scholarly journals Secure Data Hiding using Reversible Image Transformation

In today’s era, the large amount of data’s are stored in cloud. But nowadays securely storing data to the cloud is an important task. But the unauthorized parties are tries to decrypt the data from the cloud. So, the data stored in cloud should be secure from any malicious activities. Based on these requests, we propose a framework named reversible data hiding (RDH). It mainly works on encrypted images based on reversible image transformation (RIT). The server insert data into the cloud. On that time, he will add some additional information for the protection of data. In the given framework, the original data can be embedded in another image named carrier image with equal size. So, the hacker tries to pullout the data, he will only get the carrier image. So we can accommodate more data’s into a single storage space. The method picks the data to be hide and a carrier image with equal size. The cover image is embedded into the original image based on the LSB insertion algorithm. i.e., the original data’s are dissolved into the carrier image using a secret hiding key. The cover image is encrypted using blow fish encryption algorithm. It includes normal RDH method and RDH with RIT. Using RIT, it gives high visual quality and security. The technique is mainly used in medical imagery, military imagery for reliable data storage.

Information ◽  
2019 ◽  
Vol 10 (1) ◽  
pp. 17 ◽  
Author(s):  
Haidong Zhong ◽  
Xianyi Chen ◽  
Qinglong Tian

Recently, reversible image transformation (RIT) technology has attracted considerable attention because it is able not only to generate stego-images that look similar to target images of the same size, but also to recover the secret image losslessly. Therefore, it is very useful in image privacy protection and reversible data hiding in encrypted images. However, the amount of accessorial information, for recording the transformation parameters, is very large in the traditional RIT method, which results in an abrupt degradation of the stego-image quality. In this paper, an improved RIT method for reducing the auxiliary information is proposed. Firstly, we divide secret and target images into non-overlapping blocks, and classify these blocks into K classes by using the K-means clustering method. Secondly, we match blocks in the last (K-T)-classes using the traditional RIT method for a threshold T, in which the secret and target blocks are paired with the same compound index. Thirdly, the accessorial information (AI) produced by the matching can be represented as a secret segment, and the secret segment can be hided by patching blocks in the first T-classes. Experimental results show that the proposed strategy can reduce the AI and improve the stego-image quality effectively.


2018 ◽  
Vol 10 (2) ◽  
pp. 1-22 ◽  
Author(s):  
Kai Chen ◽  
Dawen Xu

Reversible data hiding in the encrypted domain is an emerging technology, as it can preserve the confidentiality. In this article, an efficient method of reversible data hiding in encrypted images is proposed. The cover image is first partitioned into non-overlapping blocks. A specific modulo addition operation and block-scrambling operation are applied to obtain the encrypted image. The data-hider, who does not know the original image content, may reversibly embed secret data based on the homomorphic property of the cryptosystem. A scale factor is utilized for selecting embedding zone, which is scalable for different capacity requirements. At the receiving end, the additional data can be extracted if the receiver has the data-hiding key only. If the receiver has the encryption key only, he/she can recover the original image approximately. If the receiver has both the data-hiding key and the encryption key, he can extract the additional data and recover the original content without any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.


In today’s technology data hiding has become an essential need due to the availability of the internet all over the world. Nowadays, it has become necessary task for the people to communicate through networks and share contents with each other. In the meanwhile, transferring the data in a secured manner has become a challenge and also a paradigm. Still there exists many ways for hiding the data in an encrypted images. Hiding information at the back end of the image should not affect the original data or image pixels. It is one type of steganographical method where the data can be hidden inside the images and original data can be losslessly retrieved after extracting the embedded text.The proposed work discusses encryption using reversible data hiding and produces an outlineof various reversible data hiding techniques which includes quantization technique, histogram shifting, expansion technique, compression technique anddual image technique


2017 ◽  
Author(s):  
Andysah Putera Utama Siahaan

In BPCS Steganography, data hiding will be split into blocks that have a high complexity where the blocks are categorized into informative and noise-like regions. A noise-like region is a bit-plane that has the greatest probability as a data hiding since it has a high complexity. In this region, the data inserted is vulnerable to attack. Someone can easily take a series of characters that are stored on a noise-like region previously if the system is not modified. Improving the bit-plane composition is to increase data security. Bit-plane will be combined with a specified key. The key should be changed to bit-plane form as well. The key that has already been turned into the bit-plane will be mated with the original data. Using an exclusive-or of this part is the best way to produce the cipher bit-plane. Finally, the data residing on the cover image produced have a high-security level.


