Abstract
Separable Reversible Data Hiding in Encryption Image (RDH-EI) has become widely used in clinical and military applications, social cloud and security surveillance in recent years, contributing significantly to preserving the privacy of digital images. Aiming to address the shortcomings of recent works that directed to achieve high embedding rate by compensating image quality, security, reversible and separable properties, we propose a two-tuples coding method by considering the intrinsic adjacent pixels characteristics of the carrier image, which have a high redundancy between high-order bits. Subsequently, we construct RDH-EI scheme by using high-order bits compression, low-order bits combination, vacancy filling, data embedding and pixel diffusion. Unlike the conventional RDH-EI practices, which have suffered from the deterioration of the original image while embedding additional data, the content owner in our scheme generates the embeddable space in advance, thus lessening the risk of image destruction on the data hider side. The experimental results indicate the effectiveness of our scheme. A ratio of 28.91% effectively compressed the carrier images, and the embedding rate increased to 1.753 bpp with a higher image quality, measured in the PSNR of 45.76 dB.
Highlights
In recent years, the problem of information security has become increasingly prominent, and privacy has attracted much attention
This paper presents an Reversible Data Hiding in Encryption Image (RDH-EI) scheme with two-tuples coding that aimed to improve the low embedding rate and security level of recent Vacating Room by Encryption (VRBE)-based Reversible Data Hiding (RDH)-EI schemes
Our RDH-EI scheme consists of five processes: high-order bits compression with two-tuples coding method, low-order bits combination, vacancy filling, data embedding, and pixel diffusion
Summary
The problem of information security has become increasingly prominent, and privacy has attracted much attention. Unlike traditional RDH practices, the content owners of clinical, military, security, and social cloud services providers are urged to hide the sensitive details of original images, leading to the birth of Reversible Data Hiding in Encryption Image (RDH-EI) [9]. The rule of thumb is that the embedded sensitive data must not affect the process of accurately recovering encrypted medical images [5,10,11] Otherwise, it may cause misdiagnosis, ineffective treatment and resulting in unimaginable severe effects. The naïve approach passes the user’s data hiding key to the cloud service providers to decrypt the encrypted image It will incur the disclosure of user privacy.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.