Reversible Data Hiding in Encrypted Images Based on Chaotic Logistic Map and Median Edge Detector

Authors

  • Bethala Shirisha Research Scholar, JNTU Hyderabad
  • V. Kamakshi Prasad Professor, JNTU Hyderabad

Keywords:

Encrypted images, Huffman coding, Reversible data hiding, Secure compression, Encryption, Chaotic map

Abstract

The approach, called reversible data hiding in the encrypted image(RDH-EI), could be suitable for directly embedding more data in the encrypted domain without interfere on users' right to privacy. In this study, we present a completely new method for RDH-EI that uses the MED (Mean average Edge Detector)  and the 2’s complement algorithm. The Mean average Edge Detector prediction technique is used to construct the predicted values for the original pixels and quantify the prediction errors. A label is placed in the pixels to indicate the two's complement so that space can be reserved. Creating a label map and embedding it into the image to record the unidentified pixels is necessary. After completing the symmetric encryption, the picture could be included in the data. This paper talks about a way to encrypt and decrypt images using key sequences that are made up of sequences of logistic mappings and sequences of the states of LFSR. The results of the tests indicate not only that the embedding payload has been improved but also that the data hiding can be reliably retrieved and that the cover image can be recovered in its entirety and in good condition. In addition, the test results show that the embedding payload has been improved. We evalauted the suggested method in terms of embedded rate (ER), the MSE (Mean Square Error ), and the entropy.

Downloads

Download data is not yet available.

References

Zheng, Peijia& Huang, Jiwu. (2011). Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain. MM'11 - Proceedings of the 2011 ACM Multimedia Conference and Co-Located Workshops. 413-422. 10.1145/2072298.2072352.

Xiang, S.-J & Luo, X.-R & Shi, S.-X. (2016). A novel reversible image watermarking algorithm in homomorphic encrypted domain. 39. 571-581. 10.11897/SP.J.1016.2016.00571.

Zhou, Jun & Cao, Zhenfu& Dong, Xiaolei& Choo, Kim-Kwang Raymond. (2019). Efficient Privacy-preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain. IEEE Transactions on Cloud Computing. PP. 1-1. 10.1109/TCC.2019.2948012.

Bellafqira, Reda &Coatrieux, Gouenou & Bouslimi, Dalel&Quellec, Gwenole. (2015). Content-based image retrieval in homomorphic encryption domain. Conference proceedings: ... Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Conference. 2015. 2944-2947. 10.1109/EMBC.2015.7319009.

Yi, Shuang & Zhou, Yicong. (2015). An improved reversible data hiding in encrypted images. 225-229.

1109/ChinaSIP.2015.7230396.

Xiaolin, Yi & Nanzhong, Chen &Zhigang, Jia & Xiaobo, Chen. (2010). Trusted Communication System Based on RSA Authentication. 329 - 332. 10.1109/ETCS.2010.460.

Puangpronpitag, Somnuk & Kasabai, Piyawad & Pansa, Detchasit. (2012). An enhancement of the SDP Security Description (SDES) for key protection. 1-4. 10.1109/ECTICon.2012.6254320.

LeMay, Michael &Rakshit, Joydeep& Deutsch, Sergej& Durham, David & Ghosh, Santosh & Nori, Anant & Gaur, Jayesh &Weiler, Andrew & Sultana, Salmin& Grewal, Karanvir & Subra money, Sreenivas. (2021). Cryptographic Capability Computing. 253-267.

1145/3466752.3480076.

Huang, Jianzhe. (2012). Analytical dynamics of period-m flows and chaos in nonlinear systems. Int J Bifurcat Chaos 22. Article.

Mbewe, Phyela & Asare, Sampson. (2017). Analysis and comparison of adaptive huffman coding and arithmetic coding algorithms. 178-185. 10.1109/FSKD.2017.8393036.

Hong, W.; Chen, T.S.; Wu, H.Y. An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 2012, 19, 199–202.

Zhang, W.; Ma, K.; Yu, N. Reversibility improved data hiding in encrypted images. Signal Process. 2014, 953, 118–127.

Hong, W.; Chen, T.S.; Wu, H.Y. An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 2012, 19, 199–202.

Mathew, T.; Wilscy, M. Reversible data hiding in encrypted images by active block exchange and room reservation. In Proceedings of the 2014 International Conference on Contemporary Computing and Informatics, Mysore, India, 27–29 November 2014;pp. 839–844.

Wu, Y.; Xiang, Y.; Guo, Y.; Tang, J.; Yin, Z. An improved reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans. Multimed. 2020, 22, 1929–1938.

Liu, Ya& Feng, Guangdong & Qin, Chuan& Lu, Haining& Chang, Chin-Chen. (2021). High-Capacity Reversible Data Hiding in Encrypted Images Based on Hierarchical Quad-Tree Coding and Multi-MSB Prediction. Electronics. 10. 664. 10.3390/electronics10060664.

Wang, Dewang & Zhang, Xianquan& Yu, Chunqiang & Tang, Zhenjun. (2020). Reversible Data Hiding in Encrypted Image Based on Multi-MSB Embedding Strategy. Applied Sciences. 10. 2058. 10.3390/app10062058.

Xu, Na & Tang, Jin& Bin, Luo & Yin, Zhaoxia. (2021). Separable Reversible Data Hiding Based on Integer Mapping and MSB Prediction for Encrypted 3D Mesh Models. Cognitive Computation. 10.1007/s12559-021-09919-5.

Zhang, Huiqi& Li, Lin & Li, Qingyan. (2021). Reversible Data Hiding in Encrypted Images Based on Block-Wise Multi-Predictor. IEEE Access. PP. 1-1.

1109/ACCESS.2021.3072376.

Chen, Chih-Cheng & Chang, Chin-Chen & Chen, Kaimeng. (2021). High-capacity Reversible Data Hiding in Encrypted Image Based on Huffman Coding and Differences of High Nibbles of Pixels. Journal of Visual Communication and Image Representation. 76. 103060. 10.1016/j.jvcir.2021.103060.

Yin, Zhaoxia& Xiang, Youzhi& Zhang, Xinpeng. (2019). Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding. IEEE Transactions on Multimedia. PP. 1-1.

1109/TMM.2019.2936314.

Renato Costa, Deep Reinforcement Learning for Autonomous Robotics , Machine Learning Applications Conference Proceedings, Vol 2 2022.

White, M., Hall, K., López, A., Muñoz, S., & Flores, A. Predictive Maintenance in Manufacturing: A Machine Learning Perspective. Kuwait Journal of Machine Learning, 1(4). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/154

Timande, S., & Dhabliya, D. (2019). Designing multi-cloud server for scalable and secure sharing over web. International Journal of Psychosocial Rehabilitation, 23(5), 835-841. doi:10.37200/IJPR/V23I5/PR190698

Downloads

Published

16.08.2023

How to Cite

Shirisha, B. ., & Prasad, V. K. . (2023). Reversible Data Hiding in Encrypted Images Based on Chaotic Logistic Map and Median Edge Detector. International Journal of Intelligent Systems and Applications in Engineering, 11(10s), 233–245. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3247

Issue

Section

Research Article