Universal data embedding in encrypted domain

In this work, a Universal Reversible Data Embedding method applicable to any Encrypted Domain (urDEED) is proposed. urDEED operates completely in the encrypted domain and requires no feature of the signal prior to the encryption process. In particular, urDEED exploits the coding redundancy of the encrypted signal by partitioning it into segments referred to as imaginary codewords (IC's). Then, IC's are entropy encoded by using Golomb-Rice codewords (GRC's). Finally, each GRC is modified to accommodate two bits from the augmented payload. urDEED is designed to preserve the same file-size as that of the original input (encrypted) signal by embedding the quotient part of the GRC's as side information. Moreover, urDEED is consistently reversible and universally applicable to any digital signal encrypted by any encryption method. Experimental results show that urDEED achieves an average embedding capacity of ~0.169 bit per every bit of the encrypted (host) signal.

[1]  Abbas Cheddad,et al.  Digital Image Steganography , 2009 .

[2]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[3]  WolfTilman,et al.  Reconfigurable hardware for high-security/high-performance embedded systems , 2008 .

[4]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[5]  Alessandro Neri,et al.  A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..

[6]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[7]  B. Sadeghian,et al.  High speed implementation of Serpent algorithm , 2004, Proceedings. The 16th International Conference on Microelectronics, 2004. ICM 2004..

[8]  Vincent Rijmen,et al.  Differential Cryptanalysis of the ICE Encryption Algorithm , 1998, FSE.

[9]  P. W. Jones,et al.  Digital Image Compression Techniques , 1991 .

[10]  E. M. Mohamed,et al.  Randomness testing of modern encryption techniques in cloud environment , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).

[11]  Tilman Wolf,et al.  Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective , 2008, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[12]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[13]  Kevin Curran,et al.  A novel approach to digital watermarking, exploiting colour spaces , 2012, Signal Process..

[14]  Chong Hee Kim,et al.  Improved Differential Fault Analysis on AES Key Schedule , 2012, IEEE Transactions on Information Forensics and Security.

[15]  Lih-Chyau Wuu,et al.  A new 256-bits block cipher 舑 Twofish256 , 2007, 2007 International Conference on Computer Engineering & Systems.

[16]  Mohammad Reza Aref,et al.  Impossible differential cryptanalysis of reduced-round TEA and XTEA , 2015, 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC).

[17]  A. Moussa Data encryption performance based on Blowfish , 2005, 47th International Symposium ELMAR, 2005..

[18]  E. R. Davies,et al.  A skimming technique for fast accurate edge detection , 1992, Signal Process..

[19]  Hung-Min Sun,et al.  Dual RSA and Its Security Analysis , 2007, IEEE Transactions on Information Theory.

[20]  Fengtong Wen,et al.  Optimal Tweakable Blockcipher Based on Dual MISTY-Type Structure , 2010, 2010 Second International Conference on Future Networks.

[21]  Tung-Shou Chen,et al.  An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.

[22]  Kiyoshi Tanaka,et al.  A DCT-based Mod4 steganographic method , 2007, Signal Process..

[23]  M. McLoone,et al.  High-performance FPGA implementation of DES using a novel method for implementing the key schedule , 2003 .

[24]  Zhen Li,et al.  Blind and robust audio watermarking scheme based on SVD-DCT , 2011, Signal Process..

[25]  Martin E. Hellman,et al.  On the security of multiple encryption , 1981, CACM.

[26]  Saeed V. Vaseghi,et al.  Advanced Digital Signal Processing and Noise Reduction , 2006 .

[27]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[28]  Jicheng Wang,et al.  A novel watermarking scheme for H.264/AVC video authentication , 2011, Signal Process. Image Commun..

[29]  H.M. Heys,et al.  An analysis of the CAST-256 cipher , 1999, Engineering Solutions for the Next Millennium. 1999 IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No.99TH8411).

[30]  SeroussiG.,et al.  The LOCO-I lossless image compression algorithm , 2000 .

[31]  Jun Zhang,et al.  Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol , 2010, Inf. Sci..

[32]  Guillermo Sapiro,et al.  The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS , 2000, IEEE Trans. Image Process..