Abstract

An efficient method of completely separable reversible data hiding in encrypted images is proposed. The cover image is first partitioned into nonoverlapping blocks and specific encryption is applied to obtain the encrypted image. Then, image difference in the encrypted domain can be calculated based on the homomorphic property of the cryptosystem. The data hider, who does not know the original image content, may reversibly embed secret data into image difference based on two-dimensional difference histogram modification. Data extraction is completely separable from image decryption; that is, data extraction can be done either in the encrypted domain or in the decrypted domain, so that it can be applied to different application scenarios. In addition, data extraction and image recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.

Highlights

  • With the rapid developments occurring in mobile internet and cloud storage, privacy and security of personal data have gained significant attention nowadays

  • We develop an effective and reliable framework for reversible data hiding (RDH) in the encrypted domain

  • (a) Aerial (b) Barbara (c) Lena (d) Lighthouse (e) Tank (f) Truck (g) Zelda (h) Boats that the modified distribution appears to be uniform, which suggests that a statistical analysis would not be effective for evaluating the original content

Read more

Summary

Introduction

With the rapid developments occurring in mobile internet and cloud storage, privacy and security of personal data have gained significant attention nowadays. There are no guarantees that stored data will not be accessed by unauthorized entities, such as the cloud provider itself or malicious attackers. Under these specific circumstances, sensitive images, such as medical and personal images, need to be encrypted before outsourcing for privacy-preserving purposes [1, 2]. The consumers would like to give the untrusted cloud server only an encrypted version of the data instead of the original content. The cloud service provider (who stores the data) is not authorized to access the original content (i.e., plaintext). Patient’s information can be embedded into his/her encrypted medical image to avoid unwanted exposure of confidential information

Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.