Skip to main content

Separable and Three-Dimensional Optical Reversible Data Hiding with Integral Imaging Cryptosystem

  • Conference paper
  • First Online:
Advances in Internetworking, Data & Web Technologies (EIDWT 2017)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 6))

  • 1381 Accesses

Abstract

Reversible data hiding in encrypted domain (RDH-ED) is an important and effective technical approach for security data management of cloud computing, big data and privacy protection. This paper proposes a three-dimensional (3D) optical reversible data hiding (RDH) with integral imaging cryptosystem. The secret data is encrypted and embedded into the cover image. The receivers can decrypt the cover image and secret data with a reversible or lossless manner, respectively. The simulation experiment and results show that the data embedding rate can be increased to one. Besides, the quality of image decryption is quite high. The technique boasts the advantages of high data embedding rate, security level and real-time capability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, Y., Wang, X., Zhang, J., Zhang, M., Luo, P., Wang, X.A.: An improved security 3D watermarking method using computational integral imaging cryptosystem. Int. J. Technol. Hum. Interact. (IJTHI) 12, 1–12 (2016)

    Article  Google Scholar 

  2. Pereira, R., Pereira, E.G.: Future internet: trends and challenges. Int. J. Space-Based Situated Comput. (IJSSC) 5, 159–167 (2015)

    Article  Google Scholar 

  3. Akase, R., Okada, Y.: WebGL-based 3D furniture layout system using interactive evolutionary computation and its user evaluations. Int. J. Space-Based Situated Comput. (IJSSC) 4, 143–164 (2014)

    Article  Google Scholar 

  4. Moore, P., Thomas, A., Tadros, G., et al.: Detection of the onset of agitation in patients with dementia: real-time monitoring and the application of big-data solutions. Int. J. Space-Based Situated Comput. (IJSSC) 3, 136–154 (2013)

    Article  Google Scholar 

  5. Barton, J.M.: Method and apparatus for embedding authentication information within digital data. In: US Patent. US: 1997

    Google Scholar 

  6. Shi, Y.-Q., Li, X., Zhang, X., et al.: Reversible data hiding: advances in the past two decades. IEEE Access 3210–3237 (2016)

    Google Scholar 

  7. Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18, 255–258 (2011)

    Article  Google Scholar 

  8. Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17, 774–778 (2007)

    Article  Google Scholar 

  9. Cancellaro, M., Battisti, F., Carli, M., et al.: A commutative digital image watermarking and encryption method in the tree structured Haar transform domain. Signal Process. Image Commun. 26, 1–12 (2011)

    Article  Google Scholar 

  10. Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Trans. Image Process. 10, 643–649 (2001)

    Article  MATH  Google Scholar 

  11. Kuribayashi, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Process. 14, 2129–2139 (2005)

    Article  Google Scholar 

  12. Jiayong, C., et al.: A secure image steganographic method in encrypted domain. J. Electron. Inf. Technol. 34, 1721–1726 (2012)

    Google Scholar 

  13. Zhang, X., Long, J., Wang, Z., Cheng, H.: Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Trans. Circuits Syst. Video Technol. 26, 1622–1631 (2015). 1

    Article  Google Scholar 

  14. Ma, K., Zhang, W., Zhao, X., et al.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8, 553–562 (2013)

    Article  Google Scholar 

  15. Markman, A., Carnicer, A., Javidi, B.: Security authentication with a three-dimensional optical phase code using random forest classifier. J. Opt. Soc. Am. A 33, 1160–1165 (2016)

    Article  Google Scholar 

  16. Javidi, B., Carnicer, A., Yamaguchi, M., et al.: Roadmap on optical security. J. Opt. 18, 1–39 (2016)

    Article  Google Scholar 

  17. Wang, Y., Du, J., Cheng, X., Lin, Z.L.K.: Degradation and encryption for outsourced PNG images in cloud storage. Int. J. Grid Util. Comput. 7, 22–28 (2016)

    Article  Google Scholar 

  18. Honarvar, A.R., Sami, A.: Extracting usage patterns from power usage data of homes’ appliances in smart home using big data platform. Int. J. Inf. Technol. Web Eng. (IJITWE) 11, 39–50 (2016)

    Article  Google Scholar 

  19. Alamareen, A., Al-Jarrah, O., Aljarrah, I.A.: Image mosaicing using binary edge detection algorithm in a cloud-computing environment. Int. J. Inf. Technol. Web Eng. (IJITWE) 11, 1–14 (2016)

    Article  Google Scholar 

  20. Mola, L., Rossignoli, C., Carugati, A., Giangreco, A.: Business Intelligence System Design and its Consequences for Knowledge Sharing, Collaboration, and Decision-Making: An Exploratory Study. Int. J. Technol. Hum. Interact. (IJTHI) 11, 1–25 (2015)

    Article  Google Scholar 

  21. Balusamy, B., Krishna, P.V.: Collective advancements on access control scheme for multi-authority cloud storage system. Int. J. Grid Util. Comput. 6, 133–142 (2015). Special Issue on Intelligent Grid and Cloud Computing

    Article  Google Scholar 

  22. Sun, F., Liu, S.: Cryptographic pseudo-random sequence from the spatial chaotic map. Chaos, Solitons Fractals 41, 2216–2219 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liu Yiqun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Yiqun, L. (2018). Separable and Three-Dimensional Optical Reversible Data Hiding with Integral Imaging Cryptosystem. In: Barolli, L., Zhang, M., Wang, X. (eds) Advances in Internetworking, Data & Web Technologies. EIDWT 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 6. Springer, Cham. https://doi.org/10.1007/978-3-319-59463-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59463-7_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59462-0

  • Online ISBN: 978-3-319-59463-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics