Abstract
Prediction-error expansion (PEE) methods usually involve the shifting process between peak points and zero points in order to vacate room for embedding. This occurrence will inevitably impose a troublesome because overflow/underflow issue after data embedding may occur, in turn, it dramatically increases the amount of auxiliary information to be transmitted or map information to be embedded. Besides, PEE-based reversible data hiding in encrypted images (RDHEI) methods usually adopt a block-size encryption strategy, but the correlation reservation of intra-block for subsequently embedding may leave opportunities for potential attacks. To deal with these issues, we proposed a novel RDHEI method with the functionality of embedding synchronized with re-encryption, which is well carried out by a data hider using a permutation ordered binary (POB) number system. Unlike conventional PEE-based RDHEI techniques, this scheme takes advantage of two peak points for embedding, but thoroughly abandons the former idea of shifting process. Experimental results verify the superiority of the proposed method, which not only may extend the applications of PEE-based RDHEI schemes substantially, but also vastly extend POB number application scenarios in practice.
Highlights
Data hiding is a technique of embedding secret messages into given cover images by subtly modifying several selected pixels
In this paper, the properties of permutation ordered binary (POB) number system are adopted for reversible data hiding in encrypted images (RDHEI)
By using the POB number system, the security loopholes incurred by the preservation of intra-block correlations for data embedding can be resolved through the embedding synchronized with re-encryption to some degree
Summary
Data hiding is a technique of embedding secret messages into given cover images by subtly modifying several selected pixels. A data hider embedded secret messages into specific pixels under homomorphism encryption This method implements greater performance in terms of visual quality and embedding capacity, but the encryption security is unsatisfactory, since the local correlations in each encrypted block before data embedding must be reserved for vacating spare room. The functionality, compression synchronized with re-encryption, of POB number is leveraged to vacate redundancy room for data embedding This will assist the data hider to embed secret messages into differences ‘‘0’’ and ‘‘1’’ (two peak points) without any shifting process by using POB-based schemes; in other words, other differences (except ‘‘0’’ and ‘‘1’’) during the embedding phase remain the same. The detailed properties concerning a given POB number (POB value) to its POB value (POB number) will be discussed as follows
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.