Abstract
Homomorphic public key technology effectively protects privacy, allowing algebraic operations directly in the cipher-text. Therefore, it has been extensively studied in the field of cloud computing. In this study, an encrypted image-based data hiding (EIRDH) algorithm with homomorphic public key cryptosystem is presented. The key contributions are these two sides. (1) An improved fast Paillier homomorphic public key cryptosystem system is proposed for encrypting image. It improves the efficiency of encryption operations greatly. (2) A difference expansion (DE) scheme is developed by exploiting the cover pixel to construct a new pair of pixels for data hiding. Compared with other methods, the experimental results show that, the proposed method has larger payload and higher stego-image quality. It accomplishes the image quality’s increasing instead of general decreasing.
Similar content being viewed by others
References
Alassaf N, Gutub A, Parah SA, Al Ghamdi M (2018) Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6801-z
Caldelli R, Filippini F, Becarelli R (2010) Reversible watermarking techniques: an overview and a classification. EURASIP Journal on Information Security
Chen YC, Shiu CW, Horng G (2014) Encrypted signal-based reversible data hiding with public key cryptosystem. J Vis Commun Image Represent 25:1164–1170
Di F, Duan J, Zhang M, Liu J (2018) Encrypted image-based reversible data hiding with public key cryptography from interpolation-error expansion. Adv Internetw Data Web Technol: 138–149: doi:https://doi.org/10.1007/978-3-319-59463-7_14
Di F, Duan J, Zhang M, Zhang Y, Liu J (2018) Reversible image data hiding with homomorphic encryption and contrast enhancement. Advances in Internetworking, Data & Web Technologies:150–159. doi:https://doi.org/10.1007/978-3-319-59463-7_15
Gutub AA-A (2007) High speed hardware architecture to compute galois fields GF(p) Montgomery inversion with scalability features. IET Comput Digit Technol 1(4):389–396
Gutub AA-A, Ferreira Tenca A. (2003) Efficient scalable hardware architecture for Montgomery inverse computation in GF(p),2003, IEEE Workshop on Signal Processing Systems (SIPS'03): 93–98. Seoul, Korea, August 27–29
Gutub AA-A, Khan FA-A (2012) Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems. International Conference on Advanced Computer Science Applications and Technologies: 116–121
Gutub AA-A, Ferreira Tenca A, Koç ÇK (2002) Scalable VLSI Architecture for GF(p) Montgomery Modular Inverse Computation, Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI.02): 46–51
Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-5293-6
Hong W, Chen TS, Wu HY (2011) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 9(4):199–202
Janani S, P Poorani S (2014) In-dependable data hiding in an encrypted image using FCM-DH algorithm[J]. IJRCCT 3(2):223–225
Lagendijk RL, Zekeriya E, Barni M (2013) Encrypted signal processing for privacy protection: conveying the utility of homomorphic encryption and multiparty computation. IEEE Signal Process 30(1):82–105
Li M, Li Y (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190–196
Li M, Xiao D, Peng Z, Nan HA (2014) Modified reversible data hiding in encrypted images using random diffusion and accurate prediction [J]. ETRI J 36(2):325–328
Li M, Xiao D, Kulsoom A, Zhang Y (2015) Improved reversible data hiding for encrypted images using full embedding strategy. Electron Lett 51(9):690–691
Li M, Xiao D, Zhang Y, Nan H (2015) Reversible data hiding in encrypted images using cross division and additive homomorphism. Signal Process: Image Commun 39:234–248
Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inform Forensics Sec 8(3):553–562
Ou B, Li X, Zhao Y, Ni R (2013) Reversible data hiding based on PDE predictor. J Syst Softw 86(10):2700–2709
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. Proceeding of the Advances Cryptology, EUROCRYPT99,LNCS 1592:223–238
Qian Z, Zhang X (2015) Reversible data hiding in encrypted image with distributed source encoding. IEEE Transactions on Circuits and Systems for Video Technology
Shiu C-W, Chen Y-C, Hong W (2015) Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process Image Commun 39:226–233
Tang Z, Wang F, Zhang XQ (2017) Image encryption based on random projection partition and chaotic system. Multimed Tools Applic 76(6):8257–8283
Tang Z, Xu S, Ye D, Wang J, Zhang X, Yu C (2018) Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image. J Real-Time Image Proc. https://doi.org/10.1007/s11554-018-0838-0
Tang Z, Xu S, Yao H, Qin C (2018) Reversible data hiding with differential compression in encrypted image. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6567-3
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 3(8):890–896
USC-SIPI image database 〈http://sipi.usc.edu/database〉
Xiang SJ, Luo XR (2016) Reversible data hiding in encrypted image based on homomorphic public key cryptosystem. Ruan Jian Xue Bao/Journal of Software 27(6):1592–1601 (in Chinese). http://www.jos.org.cn /1000-9825/5007.htm
Xiang S, Luo X (2017) Efficient reversible data hiding in encrypted image with public key cryptosystem. EURASIP J Adv Signal Process 2017:59
Xiang S, Luo X (2018) Reversible data hiding in homomorphic encrypted domain by mirroring Ciphertext group. IEEE Trans Circ Syst Video Technol 28(11):3099–3110
Xiao D, Chen S (2014) Separable data hiding in encrypted image based on compressive sensing [J]. Electron Lett 50(8):598–600
Yin Z., Luo B, Hong W (2014) Separable and error-free reversible data hiding in encrypted image with high payload [J]. Sci World J
Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258
Zhang X (2011) Lossy compression and iterative reconstruction for encrypted image. IEEE Trans Inform Forensics Sec 6(1):53–58
Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inform Forensics Sec 7(2):826–832
Zhang X (2014) Reversibility improved data hiding in encrypted images. Signal Process 94(0):118–127
Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94:118–127
Zhang S, Gao T, Sheng G (2014) A joint encryption and reversible data hiding scheme based on integer-DWT and arnold map permutation [J]. Journal of Applied Mathematics
Zhang XP, Long J, Wang Z, Cheng H (2016) Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Trans Circ Syst Video Technol 26(9):1622–1631
Acknowledgements
The authors are grateful for the anonymous reviewers’ insightful comments and valuable suggestions sincerely, which can substantially improve the quality of this study. This work is partially supported by the National Natural Science Foundation of China (No.61371150).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Jiang, C., Pang, Y. Encrypted images-based reversible data hiding in Paillier cryptosystem. Multimed Tools Appl 79, 693–711 (2020). https://doi.org/10.1007/s11042-019-07874-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-07874-w