Skip to main content
Log in

Error-free and mean value based reversible data hiding using gravitational search algorithm in encrypted images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years the data hiding on encrypted image is significant topic for data security. Due to its capability for preserving confidentiality, Reversible Data Hiding (RDH) on encrypted domain will helpful on cloud computing as an emerging technology. In this paper, an error free and mean value based RDH process with high capacity on encrypted images is proposed. Here, the image provider (content owner), data hider and data receiver are three parties. Initially, the image provider keeps the averages to obtain the modified image. Encrypt the modified image further through the aid of the encryption key and pass it to data hider. In data hider, Gravitational Search Algorithm (GSA) is utilized to find the best pixel locations in encrypted image for information hiding. Moreover, the similar encrypted image size, an alpha channel is created and then combines the encrypted image and the alpha channel for embedding secret data to make an encrypted image with embedded data. On receiver side, through the aid of encryption key, the receiver recovers the image by decrypting the encrypted image and also the secret bits are removed through the aid of data hiding keys by data extraction. The experimental result demonstrates that proposed system has better performance compared to other state-of- art strategies. The peak signal-to-noise ratio (PSNR) achieved by the proposed system is better than 8.36% and 18.3% compared to other existing works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Akbarzadeh O, Khosravi MR, Khosravi B, Halvaee P (2020) Medical image magnification based on original and estimated pixel selection models. J Biomed Phys Eng 10(3):357

    Google Scholar 

  2. Anajemba JH, Iwendi C, Mittal M, Yue T (2020) Improved advance encryption standard with a privacy database structure for IoT nodes. In 2020 IEEE 9th international conference on communication systems and network technologies (CSNT). 201-206. IEEE.

  3. Aryal A, Imaizumi S, Horiuchi T, Kiya H (2017) Integrated algorithm for block-permutation-based encryption with reversible data hiding. In 2017 Asia-Pacific signal and information processing association annual summit and conference (APSIPA ASC). 203-208. IEEE

  4. Bhardwaj R, Aggarwal A (2018) An improved block based joint reversible data hiding in encrypted images by symmetric cryptosystem. Pattern Recogn Lett. 139:60–68

  5. Chowdhary CL, Patel PV, Kathrotia KJ, Attique M, Perumal K, Ijaz MF (2020) Analytical study of hybrid techniques for image encryption and decryption. Sensors. 20(18):5162

    Article  Google Scholar 

  6. Iwendi C, Zhang Z, Du X (2018) ACO based key management routing mechanism for WSN security and data collection. In 2018 IEEE international conference on industrial technology (ICIT). 1935-1939.IEEE.

  7. Jana B (2016) High payload reversible data hiding scheme using weighted matrix. Optik. 127(6):3347–3358

    Article  Google Scholar 

  8. Khosravi MR, Bahri-Aliabadi B, Salari SR, Samadi S, Rostami H, Karimi V (2020) A tutorial and performance analysis on ENVI tools for SAR image despeckling. Current Signal Transduction Therapy 15(2):215–222

    Article  Google Scholar 

  9. Li Q, Yan B, Li H, Chen N (2018) Separable reversible data hiding in encrypted images with improved security and capacity. Multimed Tools Appl 77(23):30749–30768

    Article  Google Scholar 

  10. Mehmood Y, Ahmad F, Yaqoob I, Adnane A, Imran M, Guizani S (2017) Internet-of-things-based smart cities: recent advances and challenges. IEEE Commun Mag 55(9):16–24

    Article  Google Scholar 

  11. Mythili S, Thiyagarajah K, Rajesh P, Shajin FH (2020) Ideal position and size selection of unified power flow controllers (UPFCs) to upgrade the dynamic stability of systems: an antlion optimiser and invasive weed optimisation algorithm. HKIE Trans 27(1):25–37

    Article  Google Scholar 

  12. Prakash G, Kannan M (2013) Enhancing security in cryptographic smart cards through elliptic curve cryptography and optimized modified matrix encoding algorithms. J Theor Appl Inf Technol 58(3)

  13. Prakash G, Sakthivel S (2014) Improving the security of smart cards through multi-curve ECC. Int J Appl Eng Res 9(22):17601–17611

    Google Scholar 

  14. PRISM (surveillance program). Available: http://en.wikipedia.org/wiki/PRISM (surveillance program).

  15. Puteaux P, Puech W (2018) An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans Inf Forensics Secur 13(7):1670–1681

