Skip to main content
Log in

Design and development of reversible data hiding- homomorphic encryption & rhombus pattern prediction approach

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this modern era, a large amount of multimedia content plays an important role in various fields. For multimedia content, storage space and processing speed are more crucial. As a result, existing multimedia applications are moving to a cloud-based paradigm since it offers greater storage and faster processing capabilities. This ensures that more and more people choose to save and process their multimedia content on the cloud. However, this option might cause severe repercussions due to inadequate security. Homomorphic encryption is a type of encryption that enables users to do computations on encrypted data without having to decrypt it first. These resulting operations are then stored in an encrypted form, which when decrypted, produces the same outcomes as if the operations had been performed on the unencrypted data. This paper aims to present a promising solution to protect the data on the cloud through Reversible Data Hiding in an Encrypted Image (RDHEI), using homomorphic encryption and a rhombus pattern prediction scheme. Using this proposed method, any third party can perform data-hiding operations on an encrypted image without being aware of the original contents. Furthermore, this method has the advantage of protecting the image very securely. The entropy of the encrypted image is 7.999, deviations from ideality are 0.0245, diagonal correlation and vertical correlation are 0.0092 and − 0.0015, respectively, and embedding capacity is 0.498 bpp. Finally, flawless image recovery and covert extraction are possible.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data availability

The datasets generated during and/or analysed during the current study are available from the corresponding author upon reasonable request.

References

  1. Agrawal S, Kumar M (2017) Mean value based reversible data hiding in encrypted images. Optik (Stuttg) 130:922–934

    Article  Google Scholar 

  2. Amirtharajan R, Behera SK, Swarup MA et al (2010) Colour guided colour image steganography. arXiv Prepr arXiv10104007

  3. Anushiadevi R, Amirtharajan R (2021) Reversible data hiding in an encrypted image using the homomorphic property of elliptic curve cryptography. J Intell Fuzzy Syst 41:5583–5594

    Article  Google Scholar 

  4. Anushiadevi R, Pravinkumar P, Rayappan JBB, Amirtharajan R (2021) Uncover the cover to recover the hidden secret - A separable reversible data hiding framework. Multimed Tools Appl 80:19695–19714. https://doi.org/10.1007/s11042-021-10729-y

    Article  Google Scholar 

  5. Anushiadevi R, Pravinkumar P, Rayappan JBB, Amirtharajan R (2020) A high payload separable reversible data hiding in cipher image with good decipher image quality. J Intell Fuzzy Syst 38(5):6403–6414

    Article  Google Scholar 

  6. Anushiadevi R, Praveenkumar P, Rayappan JBB Amirtharajan R reversible data hiding method based on pixel expansion and homomorphic encryption. J Intell Fuzzy Syst 39(3):2977–2990

  7. Chang C-C, Tai W-L, Chen K-N (2008) Lossless data hiding based on histogram modification for image authentication. In: Embedded and Ubiquitous Computing, 2008. EUC’08. IEEE/IFIP International Conference on, pp 506–511

  8. Chaudhary P, Gupta BB, Singh AK (2022) XSS Armor: constructing XSS Defensive Framework for preserving Big Data privacy in internet-of-things (IoT) networks. J Circ Syst Comput 31(13):2250222. https://doi.org/10.1142/S021812662250222X

  9. Chen Y-C, Shiu C-W, Horng G (2014) Encrypted signal-based reversible data hiding with public key cryptosystem. J Vis Commun Image Represent 25:1164–1170

    Article  Google Scholar 

  10. Chen Y, Yin B, He H et al (2018) Reversible data hiding in classification-scrambling encrypted-image based on iterative recovery. Comput Mater Contin 56:299–312

    Google Scholar 

  11. Coatrieux G, Pan W, Cuppens-Boulahia N et al (2012) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inf Forensics Secur 8:111–120

    Article  Google Scholar 

  12. Cvejic N, Seppanen T (2002) Increasing the capacity of LSB-based audio steganography. In: 2002 IEEE Workshop on Multimedia Signal Processing, pp 336–338

  13. Dasgupta K, Mandal JK, Dutta P (2012) Hash based least significant bit technique for video steganography (HLSB). Int J Secur Priv Trust Manag 1:1–11

    Google Scholar 

  14. Fridrich J, Goljan M, Du R (2001) Invertible authentication. In: Security and Watermarking of Multimedia contents III, pp 197–209

  15. Goljan M, Fridrich JJ, Du R (2001) Distortion-free data embedding for images. In: International Workshop on Information Hiding, pp 27–41

  16. Hong W, Chen T-S, Wu H-Y (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19:199–202

    Article  Google Scholar 

  17. Honsinger CW, Jones PW, Rabbani M, Stoffel JC (2001) Lossless recovery of an original image containing embedded data. Google Patents

  18. Li X, Li J, Li B, Yang B (2013) High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Sig Process 93:198–205. https://doi.org/10.1016/j.sigpro.2012.07.025

