AU2021102700A4 - A system for reversible data hiding in encrypted images - Google Patents

A system for reversible data hiding in encrypted images Download PDF

Info

Publication number
AU2021102700A4
AU2021102700A4 AU2021102700A AU2021102700A AU2021102700A4 AU 2021102700 A4 AU2021102700 A4 AU 2021102700A4 AU 2021102700 A AU2021102700 A AU 2021102700A AU 2021102700 A AU2021102700 A AU 2021102700A AU 2021102700 A4 AU2021102700 A4 AU 2021102700A4
Authority
AU
Australia
Prior art keywords
bit
message
encrypted
image
embedding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021102700A
Inventor
S. Appavu Alias Balamurugan
R Geetha
S. Geetha
S. Sasikala
Y. Asnath Victy Phamila
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Balamurugan S Appavu Alias Dr
Geetha R Mrs
Geetha S Dr
Sasikala S Dr
Victy Phamila Y Asnath Dr
Original Assignee
Balamurugan S Appavu Alias Dr
Geetha R Mrs
Geetha S Dr
Sasikala S Dr
Victy Phamila Y Asnath Dr
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Balamurugan S Appavu Alias Dr, Geetha R Mrs, Geetha S Dr, Sasikala S Dr, Victy Phamila Y Asnath Dr filed Critical Balamurugan S Appavu Alias Dr
Priority to AU2021102700A priority Critical patent/AU2021102700A4/en
Application granted granted Critical
Publication of AU2021102700A4 publication Critical patent/AU2021102700A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • H04N1/32219Spatial or amplitude domain methods involving changing the position of selected pixels, e.g. word shifting, or involving modulating the size of image components, e.g. of characters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32347Reversible embedding, i.e. lossless, invertible, erasable, removable or distorsion-free embedding
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The present disclosure relates to a system for reversible data hiding encrypted images. The disclosure presents RDH in an encrypted cover image. Embedding of information is done on the pivot pixels of the interpolated image. The experiment is conducted on image size of 256X256 gray scale and color images. The experiment is evaluated using the MATLAB software with randomly generated bits as the message to be embedded. Each bit of message is embedded using plus/minus one embedding mechanism. The embedding is performed in the encrypted image after interpolation. The experimental results have proved its efficacy by allowing a payload of up to 4 bpp. The Result shows that the proposed method is no where comparable with the existing techniques. This is possible because of embedding not done using conventional expansion techniques. 15 Receiver ContentOwner DataHiderata OrignalImage b ~Ma rked extato Original Ercrypted Ercrypted Eneg ImageImagSecret Message ErrrytionRecoverlrig the Cover Figure 3 Input Image Perform Embedding cover M Encryption Interpolation using+/-1 MarkedImage Image technique Oscardthe Image Output MarkedImage Extractmessage ine Deryton ou r rows &colurmns Image Figure 4 i1 12 8 i4 1 0 0 1 0 0 0 1 PsI Ps2 P53 Ps4 a) Pivot pixel (Pi) PS1I Ps2 Ps3 Ps4j 1 1i i 3 i4 b) Wmered pixel(11h) Figure 5

