Reversible Data Hiding in Encrypted Images Based on Preprocessing-Free Variable Threshold Secret Sharing
Abstract
:1. Introduction
- A VRIE RDHED scheme applicable to a distributed variable security environment is proposed, which extends the application scenarios.
- Improving the security of existing TCSIS and using the redundancy space to embed extra data in the encryption process results in better security and embedding performance.
- Using the random substitution matrix as the hidden key, only the seed key needs to be transmitted without transmitting the hidden key to the extractor, which effectively reduces communication overhead and improves security.
- Theoretical analyses and experimental results show that the proposed scheme has high security, a large embedding rate, complete reversibility, and low computational complexity. In addition, it does not require preprocessing and solves the problem of pixel overflow.
2. Related Work
2.1. Shamir’s (k, n) Secret Sharing
2.2. Security Analysis of the TCSIS Scheme
- Secret share generation
- 2.
- Secret image reconstruction
- When , updates the secret share to ;
- When , updates the secret share to ;
- When , first choose h-T integers randomly different from 1, 2, …, n and then update the secret share to .
3. Proposed RDH-ED Scheme Based on VTSIS
3.1. Secret Sharing and Data Embedding
Algorithm 1: Secret sharing and data embedding |
Input: original image, prime number p, k, n |
1: Scan the original image to obtain the size M × N; |
2: l←1; |
3: while l < M × N do |
4: Scan pixel to obtain pl; |
5: Generate k × h coefficient matrix C using pseudorandom number; |
6: Generate k × k hiding key matrix H using the seed key; |
7: Encrypt extra secrets using AES; |
8: Construct the polynomial F(x, y); |
9: Scan di,j in C and di,j’ in H; |
10: if di,j’ = = 1 |
11: then replace di,j with extra secrets or pl; |
12: else |
13: not to change di,j |
14: return F(x, y); |
15: Calculate ft(y) = F(t, y), gt(x) = F(x, t) then distribute (ft(y), gt(x)) to participant Pt; |
16: end if |
17: l←l + 1; |
18: end while |
Output: Share images with extra secrets embedded |
3.2. Secret Extraction and Image Reconstruction
- If , updates the secret share to ;
- If , updates the secret share to ;
- If , first choose h-T integers randomly different from 1, 2, …, n, and then update the secret share to ;
Algorithm 2: Secret extraction and image reconstruction |
Input: Share images with extra secrets embedded, T, k, n |
1: l←1; |
2: while l < M × N do |
3: if T = = k |
4: Update the original secret share to = ft(y); |
5: else if k < T < h |
6: Select h-T distinct integers e1, e2, …, eh-T excluding 1, 2, …, n; |
7: Update the original secret share to = {, ft(e1), ft(e2), …, ft(eh-T)}; |
8: else if T = = h |
9: Update the original secret share to = gt(x); |
10: Reconstruct F(x, y) from the updated shares using Equation (1); |
11: Extract pixel and extra secrets according to hiding key; |
12: end if |
13: l←l + 1; |
14: end while |
Output: reconstructed Secret, reconstructed image |
- When T = 2, the secret owner updates the share to . If and need to extract the extra data, Equation (11) can be obtained by the Lagrange interpolation formula:
- When T = 3, the secret owner updates shares to . If , and need to extract the extra data, Equation (12) can be obtained by the Lagrange interpolation formula:
4. Theoretical and Experimental Analyses
4.1. Correctness
- When , participant updates the original secret share to . can be expressed as . , , …, are monic polynomials of order k − 1. Because can be expressed as , , , …, can be regarded as the interpolation of , and . Since is a k − 1 order polynomial, the threshold of reconstructing with , , …, is k. Similarly, the thresholds of reconstructing , , …, are all k. In other words, k secret shares can reconstruct the binary polynomial.
- When , participant updates the original secret share to . can be expressed as . , , …, are monic polynomials of order k − 1. Because can be expressed as , , , …, can be regarded as the interpolation of , and . Since is an h − 1 order polynomial, the threshold for reconstructing with , , …, is h. Similarly, the thresholds for reconstructing , , …, are all h. In other words, h secret shares can reconstruct the binary polynomial.
