Advanced Privacy-Preserving RDH Scheme for Encrypting Sensitive Images: A Two-Level LSB Embedding Strategy

International Journal of Electronics and Communication Engineering
© 2024 by SSRG - IJECE Journal
Volume 11 Issue 4
Year of Publication : 2024
Authors : Adam Muhudin, Jayanta Mondal, Sasmita Dash, Osman Diriye Hussein, Abdullahi Mohamud Osoble
pdf
How to Cite?

Adam Muhudin, Jayanta Mondal, Sasmita Dash, Osman Diriye Hussein, Abdullahi Mohamud Osoble, "Advanced Privacy-Preserving RDH Scheme for Encrypting Sensitive Images: A Two-Level LSB Embedding Strategy," SSRG International Journal of Electronics and Communication Engineering, vol. 11,  no. 4, pp. 34-40, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I4P104

Abstract:

In the digital age, safeguarding the security and privacy of sensitive images presents a paramount challenge. Transmission of confidential images over communication networks demands robust protection mechanisms to preserve their integrity and confidentiality. Encryption emerges as a fundamental practice in this endeavor, ensuring the secure transmission of images amidst the prevalence of multimedia communication. As internet connectivity and cloud storage systems proliferate, the need for enhanced security measures becomes ever more critical. Beyond conventional encryption, the imperatives of preserving image quality, particularly in domains such as forensics and military operations, underscore the importance of Reversible Data Hiding (RDH). RDH offers a promising solution by enabling the embedding of data into images while maintaining their original integrity, facilitating lossless recovery when needed. This thesis delves into efficient RDH schemes within the encrypted domain, proposing a comprehensive two-level security mechanism. By integrating authentication systems, maximizing data hiding capacity, and ensuring complete reversibility, these schemes aim to address the complex security challenges inherent in sensitive image transmission. Through this research, strides are made towards enhancing the security and privacy of sensitive images across various domains.

Keywords:

Encryption, Image privacy, Lossless data embedding, Reversible Data Hiding, Sensitive images.

References:

[1] J.M. Barton, “Method and Apparatus for Embedding Authentication Information within Digital Data” US Patent 5,646,997, 1997.
[Google Scholar] [Publisher Link]
[2] Xinpeng Zhang et al., “Reversible Data Hiding in Encrypted Image,” IEEE Signal Processing Letters, vol. 18, no. 4, pp. 255-258, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Wien Hong, Tung-Shou Chen, and Han-Yan Wu, “An Improved Reversible Data Hiding in Encrypted Images Using Side Match,” IEEE Signal Processing Letters, vol. 19, no. 4, pp. 199-202, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Xin Liao, and Changwen Shu, “Reversible Data Hiding in Encrypted Images Based on Absolute Mean Difference of Multiple Neighboring Pixels,” Journal of Visual Communication and Image Representation, vol. 28, pp. 21-27, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Zhenxing Qian et al., “Improved Joint Reversible Data Hiding in Encrypted Images,” Journal of Visual Communication and Image Representation, vol. 40, pp. 732-738, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[6] M. Fallahpour, D. Megias, and M. Ghanbari, “Reversible and High-Capacity Data Hiding in Medical Images,” IET Image Processing, vol. 5, no. 2, pp. 190-197, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Chia-Chen Lin, Wei-Liang Tai, and Chin-Chen Chang, “Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images,” Pattern Recognition, vol. 41, no. 12, pp. 3582-3591, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Piyu Tsai, Yu-Chen Hu, and Hsiu-Lien Yeh, “Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting,” Signal Processing, vol. 89, no. 6, pp. 1129-1143, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Zhiguo Chang, and Jian Xu, “Reversible Run Length Data Embedding for Medical Images,” 2011 IEEE 3rd International Conference on Communication Software and Networks, Xi’an, China, pp. 260-263, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Jun Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890-896, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Dinu Coltuc, and Jean-Marc Chassery, “Very Fast Watermarking by Reversible Contrast Mapping,” IEEE Signal Processing Letters, vol. 14, no. 4, pp. 255-258, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[12] L. Kamstra, and H.J.A.M. Heijmans, “Reversible Data Embedding into Images Using Wavelet Techniques and Sorting,” IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2082-2090, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Diljith M. Thodi, and Jeffrey J. Rodriguez, “Expansion Embedding Techniques for Reversible Watermarking,” IEEE Transactions on Image Processing, vol. 16, no. 3, pp. 721-730, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[14] A.M. Alattar, “Reversible Watermark Using Difference Expansion of Quads,” 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, Montreal, Canada, pp. iii–377, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Tohari Ahmad et al., “An Improved Quad and RDE-Based Medical Data Hiding Method,” 2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM), Yogyakarta, Indonesia, pp. 141-145, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Shang-Kuan Chen, “A Module-Based LSB Substitution Method with Lossless Secret Data Compression,” Computer Standards Interfaces, vol. 33, no. 4, pp. 367-371, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Yuling Liu, Xinxin Qu, and Guojiang Xin, “A ROI-Based Reversible Data Hiding Scheme in Encrypted Medical Images,” Journal of Visual Communication and Image Representation, vol. 39, pp. 51-57, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Xinpeng Zhang et al., “Separable Reversible Data Hiding in Encrypted Image,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 826-832, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Kede Ma et al., “Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 3, pp. 553-562, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[20] A. Lavanya, and V. Natarajan, “Watermarking Patient Data in Encrypted Medical Images,” Sadhana, vol. 37, no. 6, pp. 723-729, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Vasiliy Sachnev et al., “Reversible Watermarking Algorithm Using Sorting and Prediction,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 7, pp. 989-999, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Hao-Tian Wu, Jean-Luc Dugelay, and Yun-Qing Shi, “Reversible Image Data Hiding with Contrast Enhancement,” IEEE Signal Processing Letters, vol. 22, no. 1, pp. 81-85, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Guangyong Gao, and Yun-Qing Shi, “Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform,” IEEE Signal Processing Letters, vol. 22, no. 11, pp. 2078-2082, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Vanmathi Chandrasekaran, and Prabu Sevugan, “Applying Reversible Data Hiding for Medical Images in Hybrid Domain Using Haar and Modified Histogram,” International Journal of Intelligent Engineering and Systems, vol. 10, no. 4, pp. 126-134, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Chuan Qin, and Xinpeng Zhang, “Effective Reversible Data Hiding in Encrypted Image with Privacy Protection for Image Content,” Journal of Visual Communication and Image Representation, vol. 31, pp. 154-164, 2015.
[CrossRef] [Google Scholar] [Publisher Link]