Description

Receiver ContentOwner
DataHiderata OrignalImage
b ~Ma rked extato
Original Ercrypted Ercrypted
Eneg ImageImagSecret Message
ErrrytionRecoverlrig the Cover
Figure 3
Input Image Perform Embedding cover M Encryption Interpolation using+/-1 MarkedImage Image technique
Oscardthe Image Output MarkedImage Extractmessage ine Deryton ou r rows &colurmns Image
Figure 4
i1 12 8 i4 1 0 0 1 0 0 0 1
PsI Ps2 P53 Ps4
a) Pivot pixel (Pi)
PS1I Ps2 Ps3 Ps4j 1 1i i 3 i4
b) Wmered pixel(11h)
Figure 5
A SYSTEM FOR REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES FIELD OF THE INVENTION
The present disclosure relates to a system for reversible data hiding in encrypted images.
BACKGROUND OF THE INVENTION
RDH is a technique in which the secret message is extracted and also the cover signal is recovered completely without a single bit error. Most of the early works in RDH were carried out in compressed domain, spatial domain and frequency domain. But, necessity for RDH has emerged with the internet technology getting developed rapidly and cloud storage functions. Lot of images need to be uploaded on to a cloud server, followed by the embedding of message and also other processing steps. The data should not be manipulated by the CP, mainly when it comes to private and most sensitive data like medical reports or images and military images which relate to national security. In order to make the data secure, RDH in encrypted domain has emerged. More research have been carried out to maximize the payload and to ensure security. The existing RDH in encrypted images (RDHEI) can be mainly divided into two categories: One is Vacating Room Before Encryption (VRBE) where the embedding is performed initially on the cover image and encryption mechanism is done later and the second is Vacating Room After Encryption in which the encryption is carried out on the cover image first, later embedding is performed on the encrypted image.
In one existing solution a first RDH algorithm was proposed. It was by embedding the authentication information into a digital medium. Earlier RDH was carried out in spatial domain, frequency domain and in compressed domain.
In another existing solution a separable reversible data hiding for JPEG bit stream in encrypted images has been introduced. This scheme was constructed by reserving room before encryption and the bit stream was modified with less distortion so that the content owner will get enough space for embedding the data. The original image was modified with minimal distortion so that to provide more space for embedding data. A lossless compression algorithm was also designed which was better than the arithmetic coding method for the two bit LSB biased bits stream. At the receiver side, extracting the data and decryption procedure are independent. It was also proved that the receiver was able to extract the embedded information and the cover JPEG bit stream.
In another existing solution a technique called binary block reversible data embedding in encrypted images has been presented. It was achieved by embedding binary bit in lower bit planes of the cover image into higher bit planes so that by reserving lower bit planes they embedded secret information. A bit level scrambling process was also employed to spread the embedded data to the entire encrypted stego image. It was also proved that binary block embedding is reversible.
In another existing solution a separable reversible data hiding has been also presented. Parametric binary tree labelling methodology was adopted to embed secret information in encrypted images. In order to achieve embedding, the spatial redundancy present in small block of image was explored. It was also proved that the secret information and the cover image can be extracted losslessly and independently with an average embedding rate of 1.75 bpp for a block size of 2x2.
In another existing solution an RDH scheme which was separable and has higher embedding capacity has been proposed. The Hamming code was used for exploiting the payload efficiently using a half toned image.
In another existing solution an RDH scheme has been proposed with higher capacity utilizing the bit plane operations and adaptive embedding in encrypted images.
In another existing solution an RDH method by mirroring ciphertext group by using probabilistic and homomorphic properties in encrypted images have been proposed. This was achieved by randomly selecting a group of pixels and reversible embedding was performed on the remaining pixels.
In another existing solution a reversible data hiding scheme for encrypted images has been proposed. An efficient sparse block coding scheme has been developed, which makes use of the redundancy transfer. A special encryption method was adopted and also bit plane disordering block scrambling followed by pixel scrambling. An exchanging MSB planes were performed with LSB planes and embedded additional data by means of sparse matrix compression method. It also proved privacy protection of content by adopting adaptive embedding strategy with block selection techniques.
In one prior art solution Embodiments of the invention are directed toward reversible/invertible and lossless, image data hiding that can imperceptibly hide data into digital images and can reconstruct the original image without any distortion after the hidden data have been extracted in various digital image formats including, but not limited to Joint Photographic Experts Group (JPEG). In particular, embodiments of the invention provide a lossless data hiding technique for JPEG images based on histogram pairs. that embeds data into the JPEG quantized 8x8 block DCT coefficients and achieves good performance in terms of peak signal-to-noise ratio (PSNR) versus payload through manipulating histogram pairs with optimum threshold and optimum region of the JPEG DCT coefficients. Furthermore, the invented technology is expected to be able to apply to the I-frame of Motion Picture Experts Group (MPEG) video for various applications including annotation, authentication, and forensics.
In another prior art solution a method was proposed including identifying at least two subsets of pixels within a block of an image; forming a plurality of pixel groups from the at least two subsets of pixels, each pixel group having at least one pixel from a first of the at least two subsets and at least one pixel from a second of the at least two subsets; producing a plurality of difference values, each pixel group providing one of said difference values, each difference value being based on differences between pixel values of pixels within one of the pixel groups; and modifying pixel values of pixels in less than all of the at least two subsets, thereby embedding a bit value into the block.
