Skip to main content
Log in

Separable reversible data hiding in homomorphic encrypted domain using POB number system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a novel separable reversible data hiding in homomorphic encrypted images (RDHEI) using POB number system is proposed. The frame of the proposed RDHEI includes three parties: content owner, data hider, and receiver. The content owner divides original image contents into a series of non-overlapping equal-size 2 × 2 blocks, and encrypts all pixels in each block with the same key. The encryption process is carried out in an additive homomorphism manner. The data hider divides the encrypted images into the same size blocks as the encryption phase, and further categories all of the obtained blocks into two sets according to the corresponding block entropy. The embedding processes of the two sets are performed through utilizing permutation ordered binary (POB) number system. For the set with smaller entropies, all pixels in addition to the first pixel in each block are compressed by the POB number system; for the set with larger entropies, only u LSBs of all pixels are compressed in order to vacate room for embedding. The receiver can conduct image decryption, data extraction, and image reconstruction in a separable manner. Experimental results verify the superiority of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Chen T, Chang T, Zhu T (2020) Security-enhanced cloud-based image secret sharing and authentication using POB number system. Multimed Tools Appl 3:1–24

    Google Scholar 

  2. Fridrich J, Goljan M, Du R (2002) Lossless data embeddingnew paradigm in digital watermarking. Eurasip J Adv Signal Process 2002(2):185–196

    Article  Google Scholar 

  3. Gao H, Gao T, You Z, Chen R (2020) High capacity reversible data hiding in encrypted image based on image encoding and POB[J]. J Franklin Inst 357(13):9107–9126

    Article  MathSciNet  Google Scholar 

  4. Hong W, Chen T, Wu H (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Processing Letters 19 (4):199–202

    Article  Google Scholar 

  5. Jiang C, Pang Y (2020) Encrypted images-based reversible data hiding in Paillier cryptosystem. Multimed Tools Appl 79(1/2):693–711

    Article  Google Scholar 

  6. Li M, Xiao D, Kulsoom A, Zhang Y (2015) Improved reversible data hiding for encrypted images using full embedding strategy. Electron Lett 51(9):690–691

    Article  Google Scholar 

  7. Li M, Wang L, Fan J, Zhang Y, Fan H (2019) Fidelity preserved data hiding in encrypted highly autocorrelated data based on homomorphism and compressive sensing. IEEE Access 7:69808–69825

    Article  Google Scholar 

  8. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327

    Article  MathSciNet  Google Scholar 

  9. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16/17):3895–3903

    Article  Google Scholar 

  10. Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466

    Article  Google Scholar 

  11. Liu Y, You Z, Gao T (2020) Lossless image hierarchical recovery based on POB number system. Signal Process 167:107293

    Article  Google Scholar 

  12. Liu L, Wang L, Chang C (2020) Separable reversible data hiding in encrypted images based on flexible preservation of the differences. Multimed Tools Appl :1–21

  13. Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8(3):553–562

    Article  Google Scholar 

  14. Malik A, Wang H, Chen Y, Khan A (2020) A reversible data hiding in encrypted image based on prediction-error estimation and location map. Multimed Tools Appl 79(17/18):11591–11614

    Article  Google Scholar 

  15. Ni Z, Shi Y, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Vid Technol 16(3):354–362

    Article  Google Scholar 

  16. Qian Z, Zhang X, Feng G (2016) Reversible data hiding in encrypted images based on progressive recovery. IEEE Signal Processing Letters 23 (11):1672–1676

    Article  Google Scholar 

  17. Qin C, Zhang W, Cao F, Zhang X, Chang C (2018) Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Process 153:109–122

    Article  Google Scholar 

  18. Qin C, He Z, Luo X, Dong J (2018) Reversible data hiding in encrypted image with separable capability and high embedding capacity. Inform Sci 465:285–304

    Article  Google Scholar 

  19. Ren H, Niu S, Wang X (2019) Reversible data hiding in encrypted images using POB number system. IEEE Access 149527-149541:7

    Google Scholar 

  20. Rivest R, Adleman L, Dertouzos M (1978) On data banks and privacy homomorphisms. Found Secur Comput 4:169–179

    MathSciNet  Google Scholar 

  21. Signal Image Processing. Los Angeles, Image Database [Online]. Available: http://sipi.usc.edu/database/

  22. Singh P, Raman B, Agarwal N, Atrey P (2017) Secure cloud-based image tampering detection and localization using POB number system. Acm Trans Multimed Comput Commun Appl 13(3):1–23

    Article  Google Scholar 

  23. Singh P, Raman B, Agarwal N (2017) Toward encrypted video tampering detection and localization based on POB number system over cloud. IEEE Trans Circ Syst Vid Technol 28(9):2116–2130

    Article  Google Scholar 

  24. Singh P, Agarwal N, Raman B (2018) Secure data deduplication using secret sharing schemes over cloud. Futur Gener Comput Syst 88:156–167

    Article  Google Scholar 

  25. Sreekumar A, Sundar S (2009) an efficient secret sharing scheme for n out of n scheme using POB-number system. Int J Inf Process :1–5

  26. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Vid Technol 13(8):890–896

    Article  Google Scholar 

  27. Wang X, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615–621

    Article  MathSciNet  Google Scholar 

  28. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108

    Article  MathSciNet  Google Scholar 

  29. Wang X, Zhang Y, Bao X (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61

    Article  Google Scholar 

  30. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18

    Article  Google Scholar 

  31. Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inform Sci 486:340–358

    Article  Google Scholar 

  32. Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inform Sci 539:195–214

    Article  MathSciNet  Google Scholar 

  33. Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inform Sci 507:16–36

    Article  MathSciNet  Google Scholar 

  34. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258

    Article  Google Scholar 

  35. Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forens Secur 7(2):826–832

    Article  Google Scholar 

  36. Zhang Y, Wang X (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inform Sci 273:329–351

    Article  Google Scholar 

  37. Zhang Y, Wang X (2015) A new image encryption algorithm based on non-adjacent coupled map lattices[J]. Appl Soft Comput 26:10–20

    Article  Google Scholar 

Download references

Acknowledgment

This work is supported by the National Natural Science Foundation of China (No.61370195) and the Joint Funds of the National Natural Science Foundation of China (No. U1536121).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shaozhang Niu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ren, H., Niu, S. Separable reversible data hiding in homomorphic encrypted domain using POB number system. Multimed Tools Appl 81, 2161–2187 (2022). https://doi.org/10.1007/s11042-021-11341-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11341-w

Keywords

Navigation