Advertisement

Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations

  • Ching-Chun Chang
  • Chang-Tsun Li
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 109)

Abstract

Privacy-preserving reversible watermarking, as a subfield of secure signal processing, has received a growing research attention in the recent years due to privacy concerns in cloud computing. In this paper, we propose a novel reversible watermarking scheme for data exfiltration prevention. This scheme enables the cloud to embed labels that indicate the degree of confidentiality into the encrypted documents in such a way that the network administrator can monitor the document exfiltration through detecting the labels in the encrypted domain without compromising data privacy. An efficient watermarking algorithm is devised primarily based upon the concept of lexicographic permutations. In addition to this, a content-adaptive signal estimation mechanism is constructed for assisting host media recovery. Experimental results show that the proposed scheme outperforms the state-of-the-art with regards to watermarking capacity, fidelity, and recoverability.

Keywords

Cloud computing Data exfiltration Multimedia security Privacy protection Reversible watermarking Stream cipher 

References

  1. 1.
    Cao, X., Du, L., Wei, X., Meng, D., Guo, X.: High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern. 46(5), 1132–1143 (2016)CrossRefGoogle Scholar
  2. 2.
    Chen, Y.C., Shiu, C.W., Horng, G.: Encrypted signal-based reversible data hiding with public key cryptosystem. J. Vis. Commun. Image Represent. 25(5), 1164–1170 (2014)CrossRefGoogle Scholar
  3. 3.
    Dragoi, I.C., Coanda, H.G., Coltuc, D.: Improved reversible data hiding in encrypted images based on reserving room after encryption and pixel prediction. In: Proceedings European Signal Processing Conference (EUSIPCO), Kos, Greece, pp. 2186–2190, August 2017Google Scholar
  4. 4.
    Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)CrossRefGoogle Scholar
  5. 5.
    Huang, F., Huang, J., Shi, Y.Q.: New framework for reversible data hiding in encrypted domain. IEEE Trans. Inf. Forensics Secur. 11(12), 2777–2789 (2016)CrossRefGoogle Scholar
  6. 6.
    Li, M., Li, Y.: Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process. 130, 190–196 (2017)CrossRefGoogle Scholar
  7. 7.
    Liao, X., Shu, C.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Represent. 28, 21–27 (2015)CrossRefGoogle Scholar
  8. 8.
    Puech, W., Chaumont, M., Strauss, O.: A reversible data hiding method for encrypted images. In: Proceedings SPIE, vol. 6819, San Jose, CA, USA, pp. 68191E–1–68191E–9, February 2008Google Scholar
  9. 9.
    Qian, Z., Zhang, X.: Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans. Circuits Syst. Video Technol. 26(4), 636–646 (2016)CrossRefGoogle Scholar
  10. 10.
    Qian, Z., Zhang, X., Wang, S.: Reversible data hiding in encrypted JPEG bitstream. IEEE Trans. Multimedia 16(5), 1486–1491 (2014)CrossRefGoogle Scholar
  11. 11.
    Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. In: DeMillo, R.A., et al. (eds.) Foundations of Secure Computation, pp. 169–180. Academic Press (1978)Google Scholar
  12. 12.
    Wu, H.T., Cheung, Y.M., Huang, J.: Reversible data hiding in Paillier cryptosystem. J. Visual Commun. Image Represent. 40, pt. B, 765–771 (2016)CrossRefGoogle Scholar
  13. 13.
    Wu, X., Chen, B., Weng, J.: Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer. J. Vis. Commun. Image Represent. 41, 58–64 (2016)CrossRefGoogle Scholar
  14. 14.
    Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255–258 (2011)CrossRefGoogle Scholar
  15. 15.
    Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)CrossRefGoogle Scholar
  16. 16.
    Zhang, X., Long, J., Wang, Z., Cheng, H.: Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Trans. Circuits Syst. Video Technol. 26(9), 1622–1631 (2016)CrossRefGoogle Scholar
  17. 17.
    Zhang, X., Qian, Z., Feng, G., Ren, Y.: Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image Represent. 25(2), 322–328 (2014)CrossRefGoogle Scholar
  18. 18.
    Zhou, J., Sun, W., Dong, L., Liu, X., Au, O.C., Tang, Y.Y.: Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans. Circuits Syst. Video Technol. 26(3), 441–452 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of WarwickCoventryUK
  2. 2.School of Computing and MathematicsCharles Sturt UniversityMelbourneAustralia

Personalised recommendations