A Comparative Study on Reversible Data Hiding in Encrypted Images Using Various Frameworks
Citation
Sayeesh, Manjunath Kotari, Harish Kunder, Chanchal Antony "A Comparative Study on Reversible Data Hiding in Encrypted Images Using Various Frameworks", International Journal of Computer & organization Trends (IJCOT), V7(5):15-19 Sep - Oct 2017, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.
Abstract
We need more security for data transmission in computer networks. Nowadays most popularly we store and manage variety of data in cloud server. We need to protect the privacy of the data that is stored in cloud server. Many robust message encryption methods have been developed to such methods. Reversible data hiding in encrypted images is form of steganography in which we hide data within images. In this paper, we compare vacating room after encryption (VRAE), reserving room before encryption (RRBE) and reversible image transformation (RIT) frameworks for reversible data hiding in encrypted images. In the framework VRAE, the cloud server embeds data by losslessly vacating room from the encrypted images by using the idea of compressing encrypted images. In the framework RRBE, the image owner first empties out room by using reversible data hiding method in the plain images. After that, the image is encrypted and outsourced to the cloud and the cloud server can freely embed data into the reserved room of the encrypted image. RIT-based framework allows the user to transform the content of original image into the content of another target image with the same size. The transformed image, which looks like the target image, is used as the encrypted image and is outsourced to the cloud.
References
[1]
X. Hu, W. Zhang, X. Li, and N. Yu, “Minimum rate prediction and optimized histograms modification for reversible data hiding,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 3, pp. 653–664, Mar. 2015.
[2]
X. Li, W. Zhang, B. Ou, and B. Yang, “A brief review on reversible data hiding: Current techniques and future prospects,” in Proc. IEEE ChinaSummit Int. Conf. Signal Inf. Process., 2014, pp. 426–430.
[3]
H. Wang, W. Zhang, and N. Yu, “Protecting patient confidential information based on ECG reversible data hiding,” Multimedia Tools Appl.,vol. 75, no. 21, pp. 13733–13747, 2015, doi:10.1007/s11042- 015-2706-2
[4]
Z. Fu et al., “Achieving efficient cloud search services: Multi-keyword
ranked search over encrypted cloud data supporting parallel computing,” IEICE Trans. Commun., vol. 98, no. 1, pp. 190–200, 2015.
[5]
K. Hwang and D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Comput., vol. 14, no. 5, pp. 14–22, Sep./Oct.2010
[6]
J. Fridrich and M. Goljan, “Lossless data embedding for all image formats,” in Proc. SPIE Proc. Photonics West, Electronic Imaging, Securityand Watermarking of Multimedia Contents, San Jose, CA, USA,Jan. 2002, vol. 4675, pp. 572–583.
[7]
J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896,Aug. 2003.
[8]
Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE
Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006.
[9]
K. Hwang and D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Comput., vol. 14, no. 5, pp. 14–22, Sep./Oct. 2010.
[10]
W. Zhang, X. Hu, X. Li, and N. Yu, “Recursive histogram modification: Establishing equivalency between reversible data hiding and lossless data compression,” IEEE Trans. Image Process., vol. 22, no. 7, pp. 2775–2785, Jul. 2013.
[11]
V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. CircuitsSyst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul. 2009.
[12]
B.ou, X. Li, Y. Zhao, R. Ni, and Y. Shi, “Pairwise prediction-error expansion for efficient reversible data hiding,” IEEE Trans. Image Process., vol.22, no. 12, pp. 5010–5021, Dec. 2013.
[13]
I.-C. Dragoi and D. Coltuc, “Local-prediction-based difference expansion reversible watermarking,” IEEE Trans. Image Process., vol. 23, no. 4,pp. 1779–1790, Apr. 2014.
[14]
Z. Ni, Y. Shi, N. Ansari, and S.Wei, “Reversible data hiding,” IEEE Trans.Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006.
[15]
J. Tian, “Reversible data embedding using a difference expansion,” IEEETrans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug.2003.
[16]
X. Hu, W. Zhang, X. Li, and N. Yu, “Minimum rate prediction and optimized histograms modification for reversible data hiding,” IEEE Trans.Inf. Forensics Security, vol. 10, no. 3, 653–664, Mar. 2015.
[17]
X. Hu et al., “Fast estimation of optimal marked-signal distribution for reversible data hiding,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 5,pp. 779–788, May 2013.
[18]
W. Zhang, X. Hu, and N. Yu, “Optimal transition probability of reversible data hiding for general distortionmetrics and its applications,” IEEE Trans.Image Process., vol. 24, no. 1, pp. 294–304, Jan. 2015.
[19]
W. Puech, M. Chaumont, and O. Strauss, “A reversible data hiding method for encrypted images,” Proc. SPIE, Secur., Forensics Steganogr., Watermarking Multimedia Contents X, vol. 6819, p. 68191E,Feb. 2008.
[20]
X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
[21]
W. Hong, T. Chen, and H. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19,no. 4, pp. 199–202, Apr. 2012.
[22]
K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Trans. Inf.Forensics Security, vol. 8, no. 3, pp. 553–562, Mar. 2013.
[23]
W. Zhang, K. Ma, and N. Yu, “Reversibility improved data hiding in
encrypted images,” Signal Process., vol. 94, pp. 118–127, Jan. 2014.
Keywords
Reversible data hiding (RDH), vacating room after encryption (VRAE), reserving room before encryption (RRBE), reversible image transformation (RIT), image encryption, privacy protection.