Abstract
Recently, reversible data hiding in encrypted images (RDH-EI) has been developed to transmit additional data. Besides extracting the hidden data, the original or processed image should be obtained when needed. In this paper, a new RDH-EI method for homomorphic encrypted images is proposed by utilizing the additive homomorphism and self-blinding property in Paillier cryptosystem. Specifically, part of the hidden data may be extracted before image decryption while the rest can be extracted after image decryption. In addition, no preprocessing is required so that homomorphic processing can be performed before data embedding. The experimental results on test images validate that the proposed method is compatible with homomorphic image processing before data embedding. Compared with the state-of-the-art methods, higher embedding capacity can be obtained with the proposed method while the original or processed image can be correctly generated.
The work was partially supported by Natural Science Foundation of China under Grants 61772208, 61672444 and 61632013, and the Fundamental Research Funds for the Central Universities of China, and the Initiation Grant for Faculty Niche Research Areas (IG-FNRA) of HKBU with Grant: RC-FNRA-IG/18-19/SCI/03.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Shi, Y.Q., Li, X., Zhang, X., Wu, H.T., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210–3237 (2016)
Cheung, Y.M., Wu, H.T.: A sequential quantization strategy for data embedding and integrity verification. IEEE Trans. Circuits Syst. Video Technol. 17(8), 1007–1016 (2007)
Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7), 989–999 (2009)
Wu, H.T., Cheung, Y.M.: Public authentication of 3d mesh models. In: Proceedings of 2006 IEEE/WIC/ACM International Conference on Web Intelligence, Hong Kong, pp. 940–948 (2016)
Wu, H., Cheung, Y.: A high-capacity data hiding method for polygonal meshes. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 188–200. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74124-4_13
Wu, H.T., Huang, J.: Reversible image watermarking on prediction error by efficient histogram modification. Sig. Process. 92(12), 3000–3009 (2012)
Ou, B., Li, X., Zhao, Y., Ni, R., Shi, Y.Q.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010–5021 (2013)
Wu, H.T., Dugelay, J.L., Shi, Y.Q.: Reversible image data hiding with contrast enhancement. IEEE Signal Process. Lett. 22(1), 81–85 (2015)
Li, X., Zhang, W., Gui, X., Yang, B.: Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 10(9), 2016–2027 (2015)
Dragoi, I.C., Coltuc, D.: Adaptive pairing reversible watermarking. IEEE Trans. Image Process. 25(5), 2420–2422 (2016)
Wang, J., Chen, X., Ni, J., Mao, N., Shi, Y.Q.: Multiple histograms based reversible data hiding: framework and realization. IEEE Trans. Circuits Syst. Video Technol. https://doi.org/10.1109/TCSVT.2019.2915584
Wu, H.T., Huang, J., Shi, Y.Q.: A reversible data hiding method with contrast enhancement for medical images. J. Vis. Commun. Image Represent. 31, 146–153 (2015)
Zhang, X.: Reversible data hiding in encrypted images. IEEE Signal Process. Lett. 18(4), 255–258 (2011)
Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 16(5), 826–832 (2012)
Ma, K., Zhang, W., Sun, W.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)
Wu, X., Sun, W.: High-capacity reversible data hiding in encrypted images by prediction error. Sig. Process. 104, 387–400 (2014)
Shiu, C.-W., Chen, Y.-C., Hong, W.: Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Sig. Process. Image Commun. 39, 226–233 (2015)
Cao, X., Du, L., Wei, X., Meng, D.: High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern. 46(5), 1132–1143 (2016)
Qian, Z., Zhang, X.: Reversible data hiding in encrypted image with distributed source encoding. IEEE Trans. Circuits Syst. Video Technol. 26(4), 636–646 (2016)
Zhou, J., Sun, W., Dong, L., Liu, X., Au, O.C., Tang, Y.Y.: Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans. Circuits Syst. Video Technol. 26(3), 441–452 (2016)
Puteaux, P., Puech, W.: An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forensics Secur. 13(7), 1670–1681 (2018)
Zhang, X., Long, J., Wang, Z., Cheng, H.: Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Trans. Circuits Syst. Video Technol. 26(9), 1622–1631 (2016)
Xu, D., Wang, R.: Separable and error-free reversible data hiding in encrypted imagesn. Sig. Process. 123, 9–21 (2016)
Xiang, S., Luo, X.: Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group. IEEE Trans. Circuits Syst. Video Technol. 28(11), 3099–3110 (2018)
Wu, H.T., Cheung, Y.M., Huang, J.: Reversible data hiding in Paillier Cryptosystem. J. Vis. Commun. Image Represent. 40, 765–771 (2016)
Wu, X., Chen, B., Weng, J.: Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer. J. Vis. Commun. Image Represent. 41, 58–64 (2016)
Wu, H.T., Cheung, Y.M., Yang, Z., Tang, S.: A high-capacity reversible data hiding method for homomorphic encrypted images. J. Vis. Commun. Image Represent. 62, 87–96 (2019)
Wu, H.T., Yang, Z., Cheung, Y.M., Xu, L., Tang, S.: High-capacity reversible data hiding in encrypted images by bit plane partition and MSB prediction. IEEE Access 7, 62361–62371 (2019)
Barni, M., Kalker, T., Katzenbeisser, S.: Inspiring new research in the field of signal processing in the encrypted domain. IEEE Sig. Process. Mag. 30(2), 16–16 (2013)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-X_16
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st ACM Symposium on Theory of Computing, pp. 169–178 (2009)
Brakershi, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. SIAM J. Comput. 43(2), 831–871 (2014)
Haghighat, M., Zonouz, S., Abdel-Mottaleb, M.: Security and privacy in cloud computing: vision, trends, and challenges. IEEE Trans. Cloud Comput. 2(2), 30–38 (2015)
Zhang, X., Yang, Z., Liu, Y., Tang, S.: Reliable task assignment for spatial crowdsourcing. IEEE Trans. Emerg. Top. Comput. 7(1), 174–186 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Wu, HT., Cheung, Ym., Zhuang, Z., Tang, S. (2020). Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing. In: You, I. (eds) Information Security Applications. WISA 2019. Lecture Notes in Computer Science(), vol 11897. Springer, Cham. https://doi.org/10.1007/978-3-030-39303-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-39303-8_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-39302-1
Online ISBN: 978-3-030-39303-8
eBook Packages: Computer ScienceComputer Science (R0)