z-logo
open-access-imgOpen Access
Prediction error expansion‐based reversible data hiding in encrypted images with public key cryptosystem
Author(s) -
Shah Mohsin,
Zhang Weiming,
Hu Honggang,
Dong Xiaojuan,
Yu Nenghai
Publication year - 2019
Publication title -
iet image processing
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.401
H-Index - 45
eISSN - 1751-9667
pISSN - 1751-9659
DOI - 10.1049/iet-ipr.2018.6120
Subject(s) - encryption , homomorphic encryption , cryptosystem , computer science , information hiding , domain (mathematical analysis) , paillier cryptosystem , image (mathematics) , theoretical computer science , data mining , artificial intelligence , algorithm , mathematics , computer security , hybrid cryptosystem , mathematical analysis
Advances in signal processing in the encrypted domain and cloud computing have given rise to privacy‐preserving technologies. In recent years, reversible data hiding in encrypted images (RDH‐EI) has received attention from the research community because additional data can be embedded into an encrypted image without accessing its original content, and the encrypted image can be losslessly recovered after extracting the embedded data. Although the recent development of RDH‐EI compatible with homomorphic public key cryptosystems has intensified research interest, most of the existing mature RDH schemes cannot be transplanted to the encrypted domain due to the limitations of the underlying cryptosystems. In this paper, prediction error expansion based RDH‐ED using probabilistic and homomorphic properties of the Paillier cryptosystem is presented. This work implements non‐integer mean value computation in the encrypted domain without any interactive protocol between the content owner and the cloud server. This work presents mathematical detail of pixel prediction (mean), prediction error, error expansion and data embedding in the encrypted domain and data extraction and content recovery in the plain domain. Experimental results from standard test images reveal that the proposed scheme outperforms other state‐of‐the‐art encrypted domain schemes.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here