Abstract
Reversible data hiding in encrypted domain (RDH-ED) is an important and effective technical approach for security data management of cloud computing, big data and privacy protection. This paper proposes a three-dimensional (3D) optical reversible data hiding (RDH) with integral imaging cryptosystem. The secret data is encrypted and embedded into the cover image. The receivers can decrypt the cover image and secret data with a reversible or lossless manner, respectively. The simulation experiment and results show that the data embedding rate can be increased to one. Besides, the quality of image decryption is quite high. The technique boasts the advantages of high data embedding rate, security level and real-time capability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liu, Y., Wang, X., Zhang, J., Zhang, M., Luo, P., Wang, X.A.: An improved security 3D watermarking method using computational integral imaging cryptosystem. Int. J. Technol. Hum. Interact. (IJTHI) 12, 1–12 (2016)
Pereira, R., Pereira, E.G.: Future internet: trends and challenges. Int. J. Space-Based Situated Comput. (IJSSC) 5, 159–167 (2015)
Akase, R., Okada, Y.: WebGL-based 3D furniture layout system using interactive evolutionary computation and its user evaluations. Int. J. Space-Based Situated Comput. (IJSSC) 4, 143–164 (2014)
Moore, P., Thomas, A., Tadros, G., et al.: Detection of the onset of agitation in patients with dementia: real-time monitoring and the application of big-data solutions. Int. J. Space-Based Situated Comput. (IJSSC) 3, 136–154 (2013)
Barton, J.M.: Method and apparatus for embedding authentication information within digital data. In: US Patent. US: 1997
Shi, Y.-Q., Li, X., Zhang, X., et al.: Reversible data hiding: advances in the past two decades. IEEE Access 3210–3237 (2016)
Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18, 255–258 (2011)
Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17, 774–778 (2007)
Cancellaro, M., Battisti, F., Carli, M., et al.: A commutative digital image watermarking and encryption method in the tree structured Haar transform domain. Signal Process. Image Commun. 26, 1–12 (2011)
Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Trans. Image Process. 10, 643–649 (2001)
Kuribayashi, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Process. 14, 2129–2139 (2005)
Jiayong, C., et al.: A secure image steganographic method in encrypted domain. J. Electron. Inf. Technol. 34, 1721–1726 (2012)
Zhang, X., Long, J., Wang, Z., Cheng, H.: Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Trans. Circuits Syst. Video Technol. 26, 1622–1631 (2015). 1
Ma, K., Zhang, W., Zhao, X., et al.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8, 553–562 (2013)
Markman, A., Carnicer, A., Javidi, B.: Security authentication with a three-dimensional optical phase code using random forest classifier. J. Opt. Soc. Am. A 33, 1160–1165 (2016)
Javidi, B., Carnicer, A., Yamaguchi, M., et al.: Roadmap on optical security. J. Opt. 18, 1–39 (2016)
Wang, Y., Du, J., Cheng, X., Lin, Z.L.K.: Degradation and encryption for outsourced PNG images in cloud storage. Int. J. Grid Util. Comput. 7, 22–28 (2016)
Honarvar, A.R., Sami, A.: Extracting usage patterns from power usage data of homes’ appliances in smart home using big data platform. Int. J. Inf. Technol. Web Eng. (IJITWE) 11, 39–50 (2016)
Alamareen, A., Al-Jarrah, O., Aljarrah, I.A.: Image mosaicing using binary edge detection algorithm in a cloud-computing environment. Int. J. Inf. Technol. Web Eng. (IJITWE) 11, 1–14 (2016)
Mola, L., Rossignoli, C., Carugati, A., Giangreco, A.: Business Intelligence System Design and its Consequences for Knowledge Sharing, Collaboration, and Decision-Making: An Exploratory Study. Int. J. Technol. Hum. Interact. (IJTHI) 11, 1–25 (2015)
Balusamy, B., Krishna, P.V.: Collective advancements on access control scheme for multi-authority cloud storage system. Int. J. Grid Util. Comput. 6, 133–142 (2015). Special Issue on Intelligent Grid and Cloud Computing
Sun, F., Liu, S.: Cryptographic pseudo-random sequence from the spatial chaotic map. Chaos, Solitons Fractals 41, 2216–2219 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Yiqun, L. (2018). Separable and Three-Dimensional Optical Reversible Data Hiding with Integral Imaging Cryptosystem. In: Barolli, L., Zhang, M., Wang, X. (eds) Advances in Internetworking, Data & Web Technologies. EIDWT 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 6. Springer, Cham. https://doi.org/10.1007/978-3-319-59463-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-59463-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-59462-0
Online ISBN: 978-3-319-59463-7
eBook Packages: EngineeringEngineering (R0)