Highly Secure and Adaptive Multisecret Sharing for Reversible Data Hiding in Encrypted Images
Reversible data hiding in encrypted images (RDHEI) is a technique that not only allows the cover images can be fully restored without any loss of information after the embedded data has been extracted but also ensures the confidentiality within the cover images. This article proposes an RDHEI scheme...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2025-01-01
|
| Series: | IET Information Security |
| Online Access: | http://dx.doi.org/10.1049/ise2/6695380 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850032720914153472 |
|---|---|
| author | Jiang-Yi Lin Ching-Chun Chang Chin-Chen Chang Chin-Feng Lee |
| author_facet | Jiang-Yi Lin Ching-Chun Chang Chin-Chen Chang Chin-Feng Lee |
| author_sort | Jiang-Yi Lin |
| collection | DOAJ |
| description | Reversible data hiding in encrypted images (RDHEI) is a technique that not only allows the cover images can be fully restored without any loss of information after the embedded data has been extracted but also ensures the confidentiality within the cover images. This article proposes an RDHEI scheme combining adaptive (n, n) secret image sharing (SIS) manner. The content owner reserves part of the least significant bit plane (LSBP) in cover images by two most significant bit planes (MSBPs) compression using the median edge detector (MED) prediction method. To level up the privacy protection of n cover images, a two-layer encryption method is utilized to generate n shares, that is, the self-encryption and cross-encryption. Moreover, our method can be applied on no matter how many of cover images. The secret data with identification can be concealed by the data hiders into the vacated LSB of their own shares. Through the cooperation of the overall shares, the receiver can retrieve the embedded secret data and recover the cover images. Experiment results reveal the security reliability of our approach and the outstanding performance when compared to some related methods. Also, the approach can be employed in color image domain. |
| format | Article |
| id | doaj-art-dae6bf0ddc9149fb922d55556ad755c4 |
| institution | DOAJ |
| issn | 1751-8717 |
| language | English |
| publishDate | 2025-01-01 |
| publisher | Wiley |
| record_format | Article |
| series | IET Information Security |
| spelling | doaj-art-dae6bf0ddc9149fb922d55556ad755c42025-08-20T02:58:32ZengWileyIET Information Security1751-87172025-01-01202510.1049/ise2/6695380Highly Secure and Adaptive Multisecret Sharing for Reversible Data Hiding in Encrypted ImagesJiang-Yi Lin0Ching-Chun Chang1Chin-Chen Chang2Chin-Feng Lee3School of Computer and Information EngineeringInformation and Communication Security Research CenterDepartment of Information Engineering and Computer ScienceDepartment of Information Engineering and Computer ScienceReversible data hiding in encrypted images (RDHEI) is a technique that not only allows the cover images can be fully restored without any loss of information after the embedded data has been extracted but also ensures the confidentiality within the cover images. This article proposes an RDHEI scheme combining adaptive (n, n) secret image sharing (SIS) manner. The content owner reserves part of the least significant bit plane (LSBP) in cover images by two most significant bit planes (MSBPs) compression using the median edge detector (MED) prediction method. To level up the privacy protection of n cover images, a two-layer encryption method is utilized to generate n shares, that is, the self-encryption and cross-encryption. Moreover, our method can be applied on no matter how many of cover images. The secret data with identification can be concealed by the data hiders into the vacated LSB of their own shares. Through the cooperation of the overall shares, the receiver can retrieve the embedded secret data and recover the cover images. Experiment results reveal the security reliability of our approach and the outstanding performance when compared to some related methods. Also, the approach can be employed in color image domain.http://dx.doi.org/10.1049/ise2/6695380 |
| spellingShingle | Jiang-Yi Lin Ching-Chun Chang Chin-Chen Chang Chin-Feng Lee Highly Secure and Adaptive Multisecret Sharing for Reversible Data Hiding in Encrypted Images IET Information Security |
| title | Highly Secure and Adaptive Multisecret Sharing for Reversible Data Hiding in Encrypted Images |
| title_full | Highly Secure and Adaptive Multisecret Sharing for Reversible Data Hiding in Encrypted Images |
| title_fullStr | Highly Secure and Adaptive Multisecret Sharing for Reversible Data Hiding in Encrypted Images |
| title_full_unstemmed | Highly Secure and Adaptive Multisecret Sharing for Reversible Data Hiding in Encrypted Images |
| title_short | Highly Secure and Adaptive Multisecret Sharing for Reversible Data Hiding in Encrypted Images |
| title_sort | highly secure and adaptive multisecret sharing for reversible data hiding in encrypted images |
| url | http://dx.doi.org/10.1049/ise2/6695380 |
| work_keys_str_mv | AT jiangyilin highlysecureandadaptivemultisecretsharingforreversibledatahidinginencryptedimages AT chingchunchang highlysecureandadaptivemultisecretsharingforreversibledatahidinginencryptedimages AT chinchenchang highlysecureandadaptivemultisecretsharingforreversibledatahidinginencryptedimages AT chinfenglee highlysecureandadaptivemultisecretsharingforreversibledatahidinginencryptedimages |