In another prior art solution a JPEG image bit stream encryption domain reversible data hiding method is characterized in that a user carries out exclusive OR encryption on expansion bits of all entropy encodings in each image block in a JPEG bit stream according to an encryption key, carries out pseudo-random scrambling on the other alternating current coefficients except the last non-zero alternating current coefficient, and carries out pseudo-random scrambling on all image block entropy encodings; the cloud end carries out histogram translation on the alternating current coefficient in the bit stream cipher text according to the hidden key to embed additional information, and can carry out lossless extraction; and the receiver performs pseudorandom scrambling recovery on all ciphertext image block entropy codes in the bit stream ciphertext according to the encryption key, and then performs alternating current coefficient scrambling recovery and extended bit XOR decryption in each ciphertext image block entropy code to obtain a decrypted bit stream which is the same as the original JPEG bit stream. The method not only realizes the encryption of the expansion bit of the entropy coding, but also encrypts the Huffman coding of the entropy coding; the capacity of steganography is large, and the safety is high.
However, to ensure the safety and security of electronic files, date must be recorded and stored in the encryption domain during the cloud storage mechanism where the user does not permit the cloud provider (CP) to access the information and the CP must insert extra information in the data. Hence Reversible Data Hiding in Encryption domain (RDHE) techniques has emerged. Therefore in order to avoid the aforementioned drawback there is a need for a system for reversible data hiding in encrypted images.
SUMMARY OF THE INVENTION
The present disclosure relates to a system for reversible data hiding in encrypted images. The present disclosure presents RDH in an encrypted cover image. Additional columns are interpolated into the encrypted image to preserve the information required for reversibility. Embedding of information is done on the pivot pixels of the interpolated image. Each bit of message is embedded using plus/minus one embedding mechanism. The experimental results have proved its efficacy by allowing a payload of up to 4 bpp. The comparison metric shows that the proposed method is no where comparable with the existing techniques.
The present disclosure seeks to provide a system for reversible data hiding in encrypted images. The system comprises: a transmitter end and a receiver end, wherein the transmitter end comprises of: a collection module for collecting an input image data, wherein the input image data undergoes a pre-processing for enhancing a plurality of pixels of the input image data; an encryption module connected to the collection module for encrypting the pixels of the collected image using a benchmark encryption technique, wherein the encrypted image under goes an interpolation of columns using an interpolation technique; a data embedding module connected to the encryption module for receiving an encrypted image and embedding a message in the encrypted pixels, wherein the encrypted pixels are paired and each pair is assigned a symbol for storing at least a message; wherein the receiver end comprises of: an extraction module connected to the data embedding module for receiving a marked message and extracting an original message from the embedded marked message, wherein the interpolated columns and rows of the pixels are discarded; and a decryption module connected to the extraction module for decrypting the encrypted image and obtaining the original image at a receiver end.
The present disclosure also seeks to provide a method for reversible data hiding in encrypted images. The method comprises: collecting an input image data using a collection module, wherein the input image data undergoes pre-processing for enhancing a plurality of pixels of the input image data; encrypting the pixels of the collected image by a benchmark encryption technique using an encryption module connected to the collection module, wherein the encrypted image under goes an interpolation of columns using an interpolation technique; receiving an encrypted image using a data embedding module connected to the encryption module and embedding a message in the encrypted pixels, wherein the encrypted pixels are paired and each pair is assigned a symbol for storing at least a message; receiving a marked message using an extraction module connected to the data embedding module and extracting an original message from the embedded marked message, wherein the interpolated columns and rows of the pixels are discarded; and decrypting the encrypted image using a decryption module connected to the extraction module and obtaining the original image at a receiver end.
An objective of the present disclosure is to propose a system and method for reversible data hiding in encrypted images.
Another object of the present disclosure is to presents RDH in an encrypted cover image.
Another object of the present disclosure is to interpolate columns into the encrypted image to preserve the information required for reversibility.
Another object of the present disclosure is to do Embedding of information on the pivot pixels of the interpolated image.
Another object of the present disclosure is to use plus/minus one embedding mechanism to embed each bit of message.
Yet, another object of the present disclosure is to prove the efficacy through the experimentalresults.
To further clarify advantages and features of the present disclosure, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
BRIEF DESCRIPTION OF FIGURES
These and other features, aspects, and advantages of the present disclosure will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
Figure 1 illustrates a block diagram of a system for reversible data hiding in encrypted images in accordance with an embodiment of the present disclosure;
Figure 2 illustrates a flow chart of a method for reversible data hiding in encrypted images in accordance with an embodiment of the present disclosure;
Figure 3 illustrates the General block diagram of RDH in encrypted image in accordance with an embodiment of the present disclosure;
Figure 4 illustrates the Block diagram of proposed embedding and extraction in accordance with an embodiment of the present disclosure;
Figure 5 illustrates the encrypted pivot pixel and interpolated pixel in accordance with an embodiment of the present disclosure;
Figure 6 illustrates a table of embedding strategy in accordance with an embodiment of the present disclosure;
Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have been necessarily been drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the present disclosure. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the present disclosure so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having benefit of the description herein.
DETAILED DESCRIPTION
For the purpose of promoting an understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended, such alterations and further modifications in the illustrated system, and such further applications of the principles of the invention as illustrated therein being contemplated as would normally occur to one skilled in the art to which the invention relates.
It will be understood by those skilled in the art that the foregoing general description and the following detailed description are exemplary and explanatory of the invention and are not intended to be restrictive thereof.
