Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2016, Article ID 4313580, 11 pages
http://dx.doi.org/10.1155/2016/4313580
Research Article

A New Reversible Date-Hiding Algorithm for Encrypted Images

School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China

Received 26 February 2016; Accepted 3 August 2016

Academic Editor: Haipeng Peng

Copyright © 2016 Laicheng Cao and Hao Zhou. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,” in Security and Watermarking of Multimedia Contents III, vol. 4314 of Proceedings of SPIE, pp. 197–208, San Jose, Calif, USA, 2001. View at Publisher · View at Google Scholar
  2. M. Goljan, J. J. Fridrich, and R. Du, “Distortion-free data embedding for images,” in Information Hiding, I. S. Moskowitz, Ed., vol. 2137 of Lecture Notes in Computer Science, pp. 27–41, Springer, Berlin, Germany, 2001. View at Publisher · View at Google Scholar
  3. M. Goljan and R. Du, “Lossless data embedding—new paradigm in digital watermarking,” EURASIP Journal on Advances in Signal Processing, vol. 2002, Article ID 986842, 12 pages, 2002. View at Publisher · View at Google Scholar
  4. J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890–896, 2003. View at Publisher · View at Google Scholar · View at Scopus
  5. Q. Pei, X. Wang, Y. Li, and H. Li, “Adaptive reversible watermarking with improved embedding capacity,” Journal of Systems and Software, vol. 86, no. 11, pp. 2841–2848, 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. C.-C. Lin, S.-P. Yang, and N.-L. Hsueh, “Lossless data hiding based on difference expansion without a location map,” in Proceedings of the 1st International Congress on Image and Signal Processing (CISP '08), pp. 8–12, Sanya, China, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  7. Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354–362, 2006. View at Publisher · View at Google Scholar · View at Scopus
  8. Y.-S. Juang, L.-T. Ko, J.-E. Chen, Y.-S. Shieh, T.-Y. Sung, and H. C. Hsin, “Histogram modification and wavelet transform for high performance watermarking,” Mathematical Problems in Engineering, vol. 2012, Article ID 164869, 14 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. Kamran, A. Khan, and S. A. Malik, “A high capacity reversible watermarking approach for authenticating images: exploiting down-sampling, histogram processing, and block selection,” Information Sciences, vol. 256, pp. 162–183, 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, “Fully homomorphic encryption over the integers,” in Advances in Cryptology—EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30-June 3, 2010. Proceedings, vol. 6110 of Lecture Notes in Computer Science, pp. 24–43, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. De Natale, and A. Neri, “A commutative digital image watermarking and encryption method in the tree structured Haar transform domain,” Signal Processing: Image Communication, vol. 26, no. 1, pp. 1–12, 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. X. Zhang, Z. Qian, G. Feng, and Y. Ren, “Efficient reversible data hiding in encrypted images,” Journal of Visual Communication and Image Representation, vol. 25, no. 2, pp. 322–328, 2014. View at Publisher · View at Google Scholar · View at Scopus
  14. W. Hong, T.-S. Chen, and H.-Y. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Processing Letters, vol. 19, no. 4, pp. 199–202, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. X. P. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 826–832, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. W. M. Zhang, K. D. Ma, and N. H. Yu, “Reversibility improved data hiding in encrypted images,” Signal Processing, vol. 94, no. 1, pp. 118–127, 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 3, pp. 553–562, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. H. Y. Zheng, Z. Gao, D. Xiao et al., “Novel reversible data embedding algorithm for encrypted image,” Computer Engineering and Applications, vol. 50, no. 7, pp. 186–189, 2014. View at Google Scholar
  19. X. P. Zhang, Z. X. Qian, G. Feng, and Y. Ren, “Efficient reversible data hiding in encrypted images,” Journal of Visual Communication and Image Representation, vol. 25, no. 2, pp. 322–328, 2014. View at Publisher · View at Google Scholar · View at Scopus
  20. B. Zhao, W. D. Kou, H. Li, L. Dang, and J. Zhang, “Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol,” Information Sciences, vol. 180, no. 23, pp. 4672–4684, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  21. J. Yu, G. Zhu, X. L. Li, and J. Q. Yang, “An improved algorithm for reversible data hiding in encrypted image,” in Proceedings of the 11th International Conference on Digital Forensics and Watermaking (IWDW '12), Shanghai, China, October-November 2012, vol. 7809 of Lecture Notes in Computer Science, pp. 384–394, Springer, 2013. View at Publisher · View at Google Scholar
  22. D. Xiao, M.-M. Deng, and Y.-S. Zhang, “Robust and separable watermarking algorithm in encrypted image based on compressive sensing,” Journal of Electronics and Information Technology, vol. 37, no. 5, pp. 1248–1254, 2015. View at Publisher · View at Google Scholar · View at Scopus
  23. D. Xiao, K. Bai, and H. Y. Zheng, “Reversible data-hidng algorithm in encrypted image for security application in cloud computing,” Application Research of Computers, vol. 32, no. 12, pp. 3702–3713, 2015. View at Google Scholar
  24. Z. Liu, H. Chen, T. Liu et al., “Image encryption by using gyrator transform and Arnold transform,” Journal of Electronic Imaging, vol. 20, no. 1, Article ID 013020, pp. 13–20, 2011. View at Publisher · View at Google Scholar · View at Scopus
  25. D. Xu and R. Wang, “Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos,” Journal of Electronic Imaging, vol. 24, no. 3, Article ID 033028, 2015. View at Publisher · View at Google Scholar · View at Scopus
  26. C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 169–178, Bethesda, Md, USA, 2009.
  27. K. Schmidt-Samoa and T. Takagi, “Paillier's cryptosystem modulo p2q and its applications to trapdoor commitment schemes,” in Progress in Cryptology—Mycrypt 2005, E. Dawson and S. Vaudenay, Eds., vol. 3715 of Lecture Notes in Computer Science, pp. 296–313, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar
  28. S. D. Galbraith, “Elliptic curve paillier schemes,” Journal of Cryptology, vol. 15, no. 2, pp. 129–138, 2002. View at Publisher · View at Google Scholar
  29. D. Boneh, E. Goh, and K. Nissim, “Evaluating 2-DNF formulas on ciphertexts,” in Proceedings of the Second Theory of Cryptography Conference (TCC '05), Cambridge, Mass, USA, February 2005, vol. 3378 of Lecture Notes in Computer Science, pp. 325–341, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar
  30. A. Klein, “Attacks on the RC4 stream cipher,” Designs, Codes and Cryptography, vol. 48, no. 3, pp. 269–286, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  31. M. S. Abdul Karim and K. Wong, “Universal data embedding in encrypted domain,” Signal Processing, vol. 94, no. 1, pp. 174–182, 2014. View at Publisher · View at Google Scholar · View at Scopus
  32. S. Vaseghi, Advanced Digital Signal Processing and Noise Reduction, John Wiley & Sons, New York, NY, USA, 2008.