169 research outputs found

    General Framework of Reversible Watermarking Based on Asymmetric Histogram Shifting of Prediction Error

    Get PDF
    This paper presents a general framework for the reversible watermarking based on asymmetric histogram shifting of prediction error, which is inspired by reversible watermarking of prediction error. Different from the conventional algorithms using single-prediction scheme to create symmetric histogram, the proposed method employs a multi-prediction scheme, which calculates multiple prediction values for the pixels. Then, the suitable value would be selected by two dual asymmetric selection functions to construct two asymmetric error histograms. Finally, the watermark is embedded in the two error histograms separately utilizing a complementary embedding strategy. The proposed framework provides a new perspective for the research of reversible watermarking, which brings about many benefits for the information security

    Reversible data hiding in digital images

    Get PDF
    Nowadays the role of data hiding has become more eminent. The data safety on the Internet is known to be a challenge due to frequent hacker attacks and data tampering during transmission. In addition to encryption schemes, data hiding has an important role in secret message transmission, authentication, and copyright protection. This thesis presents in-depth state-of-the-art data hiding schemes evaluation, and based on the conducted analysis describes the proposed method, which seek the maximum improvement. We utilize a causal predictor and a local activity indicator with two embedding possibilities based on difference expansion and histogram shifting. Moreover, the secret data from Galois field GF(q),q ≤ 2 in order to embed more than one bit per pixel in a single run of the algorithm is considered. We extend our data hiding technique to the transform domain complaint with JPEG coding. In the experimental part, the proposed method is compared with state-of-the-art reversible data hiding schemes on a vast set of test images, where our approach produces better embedding capacity versus image quality performance. We conclude that proposed scheme achieves efficiency in terms of redundancy, which is decreased due to the derived conditions for location map free data embedding, invariability to the choice of predictor, and high payload capacity of more than 1 bit per pixel in a single run of the algorithm

    Reversible Data Hiding using Visual Cryptography: A Review

    Get PDF
    ABSTRACT: Data security and data integrity are the two challenging areas for research. There are so many research is progressing on the field like internet security, steganography, cryptography. Data hiding are a group of techniques used to put a secure data in a host media with small deterioration in host and the means to extract the secure data afterwards. Reversible data hiding is a technique to embed additional message into some distortion-unacceptable cover media, such as military or medical images, with a reversible manner so that the original cover content can be perfectly restored after extraction of the hidden message. The reversibility means not only embedding data but also original image can be precisely recovered in the extracting stage. Most hiding techniques perform data embedding by altering the contents of a host media. These types of data hiding techniques are thus irreversible. However in a number of domains such as military, legal and medical imaging although some embedding distortion is admissible, permanent loss of signal fidelity is undesirable. This highlights the need for Reversible (Lossless) data embedding techniques. This paper gives a review on various reversible data hiding techniques and also proposes a novel approach for reversible data hiding using visual cryptography. This involves no use of keys thus keeping the computation cost for encryption/decryption low. This scheme applies a method of vacating the room for data prior to the image encryption used to hide the secret data. By reversing the order of encryption and data hiding we overcome the difficulty of finding the room for data from already encrypted image