Reference throughout this specification to "an aspect", "another aspect" or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present disclosure. Thus, appearances of the phrase "in an embodiment", "in another embodiment" and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such process or method. Similarly, one or more devices or sub-systems or elements or structures or components proceeded by "comprises...a" does not, without more constraints, preclude the existence of other devices or other sub-systems or other elements or other structures or other components or additional devices or additional sub-systems or additional elements or additional structures or additional components.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The system, methods, and examples provided herein are illustrative only and not intended to be limiting.
Embodiments of the present disclosure will be described below in detail with reference to the accompanying drawings.
Figure 1 illustrates a block diagram of a system for reversible data hiding in encrypted images in accordance with an embodiment of the present disclosure. The system 100 includes a transmitter end 102, wherein transmitter end comprises of: a collection module 104 for collecting an input image data, wherein the input image data undergoes a pre-processing for enhancing a plurality of pixels of the input image data; an encryption module 106 which is connected to the collection module for encrypting the pixels of the collected image using a benchmark encryption technique, wherein the encrypted image under goes an interpolation of columns using an interpolation technique; a data embedding module 108 which is connected to the encryption module for receiving an encrypted image and embedding a message in the encrypted pixels, wherein the encrypted pixels are paired and each pair is assigned a symbol for storing at least a message.
In an embodiment the system includes a receiver end 110, wherein the receiver end comprises of: an extraction module 112 which is connected to the data embedding module for receiving a marked message and extracting an original message from the embedded marked message, wherein the interpolated columns and rows of the pixels are discarded; and a decryption module 114 which connected to the extraction module for decrypting the encrypted image and obtaining the original image at a receiver end.
Figure 2 illustrates a flow chart of a method for reversible data hiding in encrypted images in accordance with an embodiment of the present disclosure. At step 202 the method 200 includes collecting an input image data using a collection module, wherein the input image data undergoes pre-processing for enhancing a plurality of pixels of the input image data.
At step 204 the method 200 includes encrypting the pixels of the collected image by a benchmark encryption technique using an encryption module connected to the collection module, wherein the encrypted image under goes an interpolation of columns using an interpolation technique.
At step 206 the method 200 includes receiving an encrypted image using a data embedding module connected to the encryption module and embedding a message in the encrypted pixels, wherein the encrypted pixels are paired and each pair is assigned a symbol for storing at least a message.
At step 208 the method 200 includes receiving a marked message using an extraction module connected to the data embedding module and extracting an original message from the embedded marked message, wherein the interpolated columns and rows of the pixels are discarded.
At step 210 the method 200 includes decrypting the encrypted image using a decryption module connected to the extraction module and obtaining the original image at a receiver end.
Figure 3 illustrates the General block diagram of RDH in encrypted image in accordance with an embodiment of the present disclosure. The figure explains the general representation of RDH in encrypted images. In the proposed method, the image is interpolated to incorporate additional space for recovery of the cover image and creating space in the pivot pixels for embedding the data.
Figure 4 illustrates the Block diagram of proposed embedding and extraction in accordance with an embodiment of the present disclosure. An input cover image is encrypted using a benchmark encryption algorithm (e.g. AES) and the encrypted image under goes an interpolation of columns only. The interpolated columns are not estimated using the averaging technique followed in most of the interpolation schemes. Embedding is performed in the pivot encrypted pixels. After performing interpolation on the encrypted cover image, the size of the image doubles with respect to column and number of rows remains the same as of the cover image. This is performed to provide room for embedding and to incorporate the additional information required for the reversibility of the encrypted cover image.
Figure 5 illustrates the encrypted pivot pixel and interpolated pixel in accordance with an embodiment of the present disclosure. Message will be embedded in the encrypted pixels. The encrypted pixels are paired and each pair is assigned a symbol represented by Ps. The assigned symbol is recorded in the neighbouring interpolated pixel positioned as IP 7 to IP 4 . The bits in position 7,5,3,1 of the encrypted cover pixels are recorded in IP 3 to IPo. The format of the encrypted pivot pixel and the interpolated pixels are shown this figure. In this way all the interpolated pixels in alternate columns of each row is formatted.
Figure 6 illustrates a table of embedding strategy in accordance with an embodiment of the present disclosure. Embedding is performed in the encrypted pivot pixels. Every bit of the encrypted pivot pixels carries a message bit. Eight message bits are embedded in each encrypted pivot pixels. The embedding strategy used for embedding message bits in each bit of the encrypted pivot pixel is shown in this table. If the bit is '0' it is considered as even bit and the bit positions in the encrypted pivot pixel 6,4,2,0 are considered as even positions. Similarly if the bit is'1' it is considered as odd bit and the bit positions in 7,5,3,1 are considered as odd positions.
If the bit value By and bit position Bp are both same and the message to be embedded is '0' then the marked bit will be the reverse of the original bit. Then if the bit value By and the bit position Bp are not same for an embeddable message of bit '0' then the marked bit remains the same as that of the original bit. For a third possible condition if the bit value By and bit position Bp are both same and the message to be embedded is '1' then the marked bit will be the same as that of the original bit. Final condition if the bit value By and the bit position Bp are not same for an embeddable message of bit '1' then the marked will be the reverse of the original bit.
The drawings and the forgoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, orders of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts necessarily need to be performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples. Numerous variations, whether explicitly given in the specification or not, such as differences in structure, dimension, and use of material, are possible. The scope of embodiments is at least as broad as given by the following claims.
Benefits, other advantages, and solutions to problems have been described above with regard to specific embodiments. However, the benefits, advantages, solutions to problems, and any component(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential feature or component of any or all the claims.

