Reversible Data Hiding scheme using modified Histogram Shifting in Encrypted Images for Bio-medical images

Arunkumar, S, Subramaniyaswamy, V and Sivaramakrishnan, N Reversible Data Hiding scheme using modified Histogram Shifting in Encrypted Images for Bio-medical images. International Journal of Pure and Applied Mathematics, 2018, vol. 119, n. 12, pp. 13233-13240. [Journal article (Paginated)]

[thumbnail of 1206.pdf]
Preview
Text
1206.pdf

Download (424kB) | Preview

English abstract

Existing Least Significant Bit (LSB) steganography system is less robust and the stego-images can be corrupted easily by attackers. To overcome these problems Reversible data hiding (RDH) techniques are used. RDH is an efficient way of embedding confidential message into a cover image. Histogram expansion and histogram shifting are effective techniques in reversible data hiding. The embedded message and cover images can be extracted without any distortion. The proposed system focuses on implementation of RDH techniques for hiding data in encrypted bio-medical images without any loss. In the proposed techniques the bio-medical data are embedded into cover images by reversible data hiding technique. Histogram expansion and histogram shifting have been used to extract cover image and bio- medical data. Each pixel is encrypted by public key of Paillier cryptosystem algorithm. The homomorphic multiplication is used to expand the histogram of the image in encrypted domain. The histogram shifting is done based on the homomorphic addition and adjacent pixel difference in the encrypted domain. The message is embedded into the host image pixel difference. On receiving encrypted image with additional data, the receiver using his private key performs decryption. As a result, due to histogram expansion and histogram shifting embedded message and the host image can be recovered perfectly. The embedding rate is increased in host image than in existing scheme due to adjacency pixel difference.

Item type: Journal article (Paginated)
Keywords: Steganography, Image encryption, Image decryption, Reversible data hiding
Subjects: B. Information use and sociology of information
B. Information use and sociology of information > BC. Information in society.
Depositing user: Raster Daster
Date deposited: 02 Aug 2018 07:34
Last modified: 02 Aug 2018 07:34
URI: http://hdl.handle.net/10760/33265

References

[1] Tian, Jun. "Reversible data embedding using a difference expansion." IEEE transactions on circuits and systems for video technology 13.8 (2003): 890-896.

[2] Qu, Xiaochao, and Hyoung Joong Kim. "Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding." Signal Processing 111 (2015): 249-260.

[3] Hsiao, Ju-Yuan, Ke-Fan Chan, and J. Morris Chang. "Block-based reversible data embedding." Signal Processing 89.4 (2009): 556-569.

[4] Coatrieux, Gouenou, et al. "Reversible watermarking based on invariant image classification and dynamic histogram shifting." IEEE Transactions on Information forensics and security 8.1 (2013): 111-120.

[5] Chang, I-Cheng, et al. "High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding." Signal Processing 108 (2015): 376-388.

[6] Wu, Hao-Tian, Jiwu Huang, and Yun-Qing Shi. "A reversible data hiding method with contrast enhancement for medical images." Journal of Visual Communication and Image Representation 31 (2015): 146-153.

[7] Cancellaro, Michela, et al. "A commutative digital image watermarking and encryption method in the tree structured Haar transform domain." Signal Processing: Image Communication 26.1 (2011): 1-12.

[8] Li, Ming, et al. "A modified reversible data hiding in encrypted images using random diffusion and accurate prediction." ETRI Journal 36.2 (2014): 325-328.

[9] Hong, Wien, Tung-Shou Chen, and Han-Yan Wu. "An improved reversible data hiding in encrypted images using side match." IEEE Signal Processing Letters 19.4 (2012): 199-202.

[10] Zhang, Xinpeng. "Reversible data hiding in encrypted image." IEEE signal processing letters 18.4 (2011): 255-258.

[11] Zhang, Weiming, Kede Ma, and Nenghai Yu. "Reversibility improved data hiding in encrypted images." Signal Processing 94 (2014): 118-127.

[12] Ma, Kede, et al. "Reversible data hiding in encrypted images by reserving room before encryption." IEEE Transactions on information forensics and security 8.3 (2013): 553-562.

[13] Li, Ming, et al. "Reversible data hiding in encrypted images using cross division and additive homomorphism." Signal Processing: Image Communication 39 (2015): 234-248.

[14] Chen, Yu-Chi, Chih-Wei Shiu, and Gwoboa Horng. "Encrypted signal-based reversible data hiding with public key cryptosystem." Journal of Visual Communication and Image Representation 25.5 (2014): 1164-1170.

[15] Zhang, Xinpeng, et al. "Lossless and reversible data hiding in encrypted images with public-key cryptography." IEEE Transactions on Circuits and Systems for Video Technology 26.9 (2016): 1622-1631.

[16] Paillier, Pascal. "Public-key cryptosystems based on composite degree residuosity classes." International Conference on the Theory and Applications of Cryptographic Techniques. Springer Berlin Heidelberg, 1999.

[17] Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., Gao, X. Z., & Indragandhi, V. (2017). A hybrid quantum-induced swarm intelligence clustering for the urban trip recommendation in smart city. Future Generation Computer Systems, 83, 653-673.

[18] Subramaniyaswamy, V., & Logesh, R. (2017). Adaptive KNN based Recommender System through Mining of User Preferences. Wireless Personal Communications, 97(2), 2229-2247.

