Source: J. Vis. Commun. Image R. 41 (2016) 58–64

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
Source: IEEE Signal Processing Letters (Accepted)2016
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
State of the art – Part 1 Xin Jin
Image camouflage by reversible image transformation
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Source : Signal Processing, Volume 133, April 2017, Pages
Source: Journal of Visual Communication and Image Representation, Vol
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
A new two-level QR code with visual cryptography scheme
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Mean value based reversible data hiding in encrypted images
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Source: Signal Processing 109 (2015) 317–333
Source : Signal Processing, vol. 150, pp ,  September 2018
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Separable and error-free reversible data hiding in encrypted images
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An efficient reversible data hiding method for AMBTC compressed images
Source: Information Sciences, 2018, accpeted.
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source : Signal Processing, vol. 126, pp ,  November 2016
The New Developments in Visual Cryptography
Improved joint reversible data hiding in encrypted images
Reversible Data Hiding Scheme Using Two Steganographic Images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source: Signal Processing: Image Communication 64 (2018) 78-88
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: Signal Processing, Vol. 125, pp , August 2016.
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Source : Journal of Visual Communication and Image Representation, vol
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Partial reversible data hiding scheme using (7, 4) hamming code
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion Source: Journal of Visual Communication and.
High Capacity Data Hiding for Grayscale Images
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Data hiding method using image interpolation
Chair Professor Chin-Chen Chang Feng Chia University
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
De-clustering and Its Application to Steganography
Secret Image Sharing Based on Encrypted Pixels
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Pairwise IPVO-Based Reversible Data Hiding
Sourse: Information Sciences, Vol. 494, pp , August 2019
Privacy Protection for E-Health Systems by
Dynamic improved pixel value ordering reversible data hiding
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Reversible data hiding in encrypted binary images by pixel prediction
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer Source: J. Vis. Commun. Image R. 41 (2016) 58–64 Authors: Xiaotian Wu , Bing Chen , Jian Weng Speaker: Ran Tang Date: 06/08/2017 1 1

Outline Related Works Proposed Method Experiment Results Conclusions Paillier homomorphic encryption Signal energy transfer Proposed Method Experiment Results Conclusions 2 2

Related Works-Paillier homomorphic encryption p, q: two large primes, N =p*q; receiver 𝓡 computer: 𝝀=lcm(p−1,q−1); selects 𝐠∈ ℤ 𝑁 2 ∗ 𝑤𝑖𝑡ℎ gcd(L( 𝑔 𝜆 𝑚𝑜𝑑 𝑁 2 ),N)=1 where 𝐿 𝑥 = 𝑥−1 𝑁 , ℤ 𝑁 2 ∗ = 1,2,…, 𝑁 2 −1 . Public key:(N, g); Private key:(p, q, 𝝀). Plaintext: m∈ ℤ 𝑁 , 𝑟∈ ℤ 𝑁 ∗ 𝑖𝑠 𝑟𝑎𝑛𝑑𝑜𝑚𝑙𝑦 𝑠𝑒𝑙𝑒𝑐𝑡𝑑; Ciphertext: c= 𝑔 𝑚 𝑟 𝑁 𝑚𝑜𝑑 𝑁 2 . Decryption: m = 𝐿( 𝑐 𝝀 𝑚𝑜𝑑 𝑁 2 ) 𝐿( 𝑔 𝝀 𝑚𝑜𝑑 𝑁 2 ) . 𝐸(𝑚 1 + 𝑚 2 )=E( 𝑚 1 )𝐸 𝑚 2 ; 𝐸(𝑚) 𝑎 =𝐸 𝑎𝑚 .

Related Works-Signal energy transfer A signal can be represented by the sum of other signals. 𝑃 𝑖 = 𝑡 𝑖 + 𝑎 0𝑖 + 𝑎 1𝑖 ; 𝒙 𝒊 = 𝑃 𝑖 /2 . 𝒓 𝒊 𝑖𝑠 𝑟𝑎𝑛𝑑𝑜𝑚𝑙𝑦 𝑠𝑒𝑙𝑒𝑐𝑡𝑑 𝑓𝑟𝑜𝑚 0,1,2,…, 𝑥 𝑖 . 𝒂 𝟎𝒊 , 𝒂 𝟏𝒊 = 𝑟 𝑖 ; 𝒕 𝒊 = 𝑃 𝑖 −2 𝑟 𝑖 . 𝐸(𝑚 1 + 𝑚 2 )=E( 𝑚 1 )𝐸 𝑚 2 ; 𝐸(𝑚) 𝑎 =𝐸 𝑎𝑚 .

