Reversible Data Hiding in Encrypted Image based on Homomorphic Public Key Cryptosystem

Homomorphic encryption, which protects privacy effectively and allows algebraic operations directly in the ciphertext, has been a hot spot in the study of cloud computing. Due to security threats in cloud computing, the security protection and integrity authentication of encrypted data remain grave problems. Besides, the challenge lies in how to retrieve the encrypted data. To achieve more effective management and security protection of encrypted images on-line, this paper proposes a reversible data hiding scheme for ciphertext based on the public key cryptosystems with homomorphic and probabilistic properties. In the proposed scheme, partial pixels are selected as target pixels by a secret key and all bits of the target pixels are embedded into the other pixels with difference expansion (DE) to vacate room before encryption. As a bonus, secret data can be embedded directly in homomorphic encrypted domain by altering the target pixels with the fake pixels which are comprised of secret data. With the legal key, the receiver can extract the embedded data from the encrypted image and the directly decrypted image. Furthermore, he/she can recover the original image perfectly after decryption and data extraction. Finally, experimental results show that extra data can be embedded more efficiently in homomorphic encrypted domain while keeping the quantity of data unchanged. Besides, the embedded data can be extracted in both ciphertext and plaintext.

[1]  Tung-Shou Chen,et al.  Reversible Data Embedment for Encrypted Cartoon Images Using Unbalanced Bit Flipping , 2013, ICSI.

[2]  Zhang Min,et al.  Study on Cloud Computing Security , 2011 .

[3]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[4]  Peijia Zheng,et al.  Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain , 2013, IEEE Transactions on Image Processing.

[5]  Mauro Barni,et al.  Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals , 2010, IEEE Transactions on Information Forensics and Security.

[6]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[7]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[8]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[9]  Xinpeng Zhang,et al.  Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[10]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[11]  Gwoboa Horng,et al.  Encrypted signal-based reversible data hiding with public key cryptosystem , 2014, J. Vis. Commun. Image Represent..

[12]  Tung-Shou Chen,et al.  An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.

[13]  Mache Creeger,et al.  Cloud Computing: An Overview , 2009, ACM Queue.

[14]  Weiming Zhang,et al.  Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.

[15]  Mauro Barni,et al.  On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.

[16]  Miroslav Goljan,et al.  Writing on wet paper , 2005 .

[17]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[18]  Judith Hurwitz,et al.  Cloud Computing for Dummies , 2009 .

[19]  Zheng Hong-yin Novel reversible data embedding algorithm for encrypted image , 2014 .

[20]  Soo-Chang Pei,et al.  Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.