Abstract
With the increasing emphasis on information security, reversible data hiding technology in encrypted images (RDH-EI) has been widely applied in cloud storage privacy protection in recent years. However, once the data hider is leaked or compromised, the current algorithm of RDH-EI will encounter the challenge of effectiveness and security. In order to tackle this issue, this paper proposes an RDH-EI scheme based on secret sharing and hierarchical embedding. First, an image secret sharing based on (4, 6)-threshold algorithm is proposed. This algorithm aims to combine image encryption and sharing processes to generate six different encrypted images with vertical correlation. Sending them in encrypted form to cloud storage is beneficial for protecting the semantics of cover image. Then, the hierarchical embedding method is suggested to attain a high embedding payload. In this approach, by analyzing the vertical correlation of adjacent pixels, we have designed three mapping rules based on multi-MSB prediction. Among them, case 1 reserves the highest embedding capacity, case 2 follows, and case 3 has no embedding space. Based on this, the paper can adaptively embed secret data. Finally, fully authorized users can extract secret data and restore the original image by decrypting four or more marked encrypted images. Experimental results indicate that our approach surpass some existing RDH-EI approaches in payload, which average payloads in the best case on the BOSSbase and BOWS-2 datasets reach 4.466 bpp and 4.152 bpp, respectively. Additionally, the proposed RDH-EI method transfers and stores image data in a distributed manner, which helps prevent excessive concentration of power by data hiders and misuse of data. Compared to traditional end-to-end RDH-EI schemes, the proposed approach offers higher security.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.