Abstract

Nowadays, digital images are confronted with notable privacy and security issues, and many research works have been accomplished to countermeasure these risks. In this article, a novel scheme for data hiding in encrypted domain is proposed using fuzzy C-means clustering and compressive sensing technologies to protect privacy of the host image. The original image is preprocessed first to generate multiple highly correlated classes with fuzzy C-means clustering algorithm. Then, all classes are further divided into two parts according to proper threshold. One is encrypted by stream cipher, and the other is encrypted and compressed simultaneously with compressive sensing technology for easy data embedding by information hider. The receiver can extract additional data and recover the original image with data-hiding key and encryption key. Experiments and analysis demonstrate that the proposed scheme can achieve higher embedding rate about additional data and better visual quality of recovered image than other state-of-the-art schemes.

Highlights

  • With the continuous development of computer network technology, more and more data, especially the multimedia data captured by the sensors, are uploaded to cloud platforms by users to alleviate storing and computing burdens.[1]

  • We proposed a privacy-preserved datahiding scheme in encrypted domain by fuzzy C-means (FCM) clustering and compressive sensing (CS) technologies

  • 2.018 2.188 1.528 1.728 ø 1.815 ø 2.355 ø 2.177 ø 1.814 original image are encrypted by traditional stream cipher, and high-correlated classes are encrypted and compressed by CS

Read more

Summary

Introduction

With the continuous development of computer network technology, more and more data, especially the multimedia data (images, audios, and videos) captured by the sensors, are uploaded to cloud platforms by users to alleviate storing and computing burdens.[1]. The whole encrypted and compressed image generated will be transmitted to data hider to embed additional information with data-hiding key. After obtaining the marked, encrypted image, the receiver can extract additional information exactly and recover original image with satisfactory visual quality.

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call