Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation

0
771
Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation

Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation

Abstract  of Reversible Image Data Hiding over Encrypted Domain via Key Modulation

This Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation paper proposes a novel reversible image data hiding scheme over encrypted domain. At the decoder side, a powerful two-class SVM classifier is designed to distinguish encrypted and nonencrypted image patches, allowing us to jointly decode the embedded message and the original image signal.
 

Compared with the state-of-the-art methods, the proposed approach provides higher embedding capacity .Can reconstruct the original image and the embedded message perfectly.To validate the superior performance of our scheme, extensive experimental results are provided.

The early works mainly utilized the lossless compression algorithm to compress certain image features, to vacate room for message embedding.

Histogram shifting based technique, initially designed by Ni et al. is another class of approach achieving better embedding performance through shifting of the histogram of some image features.

Recently, the research on signal processing over encrypted domain has gained increasing attention, primarily driven by the needs from cloud computing platforms and various privacy-preserving applications. 

This has triggered the investigation of embedding additional data in the encrypted images in a reversible fashion.

In this paper, we propose an encrypted-domain RIDH scheme by specifically taking the above-mentioned design preferences into consideration.

The proposed technique embeds message through a public key modulation mechanism and performs data extraction by exploiting the statistical distinguishability of encrypted and nonencrypted image blocks. 

Extensive experimental results on 100 test images validate the superior performance of our scheme.

Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
 

Conclusion

we design a secure RIDH scheme operated over the encrypted domain.We have also performed extensive experiments to validate the superior embedding performance of our proposed RIDH method over encrypted domain.