Advertisement

An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment

  • T. SenthilnathanEmail author
  • P. Prabu
  • R. Sivakumar
  • S. Sakthivel
Article
  • 143 Downloads

Abstract

Nowadays there are numerous intruders trying to get the privacy information from cloud resources and consequently need a high security to secure our data. Moreover, research concerns have various security standards to secure the data using data hiding. In order to maintain the privacy and security in the cloud and big data processing, the recent crypto policy domain combines key policy encryption with reversible data hiding (RDH) techniques. However in this approach, the data is directly embedded resulting in errors during data extraction and image recovery due to reserve leakage of data. Hence, a novel shuffle block key encryption with RDH technique is proposed to hide the data competently. RDH is applied to encrypted images by which the data and the protection image can be appropriately recovered with histogram bit shifting algorithm. The hidden data can be embedded with shuffle key in the form of text with the image. The proposed method generates the room space to hide data with random shuffle after encrypting image using the definite encryption key. The data hider reversibly hides the data, whether text or image using data hiding key with histogram shifted values. If the requestor has both the embedding and encryption keys, can excerpt the secret data and effortlessly extract the original image using the spread source decoding. The proposed technique overcomes the data loss errors competently with two seed keys and also the projected shuffle state RDH procedure used in histogram shifting enhances security hidden policy. The results show that the proposed method outperforms the existing approaches by effectively recovering the hidden data and cover image without any errors, also scales well for large amount of data.

Keywords

Reversible hiding Cloud computing Crypto analysis Privacy preserving Data distribution 

References

  1. 1.
    Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Secur. 5(1), 187–193 (2010)CrossRefGoogle Scholar
  2. 2.
    Hong, W., Chen, T.-S., WuAn, H.-Y.: Improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)CrossRefGoogle Scholar
  3. 3.
    Zhang, X.: Separable encrypted image reversible data hiding. IEEE Trans. 7(2), 826–832 (2012)Google Scholar
  4. 4.
    Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255–258 (2011)CrossRefGoogle Scholar
  5. 5.
    Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)CrossRefGoogle Scholar
  6. 6.
    Chelliah, B.J., Jagadeesan, J., Nyapathy, N., Tiwari, N.: Reversible data hiding in encrypted images using AES data encryption technique. Int. J. Emerg. Res. Manag. Technol. 3(4), 28–35 (2014)Google Scholar
  7. 7.
    Wang, H., Zhang, W., Yu, N.: Protecting patient confidential information based on ECG reversible data hiding. Multimed. Tools Appl. 75(21), 13733–13747 (2015)CrossRefGoogle Scholar
  8. 8.
    Fu, Z., et al.: Achieving efficient cloud search services: multi keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2017)Google Scholar
  9. 9.
    Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE Internet Comput. 14(5), 14–22 (2010)CrossRefGoogle Scholar
  10. 10.
    Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7), 989–999 (2009)CrossRefGoogle Scholar
  11. 11.
    ou, B., Li, X., Zhao, Y., Ni, R.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010–5021 (2013)Google Scholar
  12. 12.
    Zhang, W., Hu, X., Li, X., Yu, N.: Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans. Image Process. 22(7), 2775–2785 (2013)CrossRefGoogle Scholar
  13. 13.
    Ni, Z., Shi, Y., Ansari, N., Wei, S.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)CrossRefGoogle Scholar
  14. 14.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)CrossRefGoogle Scholar
  15. 15.
    Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 14(2), 253–266 (2005)CrossRefGoogle Scholar
  16. 16.
    Hong, W., Chen, T.-S., Chang, Y.-P., Shiu, C.-W.: A high capacity reversible data hiding scheme using orthogonal projection and prediction errormodification. Signal Process. 90, 2911–2922 (2010)CrossRefzbMATHGoogle Scholar
  17. 17.
    Chang, C.-C., Lin, C.-C., Chen, Y.-H.: Reversible data-embedding scheme using differences between original and predicted pixel values. Inf. Secur. 2(2), 35–46 (2008)CrossRefGoogle Scholar
  18. 18.
    Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007)CrossRefGoogle Scholar
  19. 19.
    Hu, X., Zhang, W., Li, X., Yu, N.: Minimum rate prediction and optimized histograms modification for reversible data hiding. IEEE Trans. Inf. Forensics Secur. 10(3), 653–664 (2015)CrossRefGoogle Scholar
  20. 20.
    Ma, K., Zhang, W., Zhao, X.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)CrossRefGoogle Scholar
  21. 21.
    Hong, W., Chen, T., Wu, H.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)CrossRefGoogle Scholar
  22. 22.
    Ruj, S., Stojmenovic, M., Nayak, A.: Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans. Parallel Distrib. Syst. 25(2), 384–394 (2014)CrossRefGoogle Scholar
  23. 23.
    Devaki, P., Rao, Raghavendra, G.: A novel algorithm to protect the secret image through image fusion and verifying the dealer and the secret image. In: Proceedings of the 2014 Fifth International Conference on Signal and Image Processing (ICSIP). IEEE , pp. 77–80 (2014)Google Scholar
  24. 24.
    Sharma, S., Mittal, U.: Comparative analysis of various authentication techniques in cloud computing. Int. J. Innov. Res. Sci. Eng. Technol. 2(4), 994–998 (2016)Google Scholar
  25. 25.
    Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)CrossRefGoogle Scholar
  26. 26.
    Ye, J., Xu, Z., Ding, Y.: Secure outsourcing of modular exponentiations in cloud and cluster computing. Clust. Comput. 19(2), 811–820 (2016)CrossRefGoogle Scholar
  27. 27.
    Pawar, A., Dani, A.: Review of security and privacy techniques in cloud computing environment. Springer Cloud Computing 1(2), 543–551 (2016)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • T. Senthilnathan
    • 1
    Email author
  • P. Prabu
    • 1
  • R. Sivakumar
    • 1
  • S. Sakthivel
    • 2
  1. 1.Department of Computer ScienceChrist UniversityBengaluruIndia
  2. 2.Department of Computer Science and EngineeringSona College of TechnologySalemIndia

Personalised recommendations