- When , participant updates the original secret share to . Here , , …, are h-T integers randomly chosen and different from 1, 2, …, n. Since , can be regarded as an interpolant of . Since is a k − 1 order polynomial when , can be reconstructed from T updated shadows , where t = 1, 2, …, T. Therefore, , , …, can be reconstructed from . can be expressed as . Therefore, additional h-T additional interpolations can be obtained. Since T interpolations can be obtained from and , , …, are the h − 1st degrees, so can be reconstructed.
4.2. Visualization
4.3. Security
4.3.1. Analysis of Attack Resistance
4.3.2. Histogram
4.3.3. Entropy
4.3.4. Pixel Correlation
4.4. Reversibility
4.4.1. PSNR and SSIM
4.4.2. Error Map
4.5. Embedding Rate
4.6. Applicability
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Solak, S. High embedding capacity data hiding technique Based on EMSD and LSB substitution algorithms. IEEE Access 2020, 8, 166513–166524. [Google Scholar] [CrossRef]
- Kim, C.; Shin, D.; Yang, C.; Chen, Y.; Wu, S. Data hiding using sequential hamming + k with m overlapped pixels. KSII Trans. Internet Inf. Syst. 2019, 13, 6159–6174. [Google Scholar] [CrossRef]
- Shi, Y.Q.; Li, X.; Zhang, X. Reversible data hiding: Advances in the past two decades. IEEE Access 2016, 4, 3210–3237. [Google Scholar] [CrossRef]
- Dragoi, I.C.; Coltuc, D. Local-prediction-based difference expansion reversible watermarking. IEEE Trans. Image Process. 2014, 23, 1779–1790. [Google Scholar] [CrossRef]
- Wang, J.; Ni, J.; Zhang, X. Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans. Cybern. 2016, 47, 315–326. [Google Scholar] [CrossRef]
- Xiong, L.; Dong, D. Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion. J. Inf. Secur. Appl. 2019, 47, 78–85. [Google Scholar] [CrossRef]
- Wang, Y.; Cai, Z.; He, W. High capacity reversible data hiding in encrypted image based on intra-block lossless compression. IEEE Trans. Multimed. 2020, 23, 1466–1473. [Google Scholar] [CrossRef]
- Amrit, P.; Singh, K.N.; Baranwal, N. Deep learning-based segmentation for medical data hiding with Galois field. Neural Comput. Appl. 2023, 1–16. [Google Scholar] [CrossRef]
- Singh, H.K.; Singh, K.N.; Singh, A.K. Secure transmission of ocean images using deep learning-based data hiding. Expert Syst. 2023, e13469. [Google Scholar] [CrossRef]
- Tripathi, A.; Prakash, J. Blockchain enabled interpolation based reversible data hiding mechanism for protecting records. EAI Endorsed Trans. Scalable Inf. Syst. 2023, 10, e1. [Google Scholar]
- Rai, A.K.; Om, H.; Chand, S. High-capacity reversible data hiding based on two-layer embedding scheme for encrypted image using blockchain. Computers 2023, 12, 120. [Google Scholar] [CrossRef]
- Punia, R.; Malik, A.; Singh, S. An interpolation-based reversible data hiding scheme for internet of things applications. Discov. Internet Things 2023, 3, 18. [Google Scholar] [CrossRef]
- Qi, W.; Zhang, T.; Li, X.; Ma, B.; Guo, Z. Reversible data hiding based on prediction-error value ordering and multiple-embedding. Signal Process 2023, 207, 108956. [Google Scholar] [CrossRef]
- Dragoi, I.C.; Coltuc, D. Reversible data hiding in encrypted color images based on vacating room after encryption and pixel prediction. In Proceedings of the 25th IEEE International Conference on Image Processing (ICIP), Athens, Greece, 7–10 October 2018. [Google Scholar] [CrossRef]
