Abstract
In recent years the data hiding on encrypted image is significant topic for data security. Due to its capability for preserving confidentiality, Reversible Data Hiding (RDH) on encrypted domain will helpful on cloud computing as an emerging technology. In this paper, an error free and mean value based RDH process with high capacity on encrypted images is proposed. Here, the image provider (content owner), data hider and data receiver are three parties. Initially, the image provider keeps the averages to obtain the modified image. Encrypt the modified image further through the aid of the encryption key and pass it to data hider. In data hider, Gravitational Search Algorithm (GSA) is utilized to find the best pixel locations in encrypted image for information hiding. Moreover, the similar encrypted image size, an alpha channel is created and then combines the encrypted image and the alpha channel for embedding secret data to make an encrypted image with embedded data. On receiver side, through the aid of encryption key, the receiver recovers the image by decrypting the encrypted image and also the secret bits are removed through the aid of data hiding keys by data extraction. The experimental result demonstrates that proposed system has better performance compared to other state-of- art strategies. The peak signal-to-noise ratio (PSNR) achieved by the proposed system is better than 8.36% and 18.3% compared to other existing works.
Similar content being viewed by others
References
Akbarzadeh O, Khosravi MR, Khosravi B, Halvaee P (2020) Medical image magnification based on original and estimated pixel selection models. J Biomed Phys Eng 10(3):357
Anajemba JH, Iwendi C, Mittal M, Yue T (2020) Improved advance encryption standard with a privacy database structure for IoT nodes. In 2020 IEEE 9th international conference on communication systems and network technologies (CSNT). 201-206. IEEE.
Aryal A, Imaizumi S, Horiuchi T, Kiya H (2017) Integrated algorithm for block-permutation-based encryption with reversible data hiding. In 2017 Asia-Pacific signal and information processing association annual summit and conference (APSIPA ASC). 203-208. IEEE
Bhardwaj R, Aggarwal A (2018) An improved block based joint reversible data hiding in encrypted images by symmetric cryptosystem. Pattern Recogn Lett. 139:60–68
Chowdhary CL, Patel PV, Kathrotia KJ, Attique M, Perumal K, Ijaz MF (2020) Analytical study of hybrid techniques for image encryption and decryption. Sensors. 20(18):5162
Iwendi C, Zhang Z, Du X (2018) ACO based key management routing mechanism for WSN security and data collection. In 2018 IEEE international conference on industrial technology (ICIT). 1935-1939.IEEE.
Jana B (2016) High payload reversible data hiding scheme using weighted matrix. Optik. 127(6):3347–3358
Khosravi MR, Bahri-Aliabadi B, Salari SR, Samadi S, Rostami H, Karimi V (2020) A tutorial and performance analysis on ENVI tools for SAR image despeckling. Current Signal Transduction Therapy 15(2):215–222
Li Q, Yan B, Li H, Chen N (2018) Separable reversible data hiding in encrypted images with improved security and capacity. Multimed Tools Appl 77(23):30749–30768
Mehmood Y, Ahmad F, Yaqoob I, Adnane A, Imran M, Guizani S (2017) Internet-of-things-based smart cities: recent advances and challenges. IEEE Commun Mag 55(9):16–24
Mythili S, Thiyagarajah K, Rajesh P, Shajin FH (2020) Ideal position and size selection of unified power flow controllers (UPFCs) to upgrade the dynamic stability of systems: an antlion optimiser and invasive weed optimisation algorithm. HKIE Trans 27(1):25–37
Prakash G, Kannan M (2013) Enhancing security in cryptographic smart cards through elliptic curve cryptography and optimized modified matrix encoding algorithms. J Theor Appl Inf Technol 58(3)
Prakash G, Sakthivel S (2014) Improving the security of smart cards through multi-curve ECC. Int J Appl Eng Res 9(22):17601–17611
PRISM (surveillance program). Available: http://en.wikipedia.org/wiki/PRISM (surveillance program).
Puteaux P, Puech W (2018) An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans Inf Forensics Secur 13(7):1670–1681
Qian Z, Xu H, Luo X, Zhang X (2018) New framework of reversible data hiding in encrypted JPEG bit streams. IEEE Trans Circuits Syst Video Technol 29(2):351–362
Rajesh P, Shajin F (2020) A multi-objective hybrid algorithm for planning electrical distribution system. Eur J Electr Eng 22(4–5):224–509
Raju KU, Prabha NA (2018) A review of reversible data hiding technique based on steganography. Proc ARPN J Eng Appl Sci 13(3):1105–1114
Rashedi E, Nezamabadi-Pour H, Saryazdi S (2009) GSA: a gravitational search algorithm. Inf Sci 179(13):2232–2248
Shajin F, Rajesh P (2020) Trusted secure geographic routing protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol. Int J Pervasive Comput Commun
Shen W, Qin J, Yu J, Hao R, Hu J (2018) Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf Forensics Secur 14(2):331–346
Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circuits Syst Video Technol 19(6):906–910
Tang Z, Zhang X (2011) Secure image encryption without size limitation using Arnold transform and random strategies. J Multimed 6(2):202
Tang Z, Lu Q, Lao H, Yu C, Zhang X (2018) Error-free reversible data hiding with high capacity in encrypted image. Optik. 157:750–760
Tavallali P, Yazdi M, Khosravi MR (2019) Robust cascaded skin detector based on AdaBoost. Multimed Tools Appl 78(2):2599–2620
Thota MK, Shajin FH, Rajesh P (2020) Survey on software defect prediction techniques. Int J Appl Sci Eng 17:331–344
Upendra Raju K, Amutha Prabha N (2019) Improved Data Security using Lossless and Reversible Data Hiding Technique in Encrypted Images with Hybrid Firefly Algorithm. J Adv Res Dyn Control Syst 11(8):163–171
Vaferi E, Sabbaghi-Nadooshan R (2015) A new encryption algorithm for color images based on total chaotic shuffling scheme. Optik. 126(20):2474–2480
Wang J, Ni J, Zhang X, Shi YQ (2016) Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans Cybern 47(2):315–326
Wu HZ, Shi YQ, Wang HX, Zhou LN (2016) Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification. IEEE Trans Circuits Syst Video Technol 27(8):1620–1631
Xiao D, Xiang Y, Zheng H, Wang Y (2017) Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism. J Vis Commun Image Represent 45:1–10
Xiong L, Xu Z, Shi YQ (2018) An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidim Syst Sign Process 29(3):1191–1202
Xkeyscore. Available: http://en.wikipedia.org/wiki/XKeyscore.
Xu D, Wang R (2016) Separable and error-free reversible data hiding in encrypted images. Signal Process 123:9–21
Yi S, Zhou Y (2018) Parametric reversible data hiding in encrypted images using adaptive bit-level data embedding and checkerboard based prediction. Signal Process 150:171–182
Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258
Zhang X, Sun Z, Tang Z, Yu C, Wang X (2017) High capacity data hiding based on interpolated image. Multimed Tools Appl 76(7):9195–9218
Data availability statement
Data sharing does not relate to this article as no novel data was generated or evaluated on this study.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Raju, K.U., Prabha, N.A. Error-free and mean value based reversible data hiding using gravitational search algorithm in encrypted images. Multimed Tools Appl 81, 30749–30768 (2022). https://doi.org/10.1007/s11042-022-12419-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-12419-9