Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing

被引:2
作者
Wu, Hao-Tian [1 ]
Cheung, Yiu-ming [2 ]
Zhuang, Zhenwei [1 ]
Tang, Shaohua [1 ,3 ]
机构
[1] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Guangdong, Peoples R China
[2] Hong Kong Baptist Univ, Dept Comp Sci, Kowloon Tong, Hong Kong, Peoples R China
[3] Peng Cheng Lab, Shenzhen 518055, Guangdong, Peoples R China
来源
INFORMATION SECURITY APPLICATIONS, WISA 2019 | 2020年 / 11897卷
关键词
Homomorphic encryption; Privacy protection; Reversible data hiding; Paillier cryptosystem; WATERMARKING;
D O I
10.1007/978-3-030-39303-8_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, reversible data hiding in encrypted images (RDHEI) has been developed to transmit additional data. Besides extracting the hidden data, the original or processed image should be obtained when needed. In this paper, a new RDH-EI method for homomorphic encrypted images is proposed by utilizing the additive homomorphism and self-blinding property in Paillier cryptosystem. Specifically, part of the hidden data may be extracted before image decryption while the rest can be extracted after image decryption. In addition, no preprocessing is required so that homomorphic processing can be performed before data embedding. The experimental results on test images validate that the proposed method is compatible with homomorphic image processing before data embedding. Compared with the state-of-the-art methods, higher embedding capacity can be obtained with the proposed method while the original or processed image can be correctly generated.
引用
收藏
页码:141 / 154
页数:14
相关论文
共 34 条
  • [1] Inspiring New Research in the Field of Signal Processing in the Encrypted Domain
    Barni, Mauro
    Kalker, Ton
    Katzenbeisser, Stefan
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 16 - 16
  • [2] EFFICIENT FULLY HOMOMORPHIC ENCRYPTION FROM (STANDARD) LWE
    Brakerski, Zvika
    Vaikuntanathan, Vinod
    [J]. SIAM JOURNAL ON COMPUTING, 2014, 43 (02) : 831 - 871
  • [3] High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation
    Cao, Xiaochun
    Du, Ling
    Wei, Xingxing
    Meng, Dan
    Guo, Xiaojie
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (05) : 1132 - 1143
  • [4] Sequential quantization strategy for data embedding and integrity verification
    Cheung, Yiu-ming
    Wu, Hao-tian
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2007, 17 (08) : 1007 - 1016
  • [5] Adaptive Pairing Reversible Watermarking
    Dragoi, Ioan-Catalin
    Coltuc, Dinu
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2016, 25 (05) : 2420 - 2422
  • [6] Fully Homomorphic Encryption Using Ideal Lattices
    Gentry, Craig
    [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
  • [7] Efficient Reversible Data Hiding Based on Multiple Histograms Modification
    Li, Xiaolong
    Zhang, Weiming
    Gui, Xinlu
    Yang, Bin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) : 2016 - 2027
  • [8] Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
    Ma, Kede
    Zhang, Weiming
    Zhao, Xianfeng
    Yu, Nenghai
    Li, Fenghua
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (03) : 553 - 562
  • [9] Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding
    Ou, Bo
    Li, Xiaolong
    Zhao, Yao
    Ni, Rongrong
    Shi, Yun-Qing
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2013, 22 (12) : 5010 - 5021
  • [10] Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223