- Chen, K.; Guan, Q.; Zhang, W.; Yu, N. Reversible data hiding in encrypted images based on binary symmetric channel model and polar code. IEEE Trans. Dependable Secur. Comput. 2023, 20, 4519–4535. [Google Scholar] [CrossRef]
- Mohammadi, A. A general framework for reversible data hiding in encrypted images by reserving room before encryption. J. Vis. Commun. Image Represent. 2022, 85, 103478. [Google Scholar] [CrossRef]
- Huang, D.; Wang, J. High-capacity reversible data hiding in encrypted image based on specific encryption process. Signal Process. Image Commun. 2019, 80, 115632. [Google Scholar] [CrossRef]
- Ke, Y.; Zhang, M.Q.; Liu, J.; Su, T.T.; Yang, X.Y. Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain. IEEE Trans. Circuits Syst. Video Technol. 2020, 30, 2353–2365. [Google Scholar] [CrossRef]
- Hogade, N.; Pasricha, S. A survey on machine learning for geo-distributed cloud data center managements. IEEE Trans. Sustain. Comput. 2023, 8, 15–31. [Google Scholar] [CrossRef]
- Yuan, L. Enabling Decentralized, Secure and cooperative multi-access edge computing based on blockchain. IEEE Trans. Parallel Distrib. Syst. 2023, 34, 894–908. [Google Scholar] [CrossRef]
- Ghimire, B.; Rawat, D.B. Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things. IEEE Internet Things J. 2022, 9, 8229–8249. [Google Scholar] [CrossRef]
- Puech, W.; Chaumont, M.; Strauss, O. A reversible data hiding method for encrypted images. In Proceedings of the SPIE Electronic Imaging 2008—Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, 27 January 2008; SPIE: Bellingham, WA, USA, 2008; Volume 6819. [Google Scholar] [CrossRef]
- Puteaux, P.; Puech, W. An efficient msb prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1670–1681. [Google Scholar] [CrossRef]
- Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
- Wu, X.T.; Weng, J.; Yan, W.Q. Adopting secret sharing for reversible data hiding in encrypted images. Signal Process. 2018, 143, 269–281. [Google Scholar] [CrossRef]
- Chen, Y.C.; Hung, T.H.; Hsieh, S.H.; Shiu, C.W. A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms. IEEE Trans. Inf. Forensics Secur. 2019, 14, 3332–3343. [Google Scholar] [CrossRef]
- Chen, B.; Lu, W.; Huang, J.; Weng, J.; Zhou, Y. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders. IEEE Trans. Dependable Secur. Comput. 2022, 19, 978–991. [Google Scholar] [CrossRef]
- Ke, Y.; Zhang, M.; Zhanga, X.; Liu, J.; Yang, X. A reversible data hiding scheme in encrypted domain for secret image sharing based on Chinese remainder theorem. IEEE Trans. Circuits Syst. Video Technol. 2022, 32, 2469–2481. [Google Scholar] [CrossRef]
- Qin, C.; Jiang, C.; Mo, Q.; Yao, H.; Chang, C.C. Reversible data hiding in encrypted image via secret sharing based on GF(p) and GF(28). IEEE Trans. Circuits Syst. Video Technol. 2022, 32, 1928–1941. [Google Scholar] [CrossRef]
- Hua, Z.Y.; Wang, Y.; Yi, S.; Zhou, Y.; Jia, X. Reversible data diding in encrypted images using cipher-feedback secret sharing. IEEE Trans. Circuits Syst. Video Technol. 2022, 32, 4968–4982. [Google Scholar] [CrossRef]
- Hua, Z.Y.; Wang, Y.; Yi, S. Matrix-based secret sharing for reversible data hiding in encrypted images. IEEE Trans. Dependable Secur. Comput. 2022, 20, 3669–3686. [Google Scholar] [CrossRef]
