Reversible data hiding based on Shamir's secret sharing for color images over cloud

To reduce the vulnerability of the multimedia content against the wide attacking surface of the cloud-based paradigm, obscuring the information before dissemination becomes a necessary step. In this paper, a reversible data hiding scheme based on Shamirs secret sharing for rightful ownership verification in encrypted domain has been proposed. It obscures the cover information via distributing it into multiple random looking shares and embeds a secret information specific to the owner into some of these encrypted shares based on a secret key prior to outsourcing the media information to cloud servers. The shares reveal no information at the cloud servers and even if they get attacked at these cloud servers, the owner information can be extracted to provide the rightful ownership of the media. The scheme facilitates extraction of secret information either directly from the cloud servers or after recovery of the original media at the authentic entity end possessing the secret keys. The robustness of the scheme has been validated by considering different attack scenarios in the encrypted domain itself. The visual quality of the recovered media and the extracted secret information evaluated via peak signal to noise ratio (PSNR), normalized cross correlation metric (NCC) and structural similarity index (SSIM) prove the efficacy of the proposed scheme.

[1]  Xinpeng Zhang,et al.  Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode , 2016, Inf. Sci..

[2]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..

[3]  Zhenxing Qian,et al.  Reversible visible watermark embedded in encrypted domain , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).

[4]  Hai-Dong Yuan,et al.  Secret sharing with multi-cover adaptive steganography , 2014, Inf. Sci..

[5]  Xingming Sun,et al.  Reversible data hiding with contrast enhancement and tamper localization for medical images , 2017, Inf. Sci..

[6]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[7]  Suneeta Agarwal,et al.  A self recoverable dual watermarking scheme for copyright protection and integrity verification , 2017, Multimedia Tools and Applications.

[8]  Tung-Shou Chen,et al.  An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.

[9]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[10]  Josh Benaloh,et al.  Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.

[11]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..

[12]  Partha Pratim Roy,et al.  A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform , 2017, Multimedia Tools and Applications.

[13]  Hamidreza Rashidy Kanan,et al.  A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..

[14]  Uwe Schwiegelshohn,et al.  Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability , 2016, J. Comput. Sci..

[15]  Ying Luo,et al.  Privacy protected image denoising with secret shares , 2012, 2012 19th IEEE International Conference on Image Processing.

[16]  Kwok-Wo Wong,et al.  Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem , 2013, Signal Process. Image Commun..

[17]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[18]  Mohan S. Kankanhalli,et al.  Robust Watermarking of Compressed and Encrypted JPEG2000 Images , 2012, IEEE Transactions on Multimedia.

[19]  Jianting Guo,et al.  Secure watermarking scheme against watermark attacks in the encrypted domain , 2015, J. Vis. Commun. Image Represent..

[20]  Balasubramanian Raman,et al.  Don't see me, just filter me: towards secure cloud based filtering using Shamir's secret sharing and POB number system , 2016, ICVGIP '16.

[21]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[22]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[23]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[24]  Engin Avci,et al.  A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images , 2016, Displays.

[25]  Christian Roux,et al.  A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.

[26]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[27]  Suneeta Agarwal,et al.  An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection , 2015, Multimedia Tools and Applications.

[28]  Alessandro Neri,et al.  A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..

[29]  Neha Jain,et al.  Rough set based effective technique of image watermarking , 2017, J. Comput. Sci..

[30]  Manoj Misra,et al.  Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system , 2017, Multimedia Tools and Applications.

[31]  Albert Y. Zomaya,et al.  GA-ETI: An enhanced genetic algorithm for the scheduling of scientific workflows in cloud environments , 2016, J. Comput. Sci..

[32]  Shang-Juh Kao,et al.  A high quality image sharing with steganography and adaptive authentication scheme , 2011, J. Syst. Softw..