[19] Logesh, R., & Subramaniyaswamy, V. (2017). A Reliable Point of Interest Recommendation based on Trust Relevancy between Users. Wireless Personal Communications, 97(2), 2751-2780.

[20] Logesh, R., & Subramaniyaswamy, V. (2017). Learning Recency and Inferring Associations in Location Based Social Network for Emotion Induced Point-of-Interest Recommendation. Journal of Information Science & Engineering, 33(6), 1629–1647.

[21] Subramaniyaswamy, V., Logesh, R., Abejith, M., Umasankar, S., & Umamakeswari, A. (2017). Sentiment Analysis of Tweets for Estimating Criticality and Security of Events. Journal of Organizational and End User Computing (JOEUC), 29(4), 51-71.

[22] Indragandhi, V., Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., Siarry, P., & Uden, L. (2018). Multi-objective optimization and energy management in renewable based AC/DC microgrid. Computers & Electrical Engineering.

[23] Subramaniyaswamy, V., Manogaran, G., Logesh, R., Vijayakumar, V., Chilamkurti, N., Malathi, D., & Senthilselvan, N. (2018). An ontology-driven personalized food recommendation in IoT-based healthcare system. The Journal of Supercomputing, 1-33.

[24] Arunkumar, S., Subramaniyaswamy, V., & Logesh, R. (2018). Hybrid Transform based Adaptive Steganography Scheme using Support Vector Machine for Cloud Storage. Cluster Computing.

[25] Indragandhi, V., Subramaniyaswamy, V., & Logesh, R. (2017). Resources, configurations, and soft computing techniques for power management and control of PV/wind hybrid system. Renewable and Sustainable Energy Reviews, 69, 129-143.

[26] Ravi, L., & Vairavasundaram, S. (2016). A collaborative location based travel recommendation system through enhanced rating prediction for the group of users. Computational intelligence and neuroscience, 2016, Article ID: 1291358.

[27] Logesh, R., Subramaniyaswamy, V., Malathi, D., Senthilselvan, N., Sasikumar, A., & Saravanan, P. (2017). Dynamic particle swarm optimization for personalized recommender system based on electroencephalography feedback. Biomedical Research, 28(13), 5646-5650.

[28] Arunkumar, S., Subramaniyaswamy, V., Karthikeyan, B., Saravanan, P., & Logesh, R. (2018). Meta-data based secret image sharing application for different sized biomedical images. Biomedical Research, 29.

[29] Vairavasundaram, S., Varadharajan, V., Vairavasundaram, I., & Ravi, L. (2015). Data mining‐based tag recommendation system: an overview. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 5(3), 87-112.

[30] Logesh, R., Subramaniyaswamy, V., & Vijayakumar, V. (2018). A personalised travel recommender system utilising social network profile and accurate GPS data. Electronic Government, an International Journal, 14(1), 90-113.

[31] Vijayakumar, V., Subramaniyaswamy, V., Logesh, R., & Sivapathi, A. (2018). Effective Knowledge Based Recommeder System for Tailored Multiple Point of Interest Recommendation. International Journal of Web Portals.

[32] Subramaniyaswamy, V., Logesh, R., & Indragandhi, V. (2018). Intelligent sports commentary recommendation system for individual cricket players. International Journal of Advanced Intelligence Paradigms, 10(1-2), 103-117.

[33] Indragandhi, V., Subramaniyaswamy, V., & Logesh, R. (2017). Topological review and analysis of DC-DC boost converters. Journal of Engineering Science and Technology, 12 (6), 1541–1567.

[34] Saravanan, P., Arunkumar, S., Subramaniyaswamy, V., & Logesh, R. (2017). Enhanced web caching using bloom filter for local area networks. International Journal of Mechanical Engineering and Technology, 8(8), 211-217.

[35] Arunkumar, S., Subramaniyaswamy, V., Devika, R., & Logesh, R. (2017). Generating visually meaningful encrypted image using image splitting technique. International Journal of Mechanical Engineering and Technology, 8(8), 361–368.

[36] Subramaniyaswamy, V., Logesh, R., Chandrashekhar, M., Challa, A., & Vijayakumar, V. (2017). A personalised movie recommendation system based on collaborative filtering. International Journal of High Performance Computing and Networking, 10(1-2), 54-63.

[37] Senthilselvan, N., Udaya Sree, N., Medini, T., Subhakari Mounika, G., Subramaniyaswamy, V., Sivaramakrishnan, N., & Logesh, R. (2017). Keyword-aware recommender system based on user demographic attributes. International Journal of Mechanical Engineering and Technology, 8(8), 1466-1476.

[38] Subramaniyaswamy, V., Logesh, R., Vijayakumar, V., & Indragandhi, V. (2015). Automated Message Filtering System in Online Social Network. Procedia Computer Science, 50, 466-475.

[39] Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V. (2015). Unstructured data analysis on big data using map reduce. Procedia Computer Science, 50, 456-465.

[40] Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V. (2015). Intelligent travel recommendation system by mining attributes from community contributed photos. Procedia Computer Science, 50, 447-455.

[41]Vairavasundaram, S., & Logesh, R. (2017). Applying Semantic Relations for Automatic Topic Ontology Construction. Developments and Trends in Intelligent Technologies and Smart Systems, 48.


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item