    Article  Google Scholar 

  16. Qian Z, Xu H, Luo X, Zhang X (2018) New framework of reversible data hiding in encrypted JPEG bit streams. IEEE Trans Circuits Syst Video Technol 29(2):351–362

    Article  Google Scholar 

  17. Rajesh P, Shajin F (2020) A multi-objective hybrid algorithm for planning electrical distribution system. Eur J Electr Eng 22(4–5):224–509

    Article  Google Scholar 

  18. Raju KU, Prabha NA (2018) A review of reversible data hiding technique based on steganography. Proc ARPN J Eng Appl Sci 13(3):1105–1114

    Google Scholar 

  19. Rashedi E, Nezamabadi-Pour H, Saryazdi S (2009) GSA: a gravitational search algorithm. Inf Sci 179(13):2232–2248

    Article  Google Scholar 

  20. Shajin F, Rajesh P (2020) Trusted secure geographic routing protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol. Int J Pervasive Comput Commun

  21. Shen W, Qin J, Yu J, Hao R, Hu J (2018) Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf Forensics Secur 14(2):331–346

    Article  Google Scholar 

  22. Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circuits Syst Video Technol 19(6):906–910

    Article  Google Scholar 

  23. Tang Z, Zhang X (2011) Secure image encryption without size limitation using Arnold transform and random strategies. J Multimed 6(2):202

    Article  Google Scholar 

  24. Tang Z, Lu Q, Lao H, Yu C, Zhang X (2018) Error-free reversible data hiding with high capacity in encrypted image. Optik. 157:750–760

    Article  Google Scholar 

  25. Tavallali P, Yazdi M, Khosravi MR (2019) Robust cascaded skin detector based on AdaBoost. Multimed Tools Appl 78(2):2599–2620

    Article  Google Scholar 

  26. Thota MK, Shajin FH, Rajesh P (2020) Survey on software defect prediction techniques. Int J Appl Sci Eng 17:331–344

    Google Scholar 

  27. Upendra Raju K, Amutha Prabha N (2019) Improved Data Security using Lossless and Reversible Data Hiding Technique in Encrypted Images with Hybrid Firefly Algorithm. J Adv Res Dyn Control Syst 11(8):163–171

    Google Scholar 

  28. Vaferi E, Sabbaghi-Nadooshan R (2015) A new encryption algorithm for color images based on total chaotic shuffling scheme. Optik. 126(20):2474–2480

    Article  Google Scholar 

  29. Wang J, Ni J, Zhang X, Shi YQ (2016) Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans Cybern 47(2):315–326

    Google Scholar 

  30. Wu HZ, Shi YQ, Wang HX, Zhou LN (2016) Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification. IEEE Trans Circuits Syst Video Technol 27(8):1620–1631

    Article  Google Scholar 

  31. Xiao D, Xiang Y, Zheng H, Wang Y (2017) Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism. J Vis Commun Image Represent 45:1–10

    Article  Google Scholar 

  32. Xiong L, Xu Z, Shi YQ (2018) An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidim Syst Sign Process 29(3):1191–1202

    Article  MathSciNet  Google Scholar 

  33. Xkeyscore. Available: http://en.wikipedia.org/wiki/XKeyscore.

  34. Xu D, Wang R (2016) Separable and error-free reversible data hiding in encrypted images. Signal Process 123:9–21

    Article  Google Scholar 

  35. Yi S, Zhou Y (2018) Parametric reversible data hiding in encrypted images using adaptive bit-level data embedding and checkerboard based prediction. Signal Process 150:171–182

    Article  Google Scholar 

  36. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258

    Article  Google Scholar 

  37. Zhang X, Sun Z, Tang Z, Yu C, Wang X (2017) High capacity data hiding based on interpolated image. Multimed Tools Appl 76(7):9195–9218

    Article  Google Scholar 

Download references

Data availability statement

Data sharing does not relate to this article as no novel data was generated or evaluated on this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Amutha Prabha.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Raju, K.U., Prabha, N.A. Error-free and mean value based reversible data hiding using gravitational search algorithm in encrypted images. Multimed Tools Appl 81, 30749–30768 (2022). https://doi.org/10.1007/s11042-022-12419-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12419-9

Keywords

Navigation