.1109/ICCT46177.2019.8969030]
[5]   An Efficient Separable Reversible Data Hiding Using Paillier Cryptosystem for Preserving Privacy in Cloud Domain [J].
Khan, Ahmad Neyaz ;
Fan, Ming Yu ;
Nazeer, Muhammad Irshad ;
Memon, Raheel Ahmed ;
Malik, Asad ;
Husain, Mohammed Aslam .
ELECTRONICS, 2019, 8 (06)
[6]   Reversible data hiding in encrypted images using cross division and additive homomorphism [J].
Li, Ming ;
Xiao, Di ;
Zhang, Yushu ;
Nan, Hai .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2015, 39 :234-248
[7]   A reversible and authenticable secret sharing scheme using dual images [J].
Lin, Jiang-Yi ;
Horng, Ji-Hwei ;
Chang, Chin-Chen .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (13) :17527-17545
[8]  
Malik Asad, 2020, Digital Forensics and Watermarking. 18th International Workshop, IWDW 2019. Revised Selected Papers. Lecture Notes in Computer Science (LNCS 12022), P213, DOI 10.1007/978-3-030-43575-2_18
[9]   High-Capacity Reversible Data Hiding in Encrypted Images Using Multi-Layer Embedding [J].
Malik, Asad ;
He, Peisong ;
Wang, Hongxia ;
Khan, Ahmad Neyaz ;
Pirasteh, Saied ;
Abdullahi, Sani M. .
IEEE ACCESS, 2020, 8 :148997-149010
[10]  
Malik A, 2020, MULTIMED TOOLS APPL, V79, P11591, DOI 10.1007/s11042-019-08460-w