Reversible data hiding method based on pixel expansion and homomorphic encryption
Autor: | John Bosco Balaguru Rayappan, R. Anushiadevi, Rengarajan Amirtharajan, Padmapriya Praveenkumar |
---|---|
Rok vydání: | 2020 |
Předmět: |
Statistics and Probability
Pixel Artificial Intelligence Computer science Information hiding ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION 0202 electrical engineering electronic engineering information engineering General Engineering Homomorphic encryption 020206 networking & telecommunications 020201 artificial intelligence & image processing 02 engineering and technology Algorithm |
Zdroj: | Journal of Intelligent & Fuzzy Systems. 39:2977-2990 |
ISSN: | 1875-8967 1064-1246 |
DOI: | 10.3233/jifs-191478 |
Popis: | Digital image steganography algorithms usually suffer from a lossy restoration of the cover content after extraction of a secret message. When a cover object and confidential information are both utilised, the reversible property of the cover is inevitable. With this objective, several reversible data hiding (RDH) algorithms are available in the literature. Conversely, because both are diametrically related parameters, existing RDH algorithms focus on either a good embedding capacity (EC) or better stego-image quality. In this paper, a pixel expansion reversible data hiding (PE-RDH) method with a high EC and good stego-image quality are proposed. The proposed PE-RDH method was based on three typical RDH schemes, namely difference expansion, histogram shifting, and pixel value ordering. The PE-RDH method has an average EC of 0.75 bpp, with an average peak signal-to-noise ratio (PSNR) of 30.89 dB. It offers 100% recovery of the original image and confidential hidden messages. To protect secret as well as cover the proposed PE-RDH is also implemented on the encrypted image by using homomorphic encryption. The strength of the proposed method on the encrypted image was verified based on a comparison with several existing methods, and the approach achieved better results than these methods in terms of its EC, location map size and imperceptibility of directly decrypted images. |
Databáze: | OpenAIRE |
Externí odkaz: | |
Nepřihlášeným uživatelům se plný text nezobrazuje | K zobrazení výsledku je třeba se přihlásit. |