We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
High capacity reversible data hiding in encrypted images using multi-MSB data hiding mechanism with elliptic curve cryptography.
- Authors
Deshmukh, Priyanka V.; Kapse, Avinash S.; Thakare, V. M.; Kapse, Arvind S.
- Abstract
Data-hiding technology plays an important role in fields of the image such as copyright identification and annotation. Predicators may be exploited in RDH in the encrypted image (RDHEI); this has become a research interest in recent years because of the development of cloud computing and a need for content owner privacy. The existing algorithms cannot implement large embedding capacity and good reconstructed image quality simultaneously. Consequently, for secure data image transfer, the article suggested the High-Capacity Reversible Data Hiding in Encrypted Images (RDH-EI) approach. The original image was pre-processed by the content owner to free up hiding space in the RRBE scheme, following which the image will be encrypted and transferred to the data hider. Asymmetric encryption is considered to be more secure than symmetric encryption as it uses two keys for the process. Initially, to offer authenticity and integrity, Elliptic Curve Cryptography (ECC) is proposed to encrypt, decrypt, and authenticate the cipher image. This requires much shorter key lengths and was highly efficient in the decryption process. Further, the encrypted images are directed to the data hiding process. A considerable amount of data is employed to embed in the image encryption domain to ensure that the embedded data can be extracted error-free. Subsequently, to have high embedding capacity, the research proposed Multi-MSB (Most Significant Bit) data embedding scheme in which secret bits can be directly extracted from the encrypted domain from the pixels without any error. In addition, to retain image quality by employing both reference and context pixels, a near-lossless solution based on the Huffman Coding technique is proposed. With the use of decryption and a data concealing key, the receiver can restore the original image and extract hidden data afterwards. The keys are made in such a way that the decryption key cannot be easily deduced from the public encryption key. The experiment was carried out in MATLAB software using a built-in function. The findings reveal that the suggested method outperforms conventional RDH strategies in terms of PSNR and embedding with 3.6 bpp respectively. In addition, the algorithm can resist steganalysis attacks, and demonstrated the effectiveness of the proposed algorithm.
- Subjects
REVERSIBLE data hiding (Computer science); ELLIPTIC curve cryptography; IMAGE encryption; PUBLIC key cryptography; VISUAL cryptography; HUFFMAN codes; ELECTRONIC data processing
- Publication
Multimedia Tools & Applications, 2023, Vol 82, Issue 18, p28087
- ISSN
1380-7501
- Publication type
Article
- DOI
10.1007/s11042-023-14683-9