2019 ◽  
Vol 8 (4) ◽  
pp. 11473-11478

In recent days, for sending secret messages, we require secure internet. Image steganography is considered as the eminent tool for data hiding which provides better security for the data transmitted over internet. In the proposed work, the payload data is embedded using improved LSB-mapping technique. In this approach, two bits from each pixel of carrier image are considered for mapping and addition. Two bits of payload data can be embedded in one cover image pixel hence enhanced the hiding capacity. A logical function on addition is applied on 1st and 2nd bits of cover image pixel, and a mapping table is constructed which gives solution for data hiding and extraction. Simple addition function on stego pixel is performed to extract payload data hence increases the recovery speed. Here the secret data is not directly embedded but instead mapped and added with a number using modulo-4 strategy. Hence the payload data hidden using proposed approach provide more security and it can resist against regular LSB decoding approaches. The proposed work is implemented and tested for several gray scale as well as color images and compared with respect to parameters like peak signal to noise ratio and MSE. The proposed technique gives better results when compared and histogram of cover and stego images are also compared.


Symmetry ◽  
2019 ◽  
Vol 11 (1) ◽  
pp. 51 ◽  
Author(s):  
Kaimeng Chen ◽  
Chin-Chen Chang

In this paper, a novel, real-time, error-free, reversible data hiding method for encrypted images has been proposed. Based on the (7, 4) Hamming code, we designed an efficient encoding scheme to embed secret data into the least significant bits (LSBs) of the encrypted image. For reversibility, we designed a most significant bit (MSB) prediction scheme that can recover a portion of the modified MSBs after the image is decrypted. These MSBs can be modified to accommodate the additional information that is used to recover the LSBs. After embedding the data, the original image can be recovered with no error and the secret data can be extracted from both the encrypted image and the decrypted image. The experimental results proved that compared with existing methods, the proposed method can achieve higher embedding rate, better quality of the marked image and less execution time of data embedding. Therefore, the proposed method is suitable for real-time applications in the cloud.


2020 ◽  
Vol 9 (1) ◽  
pp. 1388-1390

For encrypted images (RDHEI) reversible data shielding is an important technique for embedding data into the encrypted domain. A hidden key encrypts an original picture, and additional information may be inserted into the encrypted image during or after transmission without knowing the crypting key or the original contents of the picture. The hidden message can be retrieved during the decoding process and the original image can be restored. RDHEI has begun to generate academic attention over the past couple of years. Data privacy has become a real issue with the growth of cloud computing. None of the current methods, however, will allow us to hide a great deal of information reversibly. In this document we propose a new reversible approach with a very high capacity based on MSB (most important bit) forecasting. We present two approaches: a reversible high-capacity data hiding approach with a prediction-correction error (CPEHCRDH) and an integrated-prediction error (EPE-HCRDH) reversible data hiding approach. With this approach, our findings are better than those achieved with the existing state-of-the-art approaches, both in terms of image quality recovered and embedding efficiency.


Symmetry ◽  
2021 ◽  
Vol 13 (12) ◽  
pp. 2438
Author(s):  
Chwei-Shyong Tsai ◽  
Hsien-Chu Wu ◽  
Yu-Wen Li ◽  
Josh Jia-Ching Ying

With the rapid development of information technology, the transmission of information has become convenient. In order to prevent the leakage of information, information security should be valued. Therefore, the data hiding technique has become a popular solution. The reversible data hiding technique (RDH) in particular uses symmetric encoding and decoding algorithms to embed the data into the cover carrier. Not only can the secret data be transmitted without being detected and retrieved completely, but the cover carrier also can be recovered without distortion. Moreover, the encryption technique can protect the carrier and the hidden data. However, the encrypted carrier is a form of ciphertext, which has a strong probability to attract the attention of potential attackers. Thus, this paper uses the generative adversarial networks (GAN) to generate meaningful encrypted images for RDH. A four-stage network architecture is designed for the experiment, including the hiding network, the encryption/decryption network, the extractor, and the recovery network. In the hiding network, the secret data are embedded into the cover image through residual learning. In the encryption/decryption network, the cover image is encrypted into a meaningful image, called the marked image, through GMEI-GAN, and then the marked image is restored to the decrypted image via the same architecture. In the extractor, 100% of the secret data are extracted through the residual learning framework, same as the hiding network. Lastly, in the recovery network, the cover image is reconstructed with the decrypted image and the retrieved secret data through the convolutional neural network. The experimental results show that using the PSNR/SSIM as the criteria, the stego image reaches 45.09 dB/0.9936 and the marked image achieves 38.57 dB/0.9654. The proposed method not only increases the embedding capacity but also maintains high image quality in the stego images and marked images.


2016 ◽  
Vol 18 (8) ◽  
pp. 1469-1479 ◽  
Author(s):  
Weiming Zhang ◽  
Hui Wang ◽  
Dongdong Hou ◽  
Nenghai Yu

Sign in / Sign up

Export Citation Format

Share Document