| Literature DB >> 33267339 |
Jingxuan Li1, Xingyuan Liang1, Ceyu Dai1, Shijun Xiang1.
Abstract
This paper proposes a reversible data hiding scheme by exploiting the DGHV fully homomorphic encryption, and analyzes the feasibility of the scheme for data hiding from the perspective of information entropy. In the proposed algorithm, additional data can be embedded directly into a DGHV fully homomorphic encrypted image without any preprocessing. On the sending side, by using two encrypted pixels as a group, a data hider can get the difference of two pixels in a group. Additional data can be embedded into the encrypted image by shifting the histogram of the differences with the fully homomorphic property. On the receiver side, a legal user can extract the additional data by getting the difference histogram, and the original image can be restored by using modular arithmetic. Besides, the additional data can be extracted after decryption while the original image can be restored. Compared with the previous two typical algorithms, the proposed scheme can effectively avoid preprocessing operations before encryption and can successfully embed and extract additional data in the encrypted domain. The extensive testing results on the standard images have certified the effectiveness of the proposed scheme.Entities:
Keywords: DGHV; cloud computing; information entropy; public key cryptosystem; reversible data hiding
Year: 2019 PMID: 33267339 PMCID: PMC7515117 DOI: 10.3390/e21070625
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
Figure 1Sketch of the proposed reversible data hiding scheme with public key cryptography.
Figure 2Embedding additional information by shifting the histogram: (a) histogram of the differences before embedding; (b) shifting the difference histogram to free up embedding space; and (c) histogram after embedding the additional information.
Computational cost for different embedded bits.
| Picture | Embedded Data Bits | Time (s) | |||||
|---|---|---|---|---|---|---|---|
| Encryption | Embed | Extraction (Encrypted Domain) | Extraction (Plaintext Domain) | Decryption (Embedded Image) | Decryption (Original Image) | ||
| Lena | 1024 | 1.5094 | 0.0309 | 0.0270 | 0.0264 | 0.0019 | 0.0019 |
| Airplane | 1.5095 | 0.0460 | 0.0388 | 0.0395 | 0.0021 | 0.0020 | |
| Lake | 1.5102 | 0.0737 | 0.0638 | 0.0639 | 0.0019 | 0.0020 | |
| Man | 1.5065 | 0.0455 | 0.0387 | 0.0398 | 0.0019 | 0.0019 | |
| Lena | 2048 | 1.5103 | 0.0443 | 0.0395 | 0.0399 | 0.0021 | 0.0020 |
| Airplane | 1.5078 | 0.0584 | 0.0505 | 0.0520 | 0.0019 | 0.0019 | |
| Lake | 1.4905 | 0.0875 | 0.0724 | 0.0753 | 0.0019 | 0.0019 | |
| Man | 1.5257 | 0.0636 | 0.0552 | 0.0566 | 0.0018 | 0.0018 | |
| Lena | 4096 | 1.5106 | 0.0707 | 0.0648 | 0.0667 | 0.0018 | 0.0019 |
| Airplane | 1.5125 | 0.0795 | 0.0730 | 0.0740 | 0.0019 | 0.0020 | |
| Lake | 1.5231 | 0.1244 | 0.1078 | 0.1128 | 0.0019 | 0.0019 | |
| Man | 1.5261 | 0.0960 | 0.0879 | 0.0907 | 0.0021 | 0.0019 |
Computational cost with the Lena image with different sizes and embedded rates.
| Size | Embedded Data Bits | Time (s) | |||||
|---|---|---|---|---|---|---|---|
| Encryption | Embed | Extraction (Encrypted Domain) | Extraction (Plaintext Domain) | Decryption (Embedded Image) | Decryption (Original Image) | ||
| 256 × 256 | 1024 | 0.3784 | 0.0125 | 0.0106 | 0.0107 | 0.0016 | 0.0017 |
| 512 × 512 | 1.5094 | 0.0309 | 0.0270 | 0.0264 | 0.0019 | 0.0019 | |
| 1024 × 1024 | 6.0922 | 0.4456 | 0.4242 | 0.4194 | 0.0069 | 0.0071 | |
| 256 × 256 | 2048 | 0.3745 | 0.0230 | 0.0210 | 0.0213 | 0.0016 | 0.0016 |
| 512 × 512 | 1.5103 | 0.0443 | 0.0395 | 0.0399 | 0.0021 | 0.0020 | |
| 1024 × 1024 | 6.0482 | 0.4462 | 0.4262 | 0.4243 | 0.0066 | 0.0076 | |
| 256 × 256 | 4096 | 0.3772 | 0.0473 | 0.0456 | 0.0469 | 0.0016 | 0.0016 |
| 512 × 512 | 1.5106 | 0.0707 | 0.0648 | 0.0667 | 0.0018 | 0.0019 | |
| 1024 × 1024 | 6.0841 | 0.4533 | 0.3805 | 0.4347 | 0.0067 | 0.0068 |
PSNR values with the different embedding capacity.
| Picture | Embedded Data Bits | PSNR (dB) | Picture | Embedded Data Bits | PSNR (dB) |
|---|---|---|---|---|---|
| Lena | 2048 | 65.8630 | Lake | 2048 | 59.5992 |
| 4096 | 61.4712 | 4096 | 57.5459 | ||
| 8192 | 57.2428 | 8192 | 54.9346 | ||
| 16384 | 53.6700 | ||||
| Airplane | 2048 | 62.8160 | Man | 2048 | 62.1950 |
| 4096 | 60.4387 | 4096 | 59.2608 | ||
| 8192 | 57.9015 | 8192 | 56.2677 | ||
| 16384 | 55.3511 | 16384 | 53.6685 |
Figure 3Four original test images Lena, Airplane, Lake and Man (a–d); the four encrypted images with embedded additional data (e–h); the four decrypted images (i–l); and the four restored images (m–p).
Figure 4Comparison of embedding capacity versus embedding distortion in different images: (a) lena; and (b) airplane.