Skip to main content
Top
Published in: Cluster Computing 5/2019

24-02-2018

An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment

Authors: T. Senthilnathan, P. Prabu, R. Sivakumar, S. Sakthivel

Published in: Cluster Computing | Special Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nowadays there are numerous intruders trying to get the privacy information from cloud resources and consequently need a high security to secure our data. Moreover, research concerns have various security standards to secure the data using data hiding. In order to maintain the privacy and security in the cloud and big data processing, the recent crypto policy domain combines key policy encryption with reversible data hiding (RDH) techniques. However in this approach, the data is directly embedded resulting in errors during data extraction and image recovery due to reserve leakage of data. Hence, a novel shuffle block key encryption with RDH technique is proposed to hide the data competently. RDH is applied to encrypted images by which the data and the protection image can be appropriately recovered with histogram bit shifting algorithm. The hidden data can be embedded with shuffle key in the form of text with the image. The proposed method generates the room space to hide data with random shuffle after encrypting image using the definite encryption key. The data hider reversibly hides the data, whether text or image using data hiding key with histogram shifted values. If the requestor has both the embedding and encryption keys, can excerpt the secret data and effortlessly extract the original image using the spread source decoding. The proposed technique overcomes the data loss errors competently with two seed keys and also the projected shuffle state RDH procedure used in histogram shifting enhances security hidden policy. The results show that the proposed method outperforms the existing approaches by effectively recovering the hidden data and cover image without any errors, also scales well for large amount of data.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Secur. 5(1), 187–193 (2010)CrossRef Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Secur. 5(1), 187–193 (2010)CrossRef
2.
go back to reference Hong, W., Chen, T.-S., WuAn, H.-Y.: Improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)CrossRef Hong, W., Chen, T.-S., WuAn, H.-Y.: Improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)CrossRef
3.
go back to reference Zhang, X.: Separable encrypted image reversible data hiding. IEEE Trans. 7(2), 826–832 (2012) Zhang, X.: Separable encrypted image reversible data hiding. IEEE Trans. 7(2), 826–832 (2012)
4.
go back to reference Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255–258 (2011)CrossRef Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255–258 (2011)CrossRef
5.
go back to reference Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)CrossRef Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)CrossRef
6.
go back to reference Chelliah, B.J., Jagadeesan, J., Nyapathy, N., Tiwari, N.: Reversible data hiding in encrypted images using AES data encryption technique. Int. J. Emerg. Res. Manag. Technol. 3(4), 28–35 (2014) Chelliah, B.J., Jagadeesan, J., Nyapathy, N., Tiwari, N.: Reversible data hiding in encrypted images using AES data encryption technique. Int. J. Emerg. Res. Manag. Technol. 3(4), 28–35 (2014)
7.
go back to reference Wang, H., Zhang, W., Yu, N.: Protecting patient confidential information based on ECG reversible data hiding. Multimed. Tools Appl. 75(21), 13733–13747 (2015)CrossRef Wang, H., Zhang, W., Yu, N.: Protecting patient confidential information based on ECG reversible data hiding. Multimed. Tools Appl. 75(21), 13733–13747 (2015)CrossRef
8.
go back to reference Fu, Z., et al.: Achieving efficient cloud search services: multi keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2017)CrossRef Fu, Z., et al.: Achieving efficient cloud search services: multi keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2017)CrossRef
9.
go back to reference Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE Internet Comput. 14(5), 14–22 (2010)CrossRef Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE Internet Comput. 14(5), 14–22 (2010)CrossRef
10.
go back to reference Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7), 989–999 (2009)CrossRef Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7), 989–999 (2009)CrossRef
11.
go back to reference ou, B., Li, X., Zhao, Y., Ni, R.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010–5021 (2013) ou, B., Li, X., Zhao, Y., Ni, R.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010–5021 (2013)
12.
go back to reference Zhang, W., Hu, X., Li, X., Yu, N.: Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans. Image Process. 22(7), 2775–2785 (2013)CrossRef Zhang, W., Hu, X., Li, X., Yu, N.: Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans. Image Process. 22(7), 2775–2785 (2013)CrossRef