Claims (8)

WE CLAIM
1. A system for reversible data hiding in encrypted images, the system comprises of: a transmitter end; a receiver end; wherein the transmitter end comprises of: a collection module for collecting an input image data, wherein the input image data undergoes a pre-processing for enhancing a plurality of pixels of the input image data;
an encryption module connected to the collection module for encrypting the pixels of the collected image using a benchmark encryption technique, wherein the encrypted image under goes an interpolation of columns using an interpolation technique;
a data embedding module connected to the encryption module for receiving an encrypted image and embedding a message in the encrypted pixels, wherein the encrypted pixels are paired and each pair is assigned a symbol for storing at least a message;
wherein the receiver end comprises of:
an extraction module connected to the data embedding module for receiving a marked message and extracting an original message from the embedded marked message, wherein the interpolated columns and rows of the pixels are discarded; and
a decryption module connected to the extraction module for decrypting the encrypted image and obtaining the original image at a receiver end.
2. The system as claimed in claim 1, wherein the size of the embedded image doubles with respect to the column, whereas number of rows remains the same as of the collected image.
3. The system as claimed in claim 1, wherein the symbol comprises of binary values and the symbol assigned during embedding is recorded in a neighboring interpolated pixel, wherein all the interpolated pixels in alternate columns of each row is formatted.
4. The system as claimed 1, wherein embedding is performed in an encrypted pivot pixel, wherein at least eight message bits are embedded in each encrypted pivot pixels.
5. The system as claimed in claim 1, wherein the embedding technique comprises steps of:
When the bit is '0' the bit is considered as even bit and the bit positions in the encrypted pivot pixel 6,4,2,0 is considered as even positions; and
when the bit is'1' the bit is considered as odd bit and the bit positions in 7,5,3,1 is considered as odd positions.
6. The system as claimed in claim 1, wherein the embedding technique for marking the message comprises steps of: When a bit value and a bit position are both same and the message to be embedded is '0' then the marked message bit is the reverse of the original message bit;
when the bit value and the bit position are not same for the embedded message of bit '0' then the marked message bit remains the same as that of the original bit; when the bit value and the bit position are both same and the message to be embedded is '1' then the marked message bit is be the same as that of the original message bit; and
when the bit value and the bit position are not same for an embeddable message of bit '1' then the marked is be the reverse of the original bit.
7. The system as claimed in claim 1, wherein a key for extracting the message bit and recovering the original encrypted pixels is present in the interpolated pixels.
8. A method for reversible data hiding in encrypted images, the method comprises of:
collecting an input image data using a collection module, wherein the input image data undergoes pre-processing for enhancing a plurality of pixels of the input image data;
encrypting the pixels of the collected image by a benchmark encryption technique using an encryption module connected to the collection module, wherein the encrypted image under goes an interpolation of columns using an interpolation technique;
receiving an encrypted image using a data embedding module connected to the encryption module and embedding a message in the encrypted pixels, wherein the encrypted pixels are paired and each pair is assigned a symbol for storing at least a message;
receiving a marked message using an extraction module connected to the data embedding module and extracting an original message from the embedded marked message, wherein the interpolated columns and rows of the pixels are discarded; and decrypting the encrypted image using a decryption module connected to the extraction module and obtaining the original image at a receiver end.
AU2021102700A 2021-05-19 2021-05-19 A system for reversible data hiding in encrypted images Ceased AU2021102700A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021102700A AU2021102700A4 (en) 2021-05-19 2021-05-19 A system for reversible data hiding in encrypted images

