TY - JOUR
T1 - Lossless Data Hiding in Encrypted Images Compatible With Homomorphic Processing
AU - Wu, Hao Tian
AU - Cheung, Yiu Ming
AU - Zhuang, Zhenwei
AU - Xu, Lingling
AU - Hu, Jiankun
N1 - Funding information:
This work was supported in part by the Natural Science Foundation of Guangdong Province of China under Grant 2021A1515011798; in part by the National Natural Science Foundation of China under Grant 61772208 and Grant 61672444; in part by the NSFC/RGC Joint Research Scheme under Grant N_HKBU214/21; in part by the RGC General Research Fund under Grant 12201321; in part by the Hong Kong Baptist University under Grant RC-FNRA-IG/18-19/SCI/03 and Grant RC-IRCMs/18-19/SCI/01; in part by the Innovation and Technology Fund of Innovation and Technology Commission of the Hong Kong Government under Grant ITS/339/18; and in part by Shenzhen Science and Technology Innovation Commission (SZSTC) under Grant SGDX20190816230207535. This article was recommended by Associate Editor S. Ozawa. (Corresponding author: Yiu-Ming Cheung.)
Publisher copyright:
© 2022 IEEE.
PY - 2023/6
Y1 - 2023/6
N2 - Reversible data hiding in ciphertext has potential applications for privacy protection and transmitting extra data in a cloud environment. For instance, an original plain-text image can be recovered from the encrypted image generated after data embedding, while the embedded data can be extracted before or after decryption. However, homomorphic processing can hardly be applied to an encrypted image with hidden data to generate the desired image. This is partly due to that the image content may be changed by preprocessing or/and data embedding. Even if the corresponding plain-text pixel values are kept unchanged by lossless data hiding, the hidden data will be destroyed by outer processing. To address this issue, a lossless data hiding method called random element substitution (RES) is proposed for the Paillier cryptosystem by substituting the to-be-hidden bits for the random element of a cipher value. Moreover, the RES method is combined with another preprocessing-free algorithm to generate two schemes for lossless data hiding in encrypted images. With either scheme, a processed image will be obtained after the encrypted image undergoes processing in the homomorphic encrypted domain. Besides retrieving a part of the hidden data without image decryption, the data hidden with the RES method can be extracted after decryption, even after some processing has been conducted on encrypted images. The experimental results show the efficacy and superior performance of the proposed schemes.
AB - Reversible data hiding in ciphertext has potential applications for privacy protection and transmitting extra data in a cloud environment. For instance, an original plain-text image can be recovered from the encrypted image generated after data embedding, while the embedded data can be extracted before or after decryption. However, homomorphic processing can hardly be applied to an encrypted image with hidden data to generate the desired image. This is partly due to that the image content may be changed by preprocessing or/and data embedding. Even if the corresponding plain-text pixel values are kept unchanged by lossless data hiding, the hidden data will be destroyed by outer processing. To address this issue, a lossless data hiding method called random element substitution (RES) is proposed for the Paillier cryptosystem by substituting the to-be-hidden bits for the random element of a cipher value. Moreover, the RES method is combined with another preprocessing-free algorithm to generate two schemes for lossless data hiding in encrypted images. With either scheme, a processed image will be obtained after the encrypted image undergoes processing in the homomorphic encrypted domain. Besides retrieving a part of the hidden data without image decryption, the data hidden with the RES method can be extracted after decryption, even after some processing has been conducted on encrypted images. The experimental results show the efficacy and superior performance of the proposed schemes.
KW - Homomorphic processing
KW - Paillier cryptosystem
KW - image encryption
KW - lossless data hiding
KW - randomness
UR - http://www.scopus.com/inward/record.url?scp=85128646946&partnerID=8YFLogxK
U2 - 10.1109/TCYB.2022.3163245
DO - 10.1109/TCYB.2022.3163245
M3 - Journal article
SN - 2168-2267
VL - 53
SP - 3688
EP - 3701
JO - IEEE Transactions on Cybernetics
JF - IEEE Transactions on Cybernetics
IS - 6
ER -