Abstract
The volatile development in the multimedia cognitive content is changing the global set-up towards a cloud-based architecture which is helped us with a massive amount of computer storage and the highest computational platform. Cost-saving and elasticity of services will be provided by progressive cloud computing technology for users. With the advancement in multimedia technology, the data owners outsource their private multimedia data on the hybrid cloud. Meantime the cloud servers also carry out some highly computationally expensive tasks. Nevertheless, there is an opportunity for security infracts possible in the public cloud environment. It makes an alarm for a cloud environment in security aspects. Before outsourcing multimedia data, an encryption technique is needed for safeguarding against several attacks. But performing the same is a significant challenge. A new research area was recently awakened on privacy-preserving Reversible Data Hiding (RDH) especially for multimedia data over the outsourced environment. A novel RDH for an encrypted image was proposed in this paper by using the (Most Significant Bit) MSB difference of the pixel value. By using this method, any third-party people can embed the ciphertext in the cipher image without the knowledge of the cover and secret. A person with decryption keys can get back the secret and the cover without any loss. The proposed work achieves the embedding capacity up to 1 bpp (bits per pixel) with the encryption quality of near-zero correlation and uniform histogram. The decrypted image is also retrieved with infinite Peak Signal to Noise Ratio (PSNR), unit Structural Similarity Index Metric (SSIM) and zero Bit Error Rate (BER).
Similar content being viewed by others
References
Abd El-Latif AA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access 6:21075–21083
Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography, University of Buckingham
Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition, in Mobile Multimedia/Image Processing, Security, and Applications 2014, vol. 9120, p. 912005
Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping, in International Conference on Research in Security Standardisation, 151–166
Agrawal S, Kumar M (2017) Mean value based reversible data hiding in encrypted images. Optik (Stuttg) 130:922–934
Cao X, Du L, Wei X, Meng D, Guo X (2015) High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans Cybern 46(5):1132–1143
Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253–266
Chen Y-C, Shiu C-W, Horng G (2014) Encrypted signal-based reversible data hiding with public key cryptosystem. J Vis Commun Image Represent 25(5):1164–1170
Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan kaufmann
da Miranda Neto A (2014) Pearson’s correlation coefficient: a more realistic threshold for applications on autonomous robotics, Comput. Technol. Appl., vol. 5, no. 2
Fridrich J, Goljan M (2002) Practical steganalysis of digital images: state of the art, in Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 1–13
Fridrich J, Goljan M, Du R (2002) Lossless data embedding new paradigm in digital watermarking. EURASIP J Adv Signal Process 2002(2):986842
Goth G (2005) Steganalysis gets past the hype, IEEE Distrib. Syst. Online, vol. 6, no. 4, p. 2
Jain AK, Uludag U (2003) Hiding biometric data. IEEE Trans Pattern Anal Mach Intell 25(11):1494–1498
Kumar A (2019) Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int J Cloud Appl Comput 9(3):22–36
Kuribayashi M, Tanaka H (2005) Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans Image Process 14(12):2129–2139
Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Inf Forensics Secur 8(7):1091–1100
Li M, Xiao D, Zhang Y, Nan H (2015) Reversible data hiding in encrypted images using cross division and additive homomorphism. Signal Process Image Commun 39:234–248
Liu W-L, Leng H-S, Huang C-K, Chen D-C (2017) A block-based division reversible data hiding method in encrypted images. Symmetry (Basel) 9(12):308
Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. forensics Secur. 8(3):553–562
Manikandan VM, Masilamani V (2018) Reversible data hiding scheme during encryption using machine learning. Procedia Comput Sci 133:348–356
Puech W, Chaumont M, Strauss O (2008) A reversible data hiding method for encrypted images, in Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, p. 68191E
Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164
Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7):989–999
Shiu C-W, Chen Y-C, Hong W (2015) Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process Image Commun 39:226–233
Tai W-L, Chang Y-F (2018) Separable reversible data hiding in encrypted signals with public key cryptography. Symmetry (Basel) 10(1):23
Tang Z, Xu S, Ye D, Wang J, Zhang X, Yu C (2019) Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image. J Real-Time Image Process 16(3):709–724
Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP, others (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Wang B, Ding Q, Gu X (2019) A secure reversible chaining watermark scheme with hidden group delimiter for WSNs. Int J High Perform Comput Netw 14(3):265–273
Watkins J (2001) Steganography-Messages Hidden in Bits, Multimed. Syst. Coursework, Dept Electron. CS, Univ. Southampton, SO17 1BJ, UK
Wu H-T, Cheung Y, Huang J (2016) Reversible data hiding in Paillier cryptosystem. J Vis Commun Image Represent 40:765–771
Yin Z, Luo B, Hong W (2014) Separable and error-free reversible data hiding in encrypted image with high payload, Sci. world J., vol. 2014
Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258
Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf forensics Secur 7(2):826–832
Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94:118–127
Zhang X, Qian Z, Feng G, Ren Y (2014) Efficient reversible data hiding in encrypted images. J Vis Commun Image Represent 25(2):322–328
Zhang X, Long J, Wang Z, Cheng H (2015) Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Trans. Circuits Syst. Video Technol. 26(9):1622–1631
Zheng S, Li D, Hu D, Ye D, Wang L, Wang J (2016) Lossless data hiding algorithm for encrypted images with high capacity. Multimed Tools Appl 75(21):13765–13778
Zhenxing Q, Xiyu H, Xinpeng Z (2013) Separable reversible data hiding in encrypted images by n-nary histogram modification, in 3rd international conference on multimedia technology (ICMT-13)
Zou L, Sun J, Gao M, Wan W, Gupta BB (2019) A novel coverless information hiding method based on the average pixel value of the sub-images. Multimed Tools Appl 78(7):7965–7980
Acknowledgments
Authors thank Department of Science & Technology, New Delhi for the FIST funding (SR/FST/ET-II/2018/221). Also, Authors wish to thank the Intrusion Detection Lab at School of Electrical & Electronics Engineering, SASTRA Deemed University for providing infrastructural support to carry out this research work.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Anushiadevi, R., Praveenkumar, P., Rayappan, J.B.B. et al. Uncover the cover to recover the hidden secret - A separable reversible data hiding framework. Multimed Tools Appl 80, 19695–19714 (2021). https://doi.org/10.1007/s11042-021-10729-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10729-y