Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme
Encryption is a widely used solution to prevent privacy leakage and illegal spread when sensitive images are uploaded to cloud storage. Hiding technology also allows confidential data to be embedded into encrypted images for secret communication. As image accuracy without distortion is essential wit...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-02-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/12/4/1966 |
_version_ | 1827657343434752000 |
---|---|
author | Yi-Hui Chen Pei-Yu Lin Hsin-Pei Wu Shih-Hsin Chen |
author_facet | Yi-Hui Chen Pei-Yu Lin Hsin-Pei Wu Shih-Hsin Chen |
author_sort | Yi-Hui Chen |
collection | DOAJ |
description | Encryption is a widely used solution to prevent privacy leakage and illegal spread when sensitive images are uploaded to cloud storage. Hiding technology also allows confidential data to be embedded into encrypted images for secret communication. As image accuracy without distortion is essential within certain fields (such as medicine and the military), sensitive images must be completely decrypted back into the original images. However, an encrypted image is a noise-like pattern that is meaningless to a user; thus, it is difficult for a user to find the accurate image they desire. Take keywords as search indexes and embed them in encrypted images for encrypted image retrieval as an example. This idea has been extended by Chen and Line’s scheme to achieve higher capacity with reversibility. The proposed scheme adjusts the coding results according to smooth and complex images to increase its hiding capacity. In addition, two thresholds are designed to adjust the predicted pixel value to be close to the original one. Experiments show that compared with the other schemes, the proposed method achieves superior results. In addition, a hidden encrypted image can be extracted from the cover image. Afterward, the hidden secrets can be completely extracted, and sensitive images can also be perfectly restored. |
first_indexed | 2024-03-09T22:41:52Z |
format | Article |
id | doaj.art-b02af501931f4841922a3323a0001b04 |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-09T22:41:52Z |
publishDate | 2022-02-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-b02af501931f4841922a3323a0001b042023-11-23T18:37:02ZengMDPI AGApplied Sciences2076-34172022-02-01124196610.3390/app12041966Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme Yi-Hui Chen0Pei-Yu Lin1Hsin-Pei Wu2Shih-Hsin Chen3Department of Information Management, Chang Gung University, Taoyuan City 33302, TaiwanDepartment of Electrical Engineering, National Kaohsiung University of Science and Technology, Kaohsiung 80778, TaiwanDepartment of Business Administration, Soochow University, Taipei 10048, TaiwanDepartment of Computer Science and Information Engineering, Tamkang University, New Taipei City 251301, TaiwanEncryption is a widely used solution to prevent privacy leakage and illegal spread when sensitive images are uploaded to cloud storage. Hiding technology also allows confidential data to be embedded into encrypted images for secret communication. As image accuracy without distortion is essential within certain fields (such as medicine and the military), sensitive images must be completely decrypted back into the original images. However, an encrypted image is a noise-like pattern that is meaningless to a user; thus, it is difficult for a user to find the accurate image they desire. Take keywords as search indexes and embed them in encrypted images for encrypted image retrieval as an example. This idea has been extended by Chen and Line’s scheme to achieve higher capacity with reversibility. The proposed scheme adjusts the coding results according to smooth and complex images to increase its hiding capacity. In addition, two thresholds are designed to adjust the predicted pixel value to be close to the original one. Experiments show that compared with the other schemes, the proposed method achieves superior results. In addition, a hidden encrypted image can be extracted from the cover image. Afterward, the hidden secrets can be completely extracted, and sensitive images can also be perfectly restored.https://www.mdpi.com/2076-3417/12/4/1966reversible data embeddingprivacy protectionprivacy leakageimage encryptionhamming coding |
spellingShingle | Yi-Hui Chen Pei-Yu Lin Hsin-Pei Wu Shih-Hsin Chen Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme Applied Sciences reversible data embedding privacy protection privacy leakage image encryption hamming coding |
title | Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme |
title_full | Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme |
title_fullStr | Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme |
title_full_unstemmed | Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme |
title_short | Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme |
title_sort | joint hamming coding for high capacity lossless image encryption and embedding scheme |
topic | reversible data embedding privacy protection privacy leakage image encryption hamming coding |
url | https://www.mdpi.com/2076-3417/12/4/1966 |
work_keys_str_mv | AT yihuichen jointhammingcodingforhighcapacitylosslessimageencryptionandembeddingscheme AT peiyulin jointhammingcodingforhighcapacitylosslessimageencryptionandembeddingscheme AT hsinpeiwu jointhammingcodingforhighcapacitylosslessimageencryptionandembeddingscheme AT shihhsinchen jointhammingcodingforhighcapacitylosslessimageencryptionandembeddingscheme |