Proposed Method(1/2)

Proposed Method(2/2) Original pixel: 𝑃 𝑖 =97; 𝑠𝑒𝑐𝑟𝑒𝑡 𝑏𝑖𝑡:𝑏=1; Image encryption phase: 𝑥 𝑖 = 𝑃 𝑖 /2 = 97/2 =48; suppose that 𝑟 𝑖 =6 is randomly selectd from 0,1,2,…,48 ; 𝑎 0𝑖 = 𝑎 1𝑖 = 𝑟 𝑖 =6; 𝑡 𝑖 = 𝑃 𝑖 − 𝑎 0𝑖 − 𝑎 1𝑖 =97−12=85. When 𝑷 𝒊 is encrypted we get: 𝑬(𝒑 𝒊 )=E 85 E 6 E 6 . data embedding phase: E 𝑎 0𝑖 ′ = 𝐸 𝑎 0𝑖 − 𝑎 1𝑖 −1 𝑖𝑓 𝑏=0; 𝐸 𝑎 0𝑖 + 𝑎 1𝑖 +1 𝑖𝑓 𝑏=1; E 𝑎 1𝑖 ′ = 𝐸 𝑎 0𝑖 + 𝑎 1𝑖 +1 𝑖𝑓 𝑏=0; 𝐸 𝑎 0𝑖 − 𝑎 1𝑖 −1 𝑖𝑓 𝑏=1; ∵𝑏=1; ∴E 𝑎 0𝑖 ′ =𝐸 13 ;E 𝑎 1𝑖 ′ =𝐸 −1 . marked encrypted pixel: 𝑬(𝑷 𝒊 ′ )=𝐸 85 𝐸 13 𝐸 −1 ; data extraction and image recovery phase: directly decrypted: 𝐏 𝐢 ′ =85+13+ −1 =97; b= 0, 𝑖𝑓 𝑎 0𝑖 ′ <𝑎 1𝑖 ′ ; 1, 𝑖𝑓 𝑎 0𝑖 ′ >𝑎 1𝑖 ′ . ∵ 𝑎 0𝑖 ′ >𝑎 1𝑖 ′ ; ∴ 𝑏=1.

Experiment Results(1/5) 7 7

Experiment Results(2/5) 8 8

Experiment Results(3/5) 9 9

Experiment Results(4/5) 10 10

Experiment Results(5/5) -references [14] X. Zhang, Reversible data hiding in encrypted image, IEEE Signal Process.Lett.18 (4) (2011) 255–258. [15] W. Hong, T.-S. Chen, H.-Y. Wu, An improved reversible data hiding in encrypted images using side match, IEEE Signal Process. Lett. 19(4) (2012)199–202. [16] X. Zhang, Separable reversible data hiding in encrypted image, IEEE Trans. Inform. Forensics Secur. 7(2) (2012) 826–832. [20] W. Zhang, K. Ma, N. Yu, Reversibility improved data hiding in encrypted images, Sign. Process. 94 (2014) 118–127. [23] Y.-C. Chen, C.-W. Shiu, G. Horng, Encrypted signal-based reversible data hiding with public key cryptosystem, J. Vis. Commun. Image Represent. 25(5) (2014) 1164–1170. [24] C.W. Shiu, Y.C. Chen, W. Hong, Encrypted image-based reversible data hiding with public key cryptography from difference expansion, Sign. Process. Image Commun. 39 (PA) (2015) 226–233. [25] X. Zhang, J. Wang, Z. Wang, H. Cheng, Lossless and reversible data hiding in encrypted images with public key cryptography, IEEE Trans. Circ. Syst. Video Technol. http://dx.doi.org/10.1109/TCSVT.2015.2433194. 11 11

Conclusions Each unit in the original image is divided into three parts, and they are encrypted by Paillier homomorphic encryption. The proposed method have optimal visual quality and improved embedding rate. Moreover, the proposed method can be extended to deal with encoded multimedia. 12 12

Q&A 13 13