Affiliation:
1. School of Computing, SASTRA Deemed University, Thirumalaisamudram, Thanjavur, India
2. School of Electrical & Electronics Engineering (SEEE), SASTRA Deemed University, Thirumalaisamudram, Thanjavur, India
Abstract
Reversible Data Hiding (RDH) schemes have recently gained much interest in protecting the secret information and sensitive cover images. For cloud security applications, the third party’s data embedding can be done (e.g., cloud service). In such a scenario, to protect the cover image from unauthorized access, it is essential to encrypt before embedding it. It can be overcome by combining the RDH scheme with encryption. However, the key challenge in integrating RDH with encryption is that the correlation between adjacent pixels begins to disappear after encryption, so reversibility cannot be accomplished. RDH with elliptic curve cryptography is proposed to overcome this challenge. In this paper (ECC-RDH) by adopting additive homomorphism property; the proposed method, the stego image decryption gives the sum of the original image and confidential data. The significant advantages of this method are, the cover image is transferred with high security, the embedding capacity is 0.5 bpp with a smaller location map size of 0.05 bpp. The recovered image and secrets are the same as in the original, and thus 100% reversibility is proved.
Subject
Artificial Intelligence,General Engineering,Statistics and Probability
Reference28 articles.
1. Data embedding in digital images using critical functions;Liao;Signal Process Image Commun,2017
2. Liao X. , Yu Y. , Li B. , Li Z. , Qin Z. , A new payload partition strategy in color image steganography, IEEE Trans Circuits Syst Video Technol (2019).
3. Honsinger C.W. , Jones P.W. , Rabbani M. , Stoffel J.C. , Lossless recovery of an original image containing embedded data, Google Patents (2001).
4. Lossless data embedding-new paradigm in digital watermarking;Fridrich;EURASIP J Adv Signal Process,2002
5. Reversible data hiding;Celik;Proceedings of the IEEE International Conference on Image Processing,2002
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献