Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme

Encryption is a widely used solution to prevent privacy leakage and illegal spread when sensitive images are uploaded to cloud storage. Hiding technology also allows confidential data to be embedded into encrypted images for secret communication. As image accuracy without distortion is essential wit...

Full description

Bibliographic Details
Main Authors: Yi-Hui Chen, Pei-Yu Lin, Hsin-Pei Wu, Shih-Hsin Chen
Format: Article
Language:English
Published: MDPI AG 2022-02-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/12/4/1966
_version_ 1827657343434752000
author Yi-Hui Chen
Pei-Yu Lin
Hsin-Pei Wu
Shih-Hsin Chen
author_facet Yi-Hui Chen
Pei-Yu Lin
Hsin-Pei Wu
Shih-Hsin Chen
author_sort Yi-Hui Chen
collection DOAJ
description Encryption is a widely used solution to prevent privacy leakage and illegal spread when sensitive images are uploaded to cloud storage. Hiding technology also allows confidential data to be embedded into encrypted images for secret communication. As image accuracy without distortion is essential within certain fields (such as medicine and the military), sensitive images must be completely decrypted back into the original images. However, an encrypted image is a noise-like pattern that is meaningless to a user; thus, it is difficult for a user to find the accurate image they desire. Take keywords as search indexes and embed them in encrypted images for encrypted image retrieval as an example. This idea has been extended by Chen and Line’s scheme to achieve higher capacity with reversibility. The proposed scheme adjusts the coding results according to smooth and complex images to increase its hiding capacity. In addition, two thresholds are designed to adjust the predicted pixel value to be close to the original one. Experiments show that compared with the other schemes, the proposed method achieves superior results. In addition, a hidden encrypted image can be extracted from the cover image. Afterward, the hidden secrets can be completely extracted, and sensitive images can also be perfectly restored.
first_indexed 2024-03-09T22:41:52Z
format Article
id doaj.art-b02af501931f4841922a3323a0001b04
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-09T22:41:52Z
publishDate 2022-02-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-b02af501931f4841922a3323a0001b042023-11-23T18:37:02ZengMDPI AGApplied Sciences2076-34172022-02-01124196610.3390/app12041966Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme Yi-Hui Chen0Pei-Yu Lin1Hsin-Pei Wu2Shih-Hsin Chen3Department of Information Management, Chang Gung University, Taoyuan City 33302, TaiwanDepartment of Electrical Engineering, National Kaohsiung University of Science and Technology, Kaohsiung 80778, TaiwanDepartment of Business Administration, Soochow University, Taipei 10048, TaiwanDepartment of Computer Science and Information Engineering, Tamkang University, New Taipei City 251301, TaiwanEncryption is a widely used solution to prevent privacy leakage and illegal spread when sensitive images are uploaded to cloud storage. Hiding technology also allows confidential data to be embedded into encrypted images for secret communication. As image accuracy without distortion is essential within certain fields (such as medicine and the military), sensitive images must be completely decrypted back into the original images. However, an encrypted image is a noise-like pattern that is meaningless to a user; thus, it is difficult for a user to find the accurate image they desire. Take keywords as search indexes and embed them in encrypted images for encrypted image retrieval as an example. This idea has been extended by Chen and Line’s scheme to achieve higher capacity with reversibility. The proposed scheme adjusts the coding results according to smooth and complex images to increase its hiding capacity. In addition, two thresholds are designed to adjust the predicted pixel value to be close to the original one. Experiments show that compared with the other schemes, the proposed method achieves superior results. In addition, a hidden encrypted image can be extracted from the cover image. Afterward, the hidden secrets can be completely extracted, and sensitive images can also be perfectly restored.https://www.mdpi.com/2076-3417/12/4/1966reversible data embeddingprivacy protectionprivacy leakageimage encryptionhamming coding
spellingShingle Yi-Hui Chen
Pei-Yu Lin
Hsin-Pei Wu
Shih-Hsin Chen
Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme
Applied Sciences
reversible data embedding
privacy protection
privacy leakage
image encryption
hamming coding
title Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme
title_full Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme
title_fullStr Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme
title_full_unstemmed Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme
title_short Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme
title_sort joint hamming coding for high capacity lossless image encryption and embedding scheme
topic reversible data embedding
privacy protection
privacy leakage
image encryption
hamming coding
url https://www.mdpi.com/2076-3417/12/4/1966
work_keys_str_mv AT yihuichen jointhammingcodingforhighcapacitylosslessimageencryptionandembeddingscheme
AT peiyulin jointhammingcodingforhighcapacitylosslessimageencryptionandembeddingscheme
AT hsinpeiwu jointhammingcodingforhighcapacitylosslessimageencryptionandembeddingscheme
AT shihhsinchen jointhammingcodingforhighcapacitylosslessimageencryptionandembeddingscheme