Computing in Covert Domain Using Data Hiding

This paper proposes an idea of data computing in the covert domain (DCCD). We show that with information hiding some data computing tasks can be executed beneath the covers like images, audios, random data, etc. In the proposed framework, a sender hides his source data into two covers and uploads them onto a server. The server executes computation within the stego and returns the covert computing result to a receiver. With the covert result, the receiver can extract the computing result of the source data. During the process, it is imperceptible for the server and the adversaries to obtain the source data as they are hidden in the cover. The transmission can be done over public channels. Meanwhile, since the computation is realized in the covert domain, the cloud cannot obtain the knowledge of the computing result. Therefore, the proposed idea is useful for cloud computing.

[1]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[2]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted Images With Distributed Source Encoding , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Gwoboa Horng,et al.  Encrypted signal-based reversible data hiding with public key cryptosystem , 2014, J. Vis. Commun. Image Represent..

[4]  Xinpeng Zhang,et al.  Huffman-code based retrieval for encrypted JPEG images , 2019, J. Vis. Commun. Image Represent..

[5]  Zhenxing Qian,et al.  Reversible visible watermark embedded in encrypted domain , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).

[6]  Zhenxing Qian,et al.  How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing , 2020, IEEE Transactions on Cloud Computing.

[7]  Yang Li,et al.  Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding , 2017, Signal Process..

[8]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[9]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.

[10]  Xinpeng Zhang,et al.  AC-coefficient histogram-based retrieval for encrypted JPEG images , 2015, Multimedia Tools and Applications.

[11]  Rajendra Bharti,et al.  Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography , 2017, RICE.

[12]  Zhenxing Qian,et al.  Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server , 2018 .

[13]  Kai Peng,et al.  SocInf: Membership Inference Attacks on Social Media Health Data With Machine Learning , 2019, IEEE Transactions on Computational Social Systems.

[14]  Ling Shao,et al.  Image Super-Resolution as a Defense Against Adversarial Attacks , 2020, IEEE Transactions on Image Processing.

[15]  Jin Chen,et al.  Information Privacy Concern About Peer Disclosure in Online Social Networks , 2015, IEEE Transactions on Engineering Management.

[16]  Zhenxing Qian,et al.  On Improving Distortion Functions for JPEG Steganography , 2018, IEEE Access.

[17]  Zhenxing Qian,et al.  Data Hiding in Iris Image for Privacy Protection , 2018, IETE Technical Review.

[18]  Zhenxing Qian,et al.  New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[19]  Xinpeng Zhang,et al.  Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing , 2017, KSII Trans. Internet Inf. Syst..

[20]  William Puech,et al.  An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images , 2018, IEEE Transactions on Information Forensics and Security.

[21]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.

[22]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[23]  Jessica J. Fridrich,et al.  Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.

[24]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[25]  Tao Peng,et al.  Enhanced Location Privacy Preserving Scheme in Location-Based Services , 2017, IEEE Systems Journal.