Reversible Data Hiding in Encrypted Images Based on Chaotic Logistic Map and Median Edge Detector
Keywords:
Encrypted images, Huffman coding, Reversible data hiding, Secure compression, Encryption, Chaotic mapAbstract
The approach, called reversible data hiding in the encrypted image(RDH-EI), could be suitable for directly embedding more data in the encrypted domain without interfere on users' right to privacy. In this study, we present a completely new method for RDH-EI that uses the MED (Mean average Edge Detector) and the 2’s complement algorithm. The Mean average Edge Detector prediction technique is used to construct the predicted values for the original pixels and quantify the prediction errors. A label is placed in the pixels to indicate the two's complement so that space can be reserved. Creating a label map and embedding it into the image to record the unidentified pixels is necessary. After completing the symmetric encryption, the picture could be included in the data. This paper talks about a way to encrypt and decrypt images using key sequences that are made up of sequences of logistic mappings and sequences of the states of LFSR. The results of the tests indicate not only that the embedding payload has been improved but also that the data hiding can be reliably retrieved and that the cover image can be recovered in its entirety and in good condition. In addition, the test results show that the embedding payload has been improved. We evalauted the suggested method in terms of embedded rate (ER), the MSE (Mean Square Error ), and the entropy.
Downloads
References
Zheng, Peijia& Huang, Jiwu. (2011). Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain. MM'11 - Proceedings of the 2011 ACM Multimedia Conference and Co-Located Workshops. 413-422. 10.1145/2072298.2072352.
Xiang, S.-J & Luo, X.-R & Shi, S.-X. (2016). A novel reversible image watermarking algorithm in homomorphic encrypted domain. 39. 571-581. 10.11897/SP.J.1016.2016.00571.
Zhou, Jun & Cao, Zhenfu& Dong, Xiaolei& Choo, Kim-Kwang Raymond. (2019). Efficient Privacy-preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain. IEEE Transactions on Cloud Computing. PP. 1-1. 10.1109/TCC.2019.2948012.
Bellafqira, Reda &Coatrieux, Gouenou & Bouslimi, Dalel&Quellec, Gwenole. (2015). Content-based image retrieval in homomorphic encryption domain. Conference proceedings: ... Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Conference. 2015. 2944-2947. 10.1109/EMBC.2015.7319009.
Yi, Shuang & Zhou, Yicong. (2015). An improved reversible data hiding in encrypted images. 225-229.
1109/ChinaSIP.2015.7230396.
Xiaolin, Yi & Nanzhong, Chen &Zhigang, Jia & Xiaobo, Chen. (2010). Trusted Communication System Based on RSA Authentication. 329 - 332. 10.1109/ETCS.2010.460.
Puangpronpitag, Somnuk & Kasabai, Piyawad & Pansa, Detchasit. (2012). An enhancement of the SDP Security Description (SDES) for key protection. 1-4. 10.1109/ECTICon.2012.6254320.
LeMay, Michael &Rakshit, Joydeep& Deutsch, Sergej& Durham, David & Ghosh, Santosh & Nori, Anant & Gaur, Jayesh &Weiler, Andrew & Sultana, Salmin& Grewal, Karanvir & Subra money, Sreenivas. (2021). Cryptographic Capability Computing. 253-267.
1145/3466752.3480076.
Huang, Jianzhe. (2012). Analytical dynamics of period-m flows and chaos in nonlinear systems. Int J Bifurcat Chaos 22. Article.
Mbewe, Phyela & Asare, Sampson. (2017). Analysis and comparison of adaptive huffman coding and arithmetic coding algorithms. 178-185. 10.1109/FSKD.2017.8393036.
Hong, W.; Chen, T.S.; Wu, H.Y. An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 2012, 19, 199–202.
Zhang, W.; Ma, K.; Yu, N. Reversibility improved data hiding in encrypted images. Signal Process. 2014, 953, 118–127.
Hong, W.; Chen, T.S.; Wu, H.Y. An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 2012, 19, 199–202.
Mathew, T.; Wilscy, M. Reversible data hiding in encrypted images by active block exchange and room reservation. In Proceedings of the 2014 International Conference on Contemporary Computing and Informatics, Mysore, India, 27–29 November 2014;pp. 839–844.
Wu, Y.; Xiang, Y.; Guo, Y.; Tang, J.; Yin, Z. An improved reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans. Multimed. 2020, 22, 1929–1938.
Liu, Ya& Feng, Guangdong & Qin, Chuan& Lu, Haining& Chang, Chin-Chen. (2021). High-Capacity Reversible Data Hiding in Encrypted Images Based on Hierarchical Quad-Tree Coding and Multi-MSB Prediction. Electronics. 10. 664. 10.3390/electronics10060664.
Wang, Dewang & Zhang, Xianquan& Yu, Chunqiang & Tang, Zhenjun. (2020). Reversible Data Hiding in Encrypted Image Based on Multi-MSB Embedding Strategy. Applied Sciences. 10. 2058. 10.3390/app10062058.
Xu, Na & Tang, Jin& Bin, Luo & Yin, Zhaoxia. (2021). Separable Reversible Data Hiding Based on Integer Mapping and MSB Prediction for Encrypted 3D Mesh Models. Cognitive Computation. 10.1007/s12559-021-09919-5.
Zhang, Huiqi& Li, Lin & Li, Qingyan. (2021). Reversible Data Hiding in Encrypted Images Based on Block-Wise Multi-Predictor. IEEE Access. PP. 1-1.
1109/ACCESS.2021.3072376.
Chen, Chih-Cheng & Chang, Chin-Chen & Chen, Kaimeng. (2021). High-capacity Reversible Data Hiding in Encrypted Image Based on Huffman Coding and Differences of High Nibbles of Pixels. Journal of Visual Communication and Image Representation. 76. 103060. 10.1016/j.jvcir.2021.103060.
Yin, Zhaoxia& Xiang, Youzhi& Zhang, Xinpeng. (2019). Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding. IEEE Transactions on Multimedia. PP. 1-1.
1109/TMM.2019.2936314.
Renato Costa, Deep Reinforcement Learning for Autonomous Robotics , Machine Learning Applications Conference Proceedings, Vol 2 2022.
White, M., Hall, K., López, A., Muñoz, S., & Flores, A. Predictive Maintenance in Manufacturing: A Machine Learning Perspective. Kuwait Journal of Machine Learning, 1(4). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/154
Timande, S., & Dhabliya, D. (2019). Designing multi-cloud server for scalable and secure sharing over web. International Journal of Psychosocial Rehabilitation, 23(5), 835-841. doi:10.37200/IJPR/V23I5/PR190698
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.