scholarly journals A Reversible Data Hiding Scheme in Encrypted Images for Medical Applications

Author(s):  
Dr. Rohith S ◽  
Harish V

Storage and exchange of data of the patient images are common in medical applications. To protect the information of the patient and to avoid miss handling of the patient information data hiding scheme is very much essential. Reversible Data Hiding (RDH) scheme is one such scheme paid more attention to hide the data in encrypted images, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image content’s confidentiality. In this paper initially space is reserved from the encrypted images, which may be used to embed the information later stage. Histogram shifting based Reversible Data Hiding scheme used to reserve the room before encryption process. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error. Experiments show that this novel method and achieves better perceptual quality.

2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Dawen Xu ◽  
Kai Chen ◽  
Rangding Wang ◽  
Shubing Su

An efficient method of completely separable reversible data hiding in encrypted images is proposed. The cover image is first partitioned into nonoverlapping blocks and specific encryption is applied to obtain the encrypted image. Then, image difference in the encrypted domain can be calculated based on the homomorphic property of the cryptosystem. The data hider, who does not know the original image content, may reversibly embed secret data into image difference based on two-dimensional difference histogram modification. Data extraction is completely separable from image decryption; that is, data extraction can be done either in the encrypted domain or in the decrypted domain, so that it can be applied to different application scenarios. In addition, data extraction and image recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.


2021 ◽  
Vol 7 (12) ◽  
pp. 268
Author(s):  
Ryota Motomura ◽  
Shoko Imaizumi ◽  
Hitoshi Kiya

In this paper, we propose a new framework for reversible data hiding in encrypted images, where both the hiding capacity and lossless compression efficiency are flexibly controlled. There exist two main purposes; one is to provide highly efficient lossless compression under a required hiding capacity, while the other is to enable us to extract an embedded payload from a decrypted image. The proposed method can decrypt marked encrypted images without data extraction and derive marked images. An original image is arbitrarily divided into two regions. Two different methods for reversible data hiding in encrypted images (RDH-EI) are used in our method, and each one is used for either region. Consequently, one region can be decrypted without data extraction and also losslessly compressed using image coding standards even after the processing. The other region possesses a significantly high hiding rate, around 1 bpp. Experimental results show the effectiveness of the proposed method in terms of hiding capacity and lossless compression efficiency.


2014 ◽  
Vol 6 (3) ◽  
pp. 16-29
Author(s):  
Xiyu Han ◽  
Zhenxing Qian ◽  
Guorui Feng ◽  
Xinpeng Zhang

This paper proposes a novel method for data hiding in encrypted image using image interpolation. Before the image encryption, the original image is sampled and an interpolation algorithm is used to calculate an estimation of the original image. Errors between the original image and the estimated image are compressed by Huffman encoding, which are further embedded into the estimated image to generate the redundant room. After image encryption using an encryption key, the secret bits are embedded into the reserved room. On the receiver side, the hidden bits can be extracted and the original content of the image can be perfectly recovered. Compared with the published results, the proposed method provides a larger embedding payload.


Electronics ◽  
2021 ◽  
Vol 10 (6) ◽  
pp. 664
Author(s):  
Ya Liu ◽  
Guangdong Feng ◽  
Chuan Qin ◽  
Haining Lu ◽  
Chin-Chen Chang

Nowadays, more and more researchers are interested in reversible data hiding in encrypted images (RDHEI), which can be applied in privacy protection and cloud storage. In this paper, a new RDHEI method on the basis of hierarchical quad-tree coding and multi-MSB (most significant bit) prediction is proposed. The content owner performs pixel prediction to obtain a prediction error image and explores the maximum embedding capacity of the prediction error image by hierarchical quad-tree coding before image encryption. According to the marked bits of vacated room capacity, the data hider can embed additional data into the room-vacated image without knowing the content of original image. Through the data hiding key and the encryption key, the legal receiver is able to conduct data extraction and image recovery separately. Experimental results show that the average embedding rates of the proposed method can separately reach 3.504 bpp (bits per pixel), 3.394 bpp, and 2.746 bpp on three well-known databases, BOSSBase, BOWS-2, and UCID, which are higher than some state-of-the-art methods.


In today’s technology data hiding has become an essential need due to the availability of the internet all over the world. Nowadays, it has become necessary task for the people to communicate through networks and share contents with each other. In the meanwhile, transferring the data in a secured manner has become a challenge and also a paradigm. Still there exists many ways for hiding the data in an encrypted images. Hiding information at the back end of the image should not affect the original data or image pixels. It is one type of steganographical method where the data can be hidden inside the images and original data can be losslessly retrieved after extracting the embedded text.The proposed work discusses encryption using reversible data hiding and produces an outlineof various reversible data hiding techniques which includes quantization technique, histogram shifting, expansion technique, compression technique anddual image technique


2021 ◽  
Vol 22 (2) ◽  
Author(s):  
V. M. Manikandan

The research in the domain of reversible data hiding got much attention in recent years due to its wide applications in medical image transmission and cloud computing.  Reversible data hiding during image encryption is a recently emerged framework for hiding secret data into an image during the image encryption process. In this manuscript, we propose a new reversible data hiding through encryption scheme which will ensure a high embedding rate without bringing any additional overhead of key handling. The proposed algorithm can use any secure symmetric encryption scheme, and the encryption and/or decryption key should be shared with the receiver for data extraction and image recovery. As per the proposed scheme, the data hider can hide three-bits of secret message in an image block of size $B\times B$ pixels. The data extraction image recovery will be carried out by analyzing the closeness between adjacent pixels. The simulation of the new scheme on the USC-SIPI dataset shows that the proposed scheme outperforms the well-known existing schemes in embedding rate and bit error rate.


Entropy ◽  
2021 ◽  
Vol 23 (7) ◽  
pp. 790
Author(s):  
Lin Li ◽  
Chin-Chen Chang ◽  
Chia-Chen Lin

With the development of cloud storage and privacy protection, reversible data hiding in encrypted images (RDHEI) plays the dual role of privacy protection and secret information transmission. RDHEI has a good application prospect and practical value. The current RDHEI algorithms still have room for improvement in terms of hiding capacity, security and separability. Based on (7, 4) Hamming Code and our proposed prediction/ detection functions, this paper proposes a Hamming Code and UnitSmooth detection based RDHEI scheme, called HUD-RDHEI scheme for short. To prove our performance, two database sets—BOWS-2 and BOSSBase—have been used in the experiments, and peak signal to noise ratio (PSNR) and pure embedding rate (ER) are served as criteria to evaluate the performance on image quality and hiding capacity. Experimental results confirm that the average pure ER with our proposed scheme is up to 2.556 bpp and 2.530 bpp under BOSSBase and BOWS-2, respectively. At the same time, security and separability is guaranteed. Moreover, there are no incorrect extracted bits during data extraction phase and the visual quality of directly decrypted image is exactly the same as the cover image.


Sign in / Sign up

Export Citation Format

Share Document