    Privacy-preserving information hiding and its applications

    Get PDF
    The phenomenal advances in cloud computing technology have raised concerns about data privacy. Aided by the modern cryptographic techniques such as homomorphic encryption, it has become possible to carry out computations in the encrypted domain and process data without compromising information privacy. In this thesis, we study various classes of privacy-preserving information hiding schemes and their real-world applications for cyber security, cloud computing, Internet of things, etc. Data breach is recognised as one of the most dreadful cyber security threats in which private data is copied, transmitted, viewed, stolen or used by unauthorised parties. Although encryption can obfuscate private information against unauthorised viewing, it may not stop data from illegitimate exportation. Privacy-preserving Information hiding can serve as a potential solution to this issue in such a manner that a permission code is embedded into the encrypted data and can be detected when transmissions occur. Digital watermarking is a technique that has been used for a wide range of intriguing applications such as data authentication and ownership identification. However, some of the algorithms are proprietary intellectual properties and thus the availability to the general public is rather limited. A possible solution is to outsource the task of watermarking to an authorised cloud service provider, that has legitimate right to execute the algorithms as well as high computational capacity. Privacypreserving Information hiding is well suited to this scenario since it is operated in the encrypted domain and hence prevents private data from being collected by the cloud. Internet of things is a promising technology to healthcare industry. A common framework consists of wearable equipments for monitoring the health status of an individual, a local gateway device for aggregating the data, and a cloud server for storing and analysing the data. However, there are risks that an adversary may attempt to eavesdrop the wireless communication, attack the gateway device or even access to the cloud server. Hence, it is desirable to produce and encrypt the data simultaneously and incorporate secret sharing schemes to realise access control. Privacy-preserving secret sharing is a novel research for fulfilling this function. In summary, this thesis presents novel schemes and algorithms, including: • two privacy-preserving reversible information hiding schemes based upon symmetric cryptography using arithmetic of quadratic residues and lexicographic permutations, respectively. • two privacy-preserving reversible information hiding schemes based upon asymmetric cryptography using multiplicative and additive privacy homomorphisms, respectively. • four predictive models for assisting the removal of distortions inflicted by information hiding based respectively upon projection theorem, image gradient, total variation denoising, and Bayesian inference. • three privacy-preserving secret sharing algorithms with different levels of generality

    High capacity data embedding schemes for digital media

    Get PDF
    High capacity image data hiding methods and robust high capacity digital audio watermarking algorithms are studied in this thesis. The main results of this work are the development of novel algorithms with state-of-the-art performance, high capacity and transparency for image data hiding and robustness, high capacity and low distortion for audio watermarking.En esta tesis se estudian y proponen diversos métodos de data hiding de imágenes y watermarking de audio de alta capacidad. Los principales resultados de este trabajo consisten en la publicación de varios algoritmos novedosos con rendimiento a la altura de los mejores métodos del estado del arte, alta capacidad y transparencia, en el caso de data hiding de imágenes, y robustez, alta capacidad y baja distorsión para el watermarking de audio.En aquesta tesi s'estudien i es proposen diversos mètodes de data hiding d'imatges i watermarking d'àudio d'alta capacitat. Els resultats principals d'aquest treball consisteixen en la publicació de diversos algorismes nous amb rendiment a l'alçada dels millors mètodes de l'estat de l'art, alta capacitat i transparència, en el cas de data hiding d'imatges, i robustesa, alta capacitat i baixa distorsió per al watermarking d'àudio.Societat de la informació i el coneixemen

    A Study on Reversible Data Hiding Technique Based on Three-Dimensional Prediction-Error Histogram Modification and a Multilayer Perceptron

    Get PDF
    [[abstract]]In the past few years, with the development of information technology and the focus on information security, many studies have gradually been aimed at data hiding technology. The embedding and extraction algorithms are mainly used by the technology to hide the data that requires secret transmission into a multimedia carrier so that the data transmission cannot be realized to achieve secure communication. Among them, reversible data hiding (RDH) is a technology for the applications that demand the secret data extraction as well as the original carrier recovery without distortion, such as remote medical diagnosis or military secret transmission. In this work, we hypothesize that the RDH performance can be enhanced by a more accurate pixel value predictor. We propose a new RDH scheme of prediction-error expansion (PEE) based on a multilayer perceptron, which is an extensively used artificial neural network in plenty of applications. The scheme utilizes the correlation between image pixel values and their adjacent pixels to obtain a well-trained multilayer perceptron so that we are capable of achieving more accurate pixel prediction results. Our data mapping method based on the three-dimensional prediction-error histogram modification uses all eight octants in the three-dimensional space for secret data embedding. The experimental results of our RDH scheme show that the embedding capacity greatly increases and the image quality is still well maintained.[[sponsorship]]科技部 MOST 110-2221-E-005 -045, MOST 110-2222-E-032-002-MY2,[[notice]]補正完
    corecore