    Article  Google Scholar 

  19. Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Inf Forensics Secur 8:1091–1100. https://doi.org/10.1109/TIFS.2013.2261062

    Article  Google Scholar 

  20. Li M, Xiao D, Zhang Y, Nan H (2015) Reversible data hiding in encrypted images using cross division and additive homomorphism. Signal Process Image Commun 39:234–248

    Article  Google Scholar 

  21. Li J, Liang X, Dai C, Xiang S (2019) Reversible data hiding algorithm in fully homomorphic encrypted domain. Entropy 21:625

    Article  MathSciNet  Google Scholar 

  22. Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21–27

    Article  Google Scholar 

  23. Luo L, Chen Z, Chen M et al (2009) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5:187–193

    Google Scholar 

  24. Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8:1075–1083

    Article  Google Scholar 

  25. Mo Q, Yao H, Cao F et al (2019) Reversible data hiding in encrypted image based on block classification permutation. CMC Comput Mater Contin 59:119–133

    Google Scholar 

  26. Mstafa RJ, Elleithy KM (2014) A highly secure video steganography using Hamming code (7, 4). In: IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014, pp 1–6

  27. Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans circuits Syst video Technol 16:354–362

    Article  Google Scholar 

  28. Raj MG, Pani SK (2022) Chaotic whale crow optimization algorithm for secure routing in the IoT environment. Int J Semant Web Inf Syst 18:1–25

    Article  Google Scholar 

  29. Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA chaos blend to secure medical privacy. IEEE Trans Nanobioscience 16(8):850–858. https://doi.org/10.1109/TNB.2017.2780881

    Article  Google Scholar 

  30. Ravichandran D, Praveenkumar P, Rajagopalan S, Rayappan JBB, Amirtharajan R (2021) ROI-based medical image watermarking for accurate tamper detection, localisation and recovery. Med Biol Eng Comput 59:1355–1372. https://doi.org/10.1007/s11517-021-02374-2

  31. Rengarajan Amirtharajan M, Revathi G, Reddy JB et al (2013) Rubiks cube: a way for Random Image Steganography. Inf Technol 5:329–340

    Google Scholar 

  32. Sachnev V, Kim HJ, Nam J et al (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst Video Technol 19:989–999

    Article  Google Scholar 

  33. Shirali-Shahreza MH, Shirali-Shahreza M (2006) A new approach to Persian/Arabic text steganography. In: 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse (ICIS-COMSAR’06), pp 310–315

  34. Shiu C-W, Chen Y-C, Hong W (2019) Reversible data hiding in permutation-based encrypted images with strong privacy. TIIS 13:1020–1042

    Google Scholar 

  35. Shiu C-W, Chen Y-C, Hong W (2015) Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process Image Commun 39:226–233

    Article  Google Scholar 

  36. Tang Z, Xu S, Ye D et al (2019) Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image. J Real-Time Image Process 16:709–724

    Article  Google Scholar 

  37. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13:890–896. https://doi.org/10.1109/TCSVT.2003.815962

    Article  Google Scholar 

  38. Wang Z, Bovik AC, Sheikh HR et al (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612

    Article  Google Scholar 

  39. Xiong L, Xu Z, Shi Y-Q (2018) An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidimens Syst Signal Process 29:1191–1202

    Article  MathSciNet  MATH  Google Scholar 

  40. Yang H, Vijayakumar P, Shen J, Gupta BB (2022) A location-based privacy-preserving oblivious sharing scheme for indoor navigation. Future Gener Comput Syst 137:42–52

    Article  Google Scholar 

  41. Yin Z, Abel A, Tang J et al (2017) Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multimed Tools Appl 76:3899–3920

    Article  Google Scholar 

  42. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18:255–258

    Article  Google Scholar 

  43. Zhang X, Qian Z, Feng G, Ren Y (2014) Efficient reversible data hiding in encrypted images. J Vis Commun Image Represent 25:322–328

    Article  Google Scholar 

  44. Zheng S, Li D, Hu D et al (2016) Lossless data hiding algorithm for encrypted images with high capacity. Multimed Tools Appl 75:13765–13778

    Article  Google Scholar 

Download references

Acknowledgements

Authors thank Department of Science & Technology, New Delhi for the FIST funding (SR/FST/ET-I/2018/221(C)). Also, Authors wish to thank the Intrusion Detection Lab at School of Electrical & Electronics Engineering, SASTRA Deemed University for providing infrastructural support to carry out this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rengarajan Amirtharajan.

Ethics declarations

Ethics approval

This article does not contain any studies with human participants performed by any authors.

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anushiadevi, R., Amirtharajan, R. Design and development of reversible data hiding- homomorphic encryption & rhombus pattern prediction approach. Multimed Tools Appl 82, 46269–46292 (2023). https://doi.org/10.1007/s11042-023-15455-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15455-1

Keywords

Navigation