13.
go back to reference Ni, Z., Shi, Y., Ansari, N., Wei, S.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)CrossRef Ni, Z., Shi, Y., Ansari, N., Wei, S.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)CrossRef
14.
go back to reference Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)CrossRef Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)CrossRef
15.
go back to reference Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 14(2), 253–266 (2005)CrossRef Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 14(2), 253–266 (2005)CrossRef
16.
go back to reference Hong, W., Chen, T.-S., Chang, Y.-P., Shiu, C.-W.: A high capacity reversible data hiding scheme using orthogonal projection and prediction errormodification. Signal Process. 90, 2911–2922 (2010)CrossRef Hong, W., Chen, T.-S., Chang, Y.-P., Shiu, C.-W.: A high capacity reversible data hiding scheme using orthogonal projection and prediction errormodification. Signal Process. 90, 2911–2922 (2010)CrossRef
17.
go back to reference Chang, C.-C., Lin, C.-C., Chen, Y.-H.: Reversible data-embedding scheme using differences between original and predicted pixel values. Inf. Secur. 2(2), 35–46 (2008)CrossRef Chang, C.-C., Lin, C.-C., Chen, Y.-H.: Reversible data-embedding scheme using differences between original and predicted pixel values. Inf. Secur. 2(2), 35–46 (2008)CrossRef
18.
go back to reference Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007)CrossRef Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007)CrossRef
19.
go back to reference Hu, X., Zhang, W., Li, X., Yu, N.: Minimum rate prediction and optimized histograms modification for reversible data hiding. IEEE Trans. Inf. Forensics Secur. 10(3), 653–664 (2015)CrossRef Hu, X., Zhang, W., Li, X., Yu, N.: Minimum rate prediction and optimized histograms modification for reversible data hiding. IEEE Trans. Inf. Forensics Secur. 10(3), 653–664 (2015)CrossRef
20.
go back to reference Ma, K., Zhang, W., Zhao, X.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)CrossRef Ma, K., Zhang, W., Zhao, X.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)CrossRef
21.
go back to reference Hong, W., Chen, T., Wu, H.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)CrossRef Hong, W., Chen, T., Wu, H.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)CrossRef
22.
go back to reference Ruj, S., Stojmenovic, M., Nayak, A.: Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans. Parallel Distrib. Syst. 25(2), 384–394 (2014)CrossRef Ruj, S., Stojmenovic, M., Nayak, A.: Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans. Parallel Distrib. Syst. 25(2), 384–394 (2014)CrossRef
23.
go back to reference Devaki, P., Rao, Raghavendra, G.: A novel algorithm to protect the secret image through image fusion and verifying the dealer and the secret image. In: Proceedings of the 2014 Fifth International Conference on Signal and Image Processing (ICSIP). IEEE , pp. 77–80 (2014) Devaki, P., Rao, Raghavendra, G.: A novel algorithm to protect the secret image through image fusion and verifying the dealer and the secret image. In: Proceedings of the 2014 Fifth International Conference on Signal and Image Processing (ICSIP). IEEE , pp. 77–80 (2014)
24.
go back to reference Sharma, S., Mittal, U.: Comparative analysis of various authentication techniques in cloud computing. Int. J. Innov. Res. Sci. Eng. Technol. 2(4), 994–998 (2016) Sharma, S., Mittal, U.: Comparative analysis of various authentication techniques in cloud computing. Int. J. Innov. Res. Sci. Eng. Technol. 2(4), 994–998 (2016)
25.
go back to reference Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)CrossRef Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)CrossRef
26.
go back to reference Ye, J., Xu, Z., Ding, Y.: Secure outsourcing of modular exponentiations in cloud and cluster computing. Clust. Comput. 19(2), 811–820 (2016)CrossRef Ye, J., Xu, Z., Ding, Y.: Secure outsourcing of modular exponentiations in cloud and cluster computing. Clust. Comput. 19(2), 811–820 (2016)CrossRef
27.
go back to reference Pawar, A., Dani, A.: Review of security and privacy techniques in cloud computing environment. Springer Cloud Computing 1(2), 543–551 (2016) Pawar, A., Dani, A.: Review of security and privacy techniques in cloud computing environment. Springer Cloud Computing 1(2), 543–551 (2016)
Metadata
Title
An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment
Authors
T. Senthilnathan
P. Prabu
R. Sivakumar
S. Sakthivel
Publication date
24-02-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 5/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1765-3

Other articles of this Special Issue 5/2019

Cluster Computing 5/2019 Go to the issue

Premium Partner