RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret Sharing

Reversible Data Hiding in Encrypted Image (RDHEI) schemes may redistribute the data hiding procedure to other parties and can preserve privacy of the cover image. Recently, cloud computing technology has led to the rapid growth of networked media, and many multimedia rights are owned by multiple parties, such as a film's producer and multiple distributors. Thus, the data hiding task could be distributed to multiple distributed servers. Multi-party data hiding has become an important demand for networked media. In addition, it is essential to preserve multi-server and multi-message privacy and data integrity. However, most of the RDHEI schemes involve only one data hider. That inspired us to design the secure multi-party embedding over distributed encrypted-image servers as a solution for multi-party RDHEI applications. In this article, we propose a novel Reversible Data Hiding over Distributed Encrypted-Image Servers (RDH-DES) based on secret sharing. The Chinese remainder theorem, secret sharing, and block-level scrambling are developed as a lightweight cryptography to generate the encrypted image shares. These shares are distributed to different image servers and are used to embed secret data in the proposed framework. The marked encrypted image can be constructed through the marked encrypted shares from different parties, and the decryption and extraction can be completed by the receiver. The experimental results and theoretical analysis have demonstrated that the proposed scheme is secure and effective.

[1]  Yicong Zhou,et al.  Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders , 2020, IEEE Transactions on Dependable and Secure Computing.

[2]  Yuliang Lu,et al.  Robust Secret Image Sharing Resistant to Noise in Shares , 2021, ACM Trans. Multim. Comput. Commun. Appl..

[3]  Deepak Puthal,et al.  Lightweight Multi-party Authentication and Key Agreement Protocol in IoT-based E-Healthcare Service , 2020, ACM Trans. Multim. Comput. Commun. Appl..

[4]  Yaomin Wang,et al.  High Capacity Reversible Data Hiding in Encrypted Image Based on Intra-Block Lossless Compression , 2021, IEEE Transactions on Multimedia.

[5]  Yaomin Wang,et al.  High-Fidelity Reversible Image Watermarking Based on Effective Prediction Error-Pairs Modification , 2021, IEEE Transactions on Multimedia.

[6]  Suyel Namasudra,et al.  Securing Multimedia by Using DNA-Based Encryption in the Cloud Computing Environment , 2020, ACM Trans. Multim. Comput. Commun. Appl..

[7]  Yuliang Lu,et al.  Reversible Image Secret Sharing , 2020, IEEE Transactions on Information Forensics and Security.

[8]  Singhamit Kumar,et al.  Data Hiding: Current Trends, Innovation and Potential challenges , 2020 .

[9]  Tingting Su,et al.  Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[10]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding , 2018, IEEE Transactions on Multimedia.

[11]  Lizhi Xiong,et al.  Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion , 2019, J. Inf. Secur. Appl..

[12]  Franco Frattolillo,et al.  A multiparty watermarking protocol for cloud environments , 2019, J. Inf. Secur. Appl..

[13]  Sung-Hsien Hsieh,et al.  A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms , 2019, IEEE Transactions on Information Forensics and Security.

[14]  Jeng-Shyang Pan,et al.  An Improved Integer Transform Combining with an Irregular Block Partition , 2019, Symmetry.

[15]  Shijun Xiang,et al.  Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[16]  Yicong Zhou,et al.  Medical image encryption using high-speed scrambling and pixel adaptive diffusion , 2018, Signal Process..

[17]  Jian Weng,et al.  Adopting secret sharing for reversible data hiding in encrypted images , 2018, Signal Process..

[18]  William Puech,et al.  An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images , 2018, IEEE Transactions on Information Forensics and Security.

[19]  Eko Hari Rachmawanto,et al.  A secure image watermarking using Chinese remainder theorem based on haar wavelet transform , 2017, 2017 4th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE).

[20]  Egia Rosi Subhiyakto,et al.  Imperceptible image watermarking based on Chinese remainder theorem over the edges , 2017, 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI).

[21]  Jeng-Shyang Pan,et al.  Optimal PPVO-based reversible data hiding , 2017, J. Vis. Commun. Image Represent..

[22]  Rajendra Bharti,et al.  Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography , 2017, RICE.

[23]  Xing Zhang,et al.  Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting , 2017, IEEE Transactions on Cybernetics.

[24]  Jiwu Huang,et al.  New Framework for Reversible Data Hiding in Encrypted Domain , 2016, IEEE Transactions on Information Forensics and Security.

[25]  Bin Ma,et al.  Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.

[26]  Ioan-Catalin Dragoi,et al.  Adaptive Pairing Reversible Watermarking , 2016, IEEE Transactions on Image Processing.

[27]  Alan Anwer Abdulla,et al.  Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography , 2015 .

[28]  Pei-Yu Lin,et al.  Double Verification Secret Sharing Mechanism Based on Adaptive Pixel Pair Matching , 2015, ACM Trans. Multim. Comput. Commun. Appl..

[29]  Ioan-Catalin Dragoi,et al.  On Local Prediction Based Reversible Watermarking , 2015, IEEE Transactions on Image Processing.

[30]  Umari,et al.  A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification , 2013, IEEE Transactions on Information Forensics and Security.

[31]  Gwoboa Horng,et al.  Encrypted signal-based reversible data hiding with public key cryptosystem , 2014, J. Vis. Commun. Image Represent..

[32]  Junxing Zhang,et al.  A digital watermarking algorithm based on Chinese remainder theorem , 2014, 2014 10th International Conference on Communications (COMM).

[33]  Harin Sellahewa,et al.  Steganography based on pixel intensity value decomposition , 2014, Sensing Technologies + Applications.

[34]  Ioan-Catalin Dragoi,et al.  Local-Prediction-Based Difference Expansion Reversible Watermarking , 2014, IEEE Transactions on Image Processing.

[35]  Rajat Subhra Chakraborty,et al.  A generalized tamper localization approach for reversible watermarking algorithms , 2013, TOMCCAP.

[36]  Bin Li,et al.  General Framework to Histogram-Shifting-Based Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[37]  Yookun Cho,et al.  A robust steganography-based software watermarking , 2012, RACS.

[38]  Ioan-Catalin Dragoi,et al.  Improved rhombus interpolation for reversible watermarking by difference expansion , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[39]  Dinu Coltuc,et al.  Improved Embedding for Prediction-Based Reversible Watermarking , 2011, IEEE Transactions on Information Forensics and Security.

[40]  Xuelong Li,et al.  Lossless Data Embedding Using Generalized Statistical Quantity Histogram , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[41]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[42]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[43]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[44]  Jeffrey J. Rodríguez,et al.  Prediction-error based reversible watermarking , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[45]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[46]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[47]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.