Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
Introduction
Proposed method
Experimental results
Conclusions
Encryption techniques are effective and popular means of privacy protection
Allows to recover the original digital medium, error-free
RDH schemes in combination with cipher techniques have gained increasing attention.
RDH techniques are suitable for other data hiding methods
To ensure the information security by encrypt it just before transmitting the information.
Guarantee the additional bits imperceptibility when they are already hidden.
Brings the possibility to recover or at least to get an approximation of the original digital content
Is a solution for ownership authentication
Invisible techniques are mainly based on the transform domain, hence robustness is guarantied.
May be an invisible or visible technique
Encryption methods
Watermarking techniques
Reversible data hiding
Content owner: Has the original digital image to encrypt it.
Data hider: Has the secret information to embed it into the ciphered image,then the whole content is encrypted again.
Receiver: Has the ciphered image with hidden data to recover it error-free or just extract the hidden data or both.
The luminance Y and chroma components Cb, Cr are encrypted by chaotic mixture procedure
Consider imperceptibility and robustness properties for invisible watermarking stage
Capacity and imperceptibility are two parameters to consider in RDH issue
In the encryption context we have only considered its security in a variety of color images
TABLE II
IMPERCEPTIBILITY OF THE REVERSIBLE DATA HIDING
Imperceptibility of reversible data hiding algorithm with variable capacity
watermark strength factor from 1 to 10 and watermark pattern W with LN=64
watermark strength factor =1.5 and a variable watermark length LN from 16 to 96 bits
Considering watermark W with LN=64, “Lena” test image and several distortions composed by common signal processing, geometric and combined attacks, the bit error rate between original and recovered watermark patterns was obtained
An example of decrypted image when secret keys k and P, are erroneous separately (c)-(d) and concurrently (e) respectively, as well as when both are correct (f)
(a) Original image. (b) Encrypted by SIT algorithm, (c) Decrypted with erroneous key. (d) Decrypted with correct key
From the viewpoint of reversible data hiding, the method has a low-moderate capacity and recovers the original information (chrominance and secret message) with error-free
From the viewpoint of invisible watermarking, the proposed method shows high robustness against several geometric, common signal processing operations and combined distortions; as well as high imperceptibility
[1] Y.Q. Shi, X. Li, X. Zhang, H.T. Wu and B. Ma, “Reversible data hiding: Advances in the past two decades” in IEEE Access, vol. 4, pp. 3210-3237, 2016.
[2] R. Caldelli, F. Filippini, and R. Becarelli, "Reversible watermarking techniques: An overview and a classification," EURASIP J. Inf. Secur., vol. 2010, 2010, Art. no. 134546.
[3] K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, "Reversible data hiding in encrypted images by reserving room before encryption," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553-562, Mar. 2013.
[4] C.-W. Shiu, Y.-C. Chen, and W. Hong, "Encrypted image-based reversible data hiding with public key cryptography from difference expansion," Signal Process., Image Commun., vol. 39, pp. 226-233, Nov. 2015.
[5] X. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011.
[6] J. Zhou, W. Sun, L. Dong, X. Liu, O. C. Au, and Y. Y. Tang, "Secure reversible image data hiding over encrypted domain via key modulation," IEEE Trans. Circuits Syst. Video Technol., vol. 26, no. 3, pp. 441-452, Mar. 2016.
[7] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography. San Mateo, CA, USA: Morgan Kaufmann, 2007.
[8] M. Barni, F. Bartolini, Applications. In: “Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications,” Marcel Dekker Inc., New York, pp. 23-44, 2004.
[9] M. Cedillo-Hernandez, A. Cedillo-Hernandez, F. Garcia-Ugalde, M. Nakano-Miyatake, H. Perez-Meana, "Digital Color Images Ownership Authentication via Efficient and Robust Watermarking in a Hybrid Domain," Radioengineering Journal. 26(2), pp. 536-551, 2017.