Discover the SciOpen Platform and Achieve Your Research Goals with Ease.
Search articles, authors, keywords, DOl and etc.
Until now, some reversible data hiding in encrypted images (RDH-EI) schemes based on secret sharing (SIS-RDHEI) still have the problems of not realizing diffusivity and high embedding capacity. Therefore, this paper innovatively proposes a high capacity RDH-EI scheme that combines adaptive most significant bit (MSB) prediction with secret sharing technology. Firstly, adaptive MSB prediction is performed on the original image and cryptographic feedback secret sharing strategy encrypts the spliced pixels to spare embedding space. In the data hiding phase, each encrypted image is sent to a data hider to embed the secret information independently. When r copies of the image carrying the secret text are collected, the original image can be recovered lossless and the secret information can be extracted. Performance evaluation shows that the proposed method in this paper has the diffusivity, reversibility, and separability. The last but the most important, it has higher embedding capacity. For 512 × 512 grayscale images, the average embedding rate reaches 4.7358 bits per pixel (bpp). Compared to the average embedding rate that can be achieved by the Wang et al.’s SIS-RDHEI scheme, the proposed scheme with (2, 2), (2, 3), (2, 4), (3, 4), and (3, 5)-threshold can increase by 0.7358 bpp, 2.0658 bpp, 2.7358 bpp, 0.7358 bpp, and 1.5358 bpp, respectively.
X. Wu, J. Weng, and W. Yan, Adopting secret sharing for reversible data hiding in encrypted images, Signal Process., vol. 143, pp. 269–281, 2018.
Y. C. Chen, T. H. Hung, S. H. Hsieh, and C. W. Shiu, A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms, IEEE Trans. Inf. Forensics Secur., vol. 14, no. 12, pp. 3332–3343, 2019.
B. Chen, W. Lu, J. Huang, J. Weng, and Y. Zhou, Secret sharing based reversible data hiding in encrypted images with multiple data-hiders, IEEE Trans. Dependable Secure Comput., vol. 19, no. 2, pp. 978–991, 2022.
C. Qin, C. Jiang, Q. Mo, H. Yao, and C. C. Chang, Reversible data hiding in encrypted image via secret sharing based on GF(p) and GF(2⁸), IEEE Trans. Circuits Syst. Video Technol., vol. 32, no. 4, pp. 1928–1941, 2022.
Z. Hua, Y. Wang, S. Yi, Y. Zhou, and X. Jia, Reversible data hiding in encrypted images using cipher-feedback secret sharing, IEEE Trans. Circuits Syst. Video Technol., vol. 32, no. 8, pp. 4968–4982, 2022.
Z. X. Wang, M. Q. Zhang, and Y. J. Kong, Reversible data hiding in encrypted images based on image secret sharing, (in Chinese), Journal of Computer Applications, vol. 42, no. 5, pp. 1480–1489, 2022.
Y. Ke, M. Zhang, X. Zhang, J. Liu, T. Su, and X. Yang, A reversible data hiding scheme in encrypted domain for secret image sharing based on Chinese remainder theorem, IEEE Trans. Circuits Syst. Video Technol., vol. 32, no. 4, pp. 2469–2481, 2022.
Y. Wang and W. He, High capacity reversible data hiding in encrypted image based on adaptive MSB prediction, IEEE Trans. Multimed., vol. 24, pp. 1288–1298, 2022.
A. Shamir, How to share a secret, Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.
C. C. Thien and J. C. Lin, Secret image sharing, Comput. Graph., vol. 26, no. 5, pp. 765–770, 2002.
X. Jin, L. Su, and J. Huang, A reversible data hiding algorithm based on secret sharing, J. Inf. Hiding Priv. Prot., vol. 3, no. 2, pp. 69–82, 2021.
N. Zhou, M. Q. Zhang, and M. M. Liu, Reversible data hiding algorithm in homomorphic encrypted image based on secret sharing, Science Technology and Engineering, vol. 20, no. 19, pp. 7780–7786, 2020.
H. Ge, Y. Chen, Z. Qian, and J. Wang, A high capacity multi-level approach for reversible data hiding in encrypted images, IEEE Trans. Circuits Syst. Video Technol., vol. 29, no. 8, pp. 2285–2295, 2019.
X. Zhang, Reversible data hiding in encrypted image, IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, 2011.
Y. C. Chen, C. W. Shiu, and G. Horng, Encrypted signal-based reversible data hiding with public key cryptosystem, J. Vis. Commun. Image Represent., vol. 25, no. 5, pp. 1164–1170, 2014.
M. Preishuber, T. Hütter, S. Katzenbeisser, and A. Uhl, Depreciating motivation and empirical security analysis of chaos-based image and video encryption, IEEE Trans. Inf. Forensics Secur., vol. 13, no. 9, pp. 2137–2150, 2018.
Y. Liu, C. Yang, Y. Wang, L. Zhu, and W. Ji, Cheating identifiable secret sharing scheme using symmetric bivariate polynomial, Inf. Sci., vol. 453, pp. 21–29, 2018.
K. Meng, F. Miao, W. Huang, and Y. Xiong, Threshold changeable secret sharing with secure secret reconstruction, Inf. Process. Lett., vol. 157, p. 105928, 2020.
Z. Zhou, X. Dong, R. Meng, M. Wang, H. Yan, K. Yu, and K. K. R. Choo, Generative steganography via auto-generation of semantic object contours, IEEE Trans. Inform. Forensics Secur., vol. 18, pp. 2751–2765, 2023.
Z. Zhou, Y. Su, J. Li, K. Yu, Q. M. J. Wu, Z. Fu, and Y. Shi, Secret-to-image reversible transformation for generative steganography, IEEE Trans. Dependable Secure Comput., vol. 20, no. 5, pp. 4118–4134, 2023.
Y. Cao, Z. Zhou, C. Chakraborty, M. Wang, Q. M. J. Wu, X. Sun, and K. Yu, Generative steganography based on long readable text generation, IEEE Trans. Comput. Soc. Syst., vol. 11, no. 4, pp. 4584–4594, 2024.
The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).