- Xiong, L.Z.; Han, X.; Yang, C.N. Reversible data hiding in shared images based on syndrome decoding and homomorphism. IEEE Trans. Cloud Comput. 2023, 11, 3085–3098. [Google Scholar] [CrossRef]
- Hua, Z.Y.; Liu, X.Y.; Zheng, Y.F. Reversible data hiding over encrypted images via preprocessing-free matrix secret sharing. IEEE Trans. Circuits Syst. Video Technol. 2023, 34, 1799–1814. [Google Scholar] [CrossRef]
- Yu, C.; Zhang, X.; Qin, C.; Tang, Z. Reversible data hiding in encrypted images with secret sharing and hybrid coding. IEEE Trans. Circuits Syst. Video Technol. 2023, 33, 6443–6458. [Google Scholar] [CrossRef]
- Xiong, L.; Han, X.; Yang, C.N. Reversible data hiding in shared images with separate cover image reconstruction and secret extraction. IEEE Trans. Cloud Comput. 2024, 12, 186–199. [Google Scholar] [CrossRef]
- Yu, H.Y.; Zhang, J.W.; Xiang, Z.X.; Liu, B.; Feng, H.M. Lossless reversible data hiding in encrypted image for multiple data hiders based on pixel value order and secret sharing. Sensors 2023, 23, 4865. [Google Scholar] [CrossRef] [PubMed]
- Sun, Q.; Cao, H.; Li, S.; Song, H.; Liu, Y. Changing the threshold in a bivariate polynomial based secret image sharing scheme. Mathematics 2022, 10, 710. [Google Scholar] [CrossRef]
- Jaradat, A.; Barhoush, M.; Kofahi, N. Performance enhancement of the advanced encryption standard via software pipelined implementation. J. Theor. Appl. Inf. Technol. 2019, 97, 4213–4226. [Google Scholar]
Test Image | Share 1 | Share 2 | Share 3 | Share 4 | Reconstructed Image (T = 2) |
---|---|---|---|---|---|
Jetplane | 7.9801 | 7.9811 | 7.9803 | 7.9824 | 7.9719 |
Peppers | 7.9843 | 7.9798 | 7.9816 | 7.9851 | 7.9804 |
Airplane | 7.9771 | 7.9786 | 7.9802 | 7.9796 | 7.9785 |
Goldhill | 7.9796 | 7.9803 | 7.9814 | 7.9796 | 7.9810 |
Baboon | 7.9814 | 7.9811 | 7.9825 | 7.9831 | 7.9816 |
Test Image | PSNR | SSIM |
---|---|---|
Jetplane | +∞ | 1 |
Peppers | +∞ | 1 |
Airplane | +∞ | 1 |
Goldhill | +∞ | 1 |
Baboon | +∞ | 1 |
Maximum ER (bpp) | n = 2 | n = 3 | n = 4 | n = 5 | ||||||
---|---|---|---|---|---|---|---|---|---|---|
h = 2 | h = 2 | h = 3 | h = 2 | h = 3 | h = 4 | h = 2 | h = 3 | h = 4 | h = 5 | |
k = 2 | 4.00 | 2.67 | 2.67 | 2.00 | 2.00 | 2.00 | 1.60 | 1.60 | 1.60 | 1.60 |
k = 3 | \ | 5.33 | 5.33 | 4.00 | 4.00 | 4.00 | 3.20 | 3.20 | 3.20 | 3.20 |
k = 4 | \ | \ | \ | 6.00 | 6.00 | 6.00 | 4.80 | 4.80 | 4.80 | 4.80 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jiang, C.; Zhang, M.; Zhang, X.; Di, F. Reversible Data Hiding in Encrypted Images Based on Preprocessing-Free Variable Threshold Secret Sharing. Appl. Sci. 2024, 14, 5574. https://doi.org/10.3390/app14135574
Jiang C, Zhang M, Zhang X, Di F. Reversible Data Hiding in Encrypted Images Based on Preprocessing-Free Variable Threshold Secret Sharing. Applied Sciences. 2024; 14(13):5574. https://doi.org/10.3390/app14135574
Chicago/Turabian StyleJiang, Chao, Minqing Zhang, Xiong Zhang, and Fuqiang Di. 2024. "Reversible Data Hiding in Encrypted Images Based on Preprocessing-Free Variable Threshold Secret Sharing" Applied Sciences 14, no. 13: 5574. https://doi.org/10.3390/app14135574
APA StyleJiang, C., Zhang, M., Zhang, X., & Di, F. (2024). Reversible Data Hiding in Encrypted Images Based on Preprocessing-Free Variable Threshold Secret Sharing. Applied Sciences, 14(13), 5574. https://doi.org/10.3390/app14135574