Secure and Authenticated Reversible Data Hiding in Encrypted Image

This work proposes a Secure and authenticated discrete reversible data hiding in cipher images deals with security and authentication. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data hider may compress the least significant bits of the encrypted image using a data hiding key to create a sparse space to accommodate some additional data. With an encrypted image containing additional data, if a receiver has the data hiding key, receiver can extract the additional data though receiver does not know the image content. If the receiver has the encryption key, can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data hiding key and the encryption key, can extract the additional data and recover the original content without any error by exploiting the spatial correlation in natural image when the amount of additional data is not too large. It is also a drawback because if the receiver has any one key as known, and then he can take any one information from the encrypted data. In order to achieve authentication SHA-1 algorithm is being used.

[1]  Minoru Kuribayashi,et al.  Fingerprinting protocol for images based on additive homomorphic property , 2005, IEEE Transactions on Image Processing.

[2]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[3]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[4]  Xinpeng Zhang,et al.  Lossy Compression and Iterative Reconstruction for Encrypted Image , 2011, IEEE Transactions on Information Forensics and Security.

[5]  Alessandro Piva,et al.  An efficient buyer-seller watermarking protocol based on composite signal representation , 2009, MM&Sec '09.

[6]  Alessandro Neri,et al.  A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..

[7]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[8]  Wenjun Zeng,et al.  Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.

[9]  Mauro Barni,et al.  On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.

[10]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[11]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[12]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[13]  Mauro Barni,et al.  Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals , 2010, IEEE Transactions on Information Forensics and Security.

[14]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.