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021102700A AU2021102700A4 (en) 2021-05-19 2021-05-19 A system for reversible data hiding in encrypted images

Publications (1)

Publication Number Publication Date
AU2021102700A4 true AU2021102700A4 (en) 2021-11-04

Family

ID=78488430

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021102700A Ceased AU2021102700A4 (en) 2021-05-19 2021-05-19 A system for reversible data hiding in encrypted images

Country Status (1)

Country Link
AU (1) AU2021102700A4 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116431846A (en) * 2023-06-14 2023-07-14 泰山学院 Student sensitive information storage system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116431846A (en) * 2023-06-14 2023-07-14 泰山学院 Student sensitive information storage system and method
CN116431846B (en) * 2023-06-14 2023-08-18 泰山学院 Student sensitive information storage system and method

Similar Documents

Publication Publication Date Title
Puyang et al. Reversible data hiding in encrypted images with two-MSB prediction
Fu et al. Effective reversible data hiding in encrypted image with adaptive encoding strategy
Xu et al. Separable and error-free reversible data hiding in encrypted images
Yu et al. Reversible data hiding with hierarchical embedding for encrypted images
Yin et al. Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression
Zhang Separable reversible data hiding in encrypted image
US20020176602A1 (en) Method of integrating a watermark into a compressed image
CN111861844A (en) Reversible watermarking method based on image block authentication
Malik et al. Reversible data hiding in homomorphically encrypted image using interpolation technique
CN110110535B (en) Low-distortion steganography method based on pixel matrix
AU2021102700A4 (en) A system for reversible data hiding in encrypted images
Agham et al. A novel approach towards separable reversible data hiding technique
Gao et al. High capacity reversible data hiding in encrypted image based on image encoding and POB
CN116437019A (en) Ciphertext domain reversible information hiding method of all-0 row and all-0 column codes
Puteaux et al. High-capacity reversible data hiding in encrypted images using MSB prediction
Liu et al. A reversible data hiding algorithm based on image camouflage and bit-plane compression
Prabhakaran et al. A new cryptic steganographic approach using video steganography
Li et al. High-capacity reversible data hiding in encrypted images by information preprocessing
Raj et al. A survey on reversible data hiding in encrypted image
Sivadasan A survey paper on various reversible data hiding techniques in encrypted images
Vaish et al. A systematic review on various reversible data hiding techniques in digital images
Neetha et al. An Efficient Image Encryption Reversible Data Hiding Technique to Improve Payload and High Security in Cloud Platforms
Rathika et al. Survey on reversible data hiding techniques
Yi et al. Reversible data hiding method in encrypted images using secret sharing and Huffman coding
Khare et al. A Survey on Reversible Image Data Hiding Using the Hierarchical Block Embedding Technique

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry