Advertisement

A Novel Lossless Data Hiding Scheme in Homomorphically Encrypted Images

  • Asad Malik
  • Hongxia WangEmail author
  • Ahmad Neyaz Khan
  • Yanli Chen
  • Yi Chen
Conference paper
  • 38 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 12022)

Abstract

In this paper, we have presented a novel lossless data hiding scheme in a homomorphically encrypted image. After applying the homomorphic encryption function to the original image by the content owner, the data hider can embed the additional data in a lossless manner, without revealing the original content of the image. Meanwhile, the data hider chooses a threshold value and generates a location map accordingly. This location map is considered as an auxiliary information. The receiver can recover the additional data using the shared auxiliary information in a separable manner. And the original image is recovered losslessly, without any post-processing, by the homomorphic decryption function. In our proposed scheme, no distortion is introduced in the data hiding phase, as a result the directly decrypted image is the same as the original image. The experimental results show that, the scheme has better performance than some of the state-of-the-art methods with high embedding rate and distortionless directly decrypted image.

Keywords

Lossless data hiding Reversible Data Hiding Homomorphic cryptography Cloud computing High capacity 

Notes

Acknowledgments

This work is supported in part by the National Natural Science Foundation of China (NSFC) under grant No. 61972269, and the Fundamental Research Funds for the Central Universities under the grant No. YJ201881.

References

  1. 1.
    Barton, J.M.: Method and apparatus for embedding authentication information within digital data, 8 July 1997, US Patent 5,646,997Google Scholar
  2. 2.
    Chen, Y.C., Shiu, C.W., Horng, G.: Encrypted signal-based reversible data hiding with public key cryptosystem. J. Vis. Commun. Image Represent. 25(5), 1164–1170 (2014)CrossRefGoogle Scholar
  3. 3.
    Di, F., Duan, J., Zhang, M., Zhang, Y., Liu, J.: Encrypted image-based reversible data hiding with public key cryptography from interpolation-error expansion. In: Barolli, L., Zhang, M., Wang, X.A. (eds.) EIDWT 2017. LNDECT, vol. 6, pp. 138–149. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-59463-7_14CrossRefGoogle Scholar
  4. 4.
    Huang, F., Huang, J., Shi, Y.Q.: New framework for reversible data hiding in encrypted domain. IEEE Trans. Inf. Forensics Secur. 11(12), 2777–2789 (2016)CrossRefGoogle Scholar
  5. 5.
    Khan, A.N., Fan, M.Y., Nazeer, M.I., Memon, R.A., Malik, A., Husain, M.A.: An efficient separable reversible data hiding using paillier cryptosystem for preserving privacy in cloud domain. Electronics 8(6), 682 (2019)CrossRefGoogle Scholar
  6. 6.
    Li, M., Xiao, D., Zhang, Y., Nan, H.: Reversible data hiding in encrypted images using cross division and additive homomorphism. Sign. Proces. Image Commun. 39, 234–248 (2015)CrossRefGoogle Scholar
  7. 7.
    Malik, A., et al.: Reversible data hiding in homomorphically encrypted image using interpolation technique. J. Inf. Secur. Appl. 48, 102374 (2019)Google Scholar
  8. 8.
    Malik, A., Wang, H., Wu, H., Abdullahi, S.M.: Reversible data hiding with multiple data for multiple users in an encrypted image. Int. J. Digit. Crime Forensics (IJDCF) 11(1), 46–61 (2019)CrossRefGoogle Scholar
  9. 9.
    Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999).  https://doi.org/10.1007/3-540-48910-X_16CrossRefGoogle Scholar
  10. 10.
    Shiu, C.W., Chen, Y.C., Hong, W.: Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Sign. Process. Image Commun. 39, 226–233 (2015)CrossRefGoogle Scholar
  11. 11.
    Xiang, S., Luo, X.: Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group. IEEE Trans. Circuits Syst. Video Technol. 28(11), 3099–3110 (2017)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Zhang, X.: Reversible data hiding in encrypted image. IEEE Sign. Process. Lett. 18(4), 255–258 (2011)CrossRefGoogle Scholar
  13. 13.
    Zhang, X., Long, J., Wang, Z., Cheng, H.: Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Trans. Circuits Syst. Video Technol. 26(9), 1622–1631 (2016)CrossRefGoogle Scholar
  14. 14.
    Zheng, S., Wang, Y., Hu, D.: Lossless data hiding based on homomorphic cryptosystem. IEEE Trans. Dependable Secure Comput. 1 (2019).  https://doi.org/10.1109/TDSC.2019.2913422

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Asad Malik
    • 1
  • Hongxia Wang
    • 2
    Email author
  • Ahmad Neyaz Khan
    • 3
  • Yanli Chen
    • 1
  • Yi Chen
    • 1
  1. 1.School of Information Science and TechnologySouthwest Jiaotong UniversityChengduChina
  2. 2.College of CybersecuritySichuan UniversityChengduChina
  3. 3.School of Computer Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengduChina

Personalised recommendations