Skip to main content
Log in

Uncover the cover to recover the hidden secret - A separable reversible data hiding framework

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The volatile development in the multimedia cognitive content is changing the global set-up towards a cloud-based architecture which is helped us with a massive amount of computer storage and the highest computational platform. Cost-saving and elasticity of services will be provided by progressive cloud computing technology for users. With the advancement in multimedia technology, the data owners outsource their private multimedia data on the hybrid cloud. Meantime the cloud servers also carry out some highly computationally expensive tasks. Nevertheless, there is an opportunity for security infracts possible in the public cloud environment. It makes an alarm for a cloud environment in security aspects. Before outsourcing multimedia data, an encryption technique is needed for safeguarding against several attacks. But performing the same is a significant challenge. A new research area was recently awakened on privacy-preserving Reversible Data Hiding (RDH) especially for multimedia data over the outsourced environment. A novel RDH for an encrypted image was proposed in this paper by using the (Most Significant Bit) MSB difference of the pixel value. By using this method, any third-party people can embed the ciphertext in the cipher image without the knowledge of the cover and secret. A person with decryption keys can get back the secret and the cover without any loss. The proposed work achieves the embedding capacity up to 1 bpp (bits per pixel) with the encryption quality of near-zero correlation and uniform histogram. The decrypted image is also retrieved with infinite Peak Signal to Noise Ratio (PSNR), unit Structural Similarity Index Metric (SSIM) and zero Bit Error Rate (BER).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Abd El-Latif AA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access 6:21075–21083

    Article  Google Scholar 

  2. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography, University of Buckingham

  3. Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition, in Mobile Multimedia/Image Processing, Security, and Applications 2014, vol. 9120, p. 912005

  4. Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping, in International Conference on Research in Security Standardisation, 151–166

  5. Agrawal S, Kumar M (2017) Mean value based reversible data hiding in encrypted images. Optik (Stuttg) 130:922–934

    Article  Google Scholar 

  6. Cao X, Du L, Wei X, Meng D, Guo X (2015) High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans Cybern 46(5):1132–1143

    Article  Google Scholar 

  7. Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253–266

    Article  Google Scholar 

  8. Chen Y-C, Shiu C-W, Horng G (2014) Encrypted signal-based reversible data hiding with public key cryptosystem. J Vis Commun Image Represent 25(5):1164–1170

    Article  Google Scholar 

  9. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan kaufmann

  10. da Miranda Neto A (2014) Pearson’s correlation coefficient: a more realistic threshold for applications on autonomous robotics, Comput. Technol. Appl., vol. 5, no. 2

  11. Fridrich J, Goljan M (2002) Practical steganalysis of digital images: state of the art, in Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 1–13

  12. Fridrich J, Goljan M, Du R (2002) Lossless data embedding new paradigm in digital watermarking. EURASIP J Adv Signal Process 2002(2):986842

    Article  Google Scholar 

  13. Goth G (2005) Steganalysis gets past the hype, IEEE Distrib. Syst. Online, vol. 6, no. 4, p. 2

  14. Jain AK, Uludag U (2003) Hiding biometric data. IEEE Trans Pattern Anal Mach Intell 25(11):1494–1498

    Article  Google Scholar 

  15. Kumar A (2019) Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int J Cloud Appl Comput 9(3):22–36

    Google Scholar 

  16. Kuribayashi M, Tanaka H (2005) Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans Image Process 14(12):2129–2139

    Article  Google Scholar 

  17. Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Inf Forensics Secur 8(7):1091–1100

    Article  Google Scholar 

  18. Li M, Xiao D, Zhang Y, Nan H (2015) Reversible data hiding in encrypted images using cross division and additive homomorphism. Signal Process Image Commun 39:234–248

    Article  Google Scholar 

  19. Liu W-L, Leng H-S, Huang C-K, Chen D-C (2017) A block-based division reversible data hiding method in encrypted images. Symmetry (Basel) 9(12):308

    Article  Google Scholar 

  20. Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. forensics Secur. 8(3):553–562

    Article  Google Scholar 

  21. Manikandan VM, Masilamani V (2018) Reversible data hiding scheme during encryption using machine learning. Procedia Comput Sci 133:348–356

    Article  Google Scholar 

  22. Puech W, Chaumont M, Strauss O (2008) A reversible data hiding method for encrypted images, in Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, p. 68191E

  23. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164

    Article  Google Scholar 

  24. Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7):989–999

    Article  Google Scholar 

  25. Shiu C-W, Chen Y-C, Hong W (2015) Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process Image Commun 39:226–233

    Article  Google Scholar 

  26. Tai W-L, Chang Y-F (2018) Separable reversible data hiding in encrypted signals with public key cryptography. Symmetry (Basel) 10(1):23

    Article  MathSciNet  Google Scholar 

  27. Tang Z, Xu S, Ye D, Wang J, Zhang X, Yu C (2019) Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image. J Real-Time Image Process 16(3):709–724

    Article  Google Scholar 

  28. Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730

    Article  MathSciNet  Google Scholar 

  29. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896

    Article  Google Scholar 

  30. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP, others (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  31. Wang B, Ding Q, Gu X (2019) A secure reversible chaining watermark scheme with hidden group delimiter for WSNs. Int J High Perform Comput Netw 14(3):265–273

    Article  Google Scholar 

  32. Watkins J (2001) Steganography-Messages Hidden in Bits, Multimed. Syst. Coursework, Dept Electron. CS, Univ. Southampton, SO17 1BJ, UK

  33. Wu H-T, Cheung Y, Huang J (2016) Reversible data hiding in Paillier cryptosystem. J Vis Commun Image Represent 40:765–771

    Article  Google Scholar 

  34. Yin Z, Luo B, Hong W (2014) Separable and error-free reversible data hiding in encrypted image with high payload, Sci. world J., vol. 2014

  35. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258

    Article  Google Scholar 

  36. Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf forensics Secur 7(2):826–832

    Article  Google Scholar 

  37. Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94:118–127

    Article  Google Scholar 

  38. Zhang X, Qian Z, Feng G, Ren Y (2014) Efficient reversible data hiding in encrypted images. J Vis Commun Image Represent 25(2):322–328

    Article  Google Scholar 

  39. Zhang X, Long J, Wang Z, Cheng H (2015) Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Trans. Circuits Syst. Video Technol. 26(9):1622–1631

    Article  Google Scholar 

  40. Zheng S, Li D, Hu D, Ye D, Wang L, Wang J (2016) Lossless data hiding algorithm for encrypted images with high capacity. Multimed Tools Appl 75(21):13765–13778

    Article  Google Scholar 

  41. Zhenxing Q, Xiyu H, Xinpeng Z (2013) Separable reversible data hiding in encrypted images by n-nary histogram modification, in 3rd international conference on multimedia technology (ICMT-13)

  42. Zou L, Sun J, Gao M, Wan W, Gupta BB (2019) A novel coverless information hiding method based on the average pixel value of the sub-images. Multimed Tools Appl 78(7):7965–7980

    Article  Google Scholar 

Download references

Acknowledgments

Authors thank Department of Science & Technology, New Delhi for the FIST funding (SR/FST/ET-II/2018/221). Also, Authors wish to thank the Intrusion Detection Lab at School of Electrical & Electronics Engineering, SASTRA Deemed University for providing infrastructural support to carry out this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rengarajan Amirtharajan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anushiadevi, R., Praveenkumar, P., Rayappan, J.B.B. et al. Uncover the cover to recover the hidden secret - A separable reversible data hiding framework. Multimed Tools Appl 80, 19695–19714 (2021). https://doi.org/10.1007/s11042-021-10729-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10729-y

Keywords

Navigation