Distributed Encrypted Image-Based Reversible Data Hiding

被引:3
作者
Chen, Yu-Chi [1 ]
Shiu, Chih-Wei [2 ]
机构
[1] Yuan Ze Univ, Dept Comp Sci & Engn, Taoyuan, Taiwan
[2] Natl Taitung Univ, Dept Educ Ind & Digital Media, Taitung, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2021年 / 22卷 / 01期
关键词
Data hiding; Reversible data hiding; Encrypted image; Secret sharing; Cloud-edge model;
D O I
10.3966/160792642021012201010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sensor cameras over wireless sensor networks are common devices to realize surveillance or data gathering. In general, the sensed images will be routed from sensors to gateways which can deliver the collection of images to the server. For routing, the nodes which are located between the source and terminate need to add some information (e.g., tags) into the images. Assuming that the communications among sensors and gateways are via insecure channels, encryption is a simple way to keeping confidentiality. However, except for using homomorphic encryption, it is not achieved to perform computation over ciphertext, so nodes cannot easily add message into the encrypted images. In this paper, we focus on a cloud-edge model, and propose a new distributed encrypted image-based reversible data hiding scheme, where given an image the edge produces encrypted ones and distributes them to intermediate nodes which then generate the message-embedded encrypted image, and finally the cloud can recover the original image and extract the message. Our techniques mainly utilize exclusive-OR secret sharing as encryption, and apply difference expansion and simple preprocessing for the embedding strategy. The experimental results are provided to show the efficiency and effectiveness of this scheme.
引用
收藏
页码:101 / 107
页数:7
相关论文
共 17 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
[Anonymous], USC SIPI IMAGE DATAB
[3]   A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms [J].
Chen, Yu-Chi ;
Hung, Tsung-Hsuan ;
Hsieh, Sung-Hsien ;
Shiu, Chih-Wei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (12) :3332-3343
[4]   Matrix embedding for large payloads [J].
Fridrich, Jessica ;
Soukal, David .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (03) :390-395
[5]   An Improved Reversible Data Hiding in Encrypted Images Using Side Match [J].
Hong, Wien ;
Chen, Tung-Shou ;
Wu, Han-Yan .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (04) :199-202
[6]   Universal data embedding in encrypted domain [J].
Karim, Mustafa S. Abdul ;
Wong, KokSheik .
SIGNAL PROCESSING, 2014, 94 :174-182
[7]   LSB matching revisited [J].
Mielikainen, J .
IEEE SIGNAL PROCESSING LETTERS, 2006, 13 (05) :285-287
[8]   Steganography and error-correcting codes [J].
Munuera, C. .
SIGNAL PROCESSING, 2007, 87 (06) :1528-1533
[9]   Reversible data hiding [J].
Ni, ZC ;
Shi, YQ ;
Ansari, N ;
Su, W .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2006, 16 (03) :354-362
[10]  
Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223