Abstract

Encryption is a widely used solution to prevent privacy leakage and illegal spread when sensitive images are uploaded to cloud storage. Hiding technology also allows confidential data to be embedded into encrypted images for secret communication. As image accuracy without distortion is essential within certain fields (such as medicine and the military), sensitive images must be completely decrypted back into the original images. However, an encrypted image is a noise-like pattern that is meaningless to a user; thus, it is difficult for a user to find the accurate image they desire. Take keywords as search indexes and embed them in encrypted images for encrypted image retrieval as an example. This idea has been extended by Chen and Line’s scheme to achieve higher capacity with reversibility. The proposed scheme adjusts the coding results according to smooth and complex images to increase its hiding capacity. In addition, two thresholds are designed to adjust the predicted pixel value to be close to the original one. Experiments show that compared with the other schemes, the proposed method achieves superior results. In addition, a hidden encrypted image can be extracted from the cover image. Afterward, the hidden secrets can be completely extracted, and sensitive images can also be perfectly restored.

Highlights

  • Private web albums rely on a cloud service for owners to back up personal photos.This is a convenient but insecure platform that enables malicious users to illegally log in and obtain sensitive content for illegal dissemination

  • Image encryption offers a feasible solution to this potential security risk by allowing users to encrypt sensitive content into meaningless content before uploading it

  • An encrypted image exists in a kind of noise-like mode

Read more

Summary

Introduction

Private web albums rely on a cloud service for owners to back up personal photos. This is a convenient but insecure platform that enables malicious users to illegally log in and obtain sensitive content for illegal dissemination. Zhang’s scheme [25] encrypts the most significant five bits (MSB) in the original pixel through XOR operation with the random bit stream. Later, it compresses the least significant bit (LSB) of the encrypted image to create space for embedding the secret. Ma et al [14] proposed a reversible data embedding scheme utilizing histogram shifting technology in encrypted images. An image encrypted through MSB prediction is decoded through statistical analysis [34] To address this issue, a hiding and encryption method [35] integrated with Hamming coding is proposed in this paper. To improve the hiding capacity of the technique in [35], the Hamming code encoding is based on two different image types: smooth and complex images

Secret Embedding and Encryption Stage
Secret Extraction and Decryption Phases
Experimental Results
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call