August & September  2019, 12(4&5): 1441-1455. doi: 10.3934/dcdss.2019099

An algorithm for reversible information hiding of encrypted medical images in homomorphic encrypted domain

School of Management, Guangdong University of Technology, Guangzhou 510520, China

* Corresponding author: Xueyan Wu

Received  June 2017 Revised  November 2017 Published  November 2018

At present, in reversible information hiding algorithm of image, the difference expansion idea is used. After the carrier image encryption, in encrypted image, information bits are embedded in the low value, resulting in the fact that in the image embedded with watermarking information, a part of the boundary pixel value has flipped. After being extracted, the carrier image cannot be recovered completely that is not only a large quantity of calculation, and the image quality has also been some damage. A algorithm for reversible information hiding of encrypted the medical image in the homomorphic encryption domain is proposed. Combining wavelet and fast fuzzy algorithm, the image edge is extracted from the high frequency and low frequency parts of medical image, and the medical image is reconstructed in the compressed boundary part. Combined with the thought of block compressed sensing and block edge pixels, the reconstructed medical image is divided to multiple non-overlapping blocks. The pixel in the right lower edge of the block is made homomorphic encryption operation, the remaining pixels are made compressed sensing operation, and the two parts are combined to a ciphertext to be sent to the owner of the channel According to the information hiding key the secret information is embedded into the ciphertext by the channel owners. The receiver can extract the information and restore the original image based on the encryption key and the information hiding key. The experimental results show that the proposed algorithm has high embedding capacity, the image quality after recovery is high, and the computational complexity is low.

Citation: Xueyan Wu. An algorithm for reversible information hiding of encrypted medical images in homomorphic encrypted domain. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1441-1455. doi: 10.3934/dcdss.2019099
References:
[1]

M. A. AkhaeeS. M. E. SahraeianB. Sankur and F. Marvasti, Information hiding with maximum likelihood detector for correlated signals, IEEE Transactions on Multimedia, 36 (2015), 144-155.  doi: 10.1016/j.dsp.2014.09.003.  Google Scholar

[2]

M. AzizM. H. Tayarani-N and M. Afsar, A cycling chaos-based cryptic-free algorithm for image steganography, Nonlinear Dynamics, 80 (2015), 1271-1290.   Google Scholar

[3]

B. BankJ. HeintzG. MateraJ. L. MontanaL. M. Pardo and A. R. Paredes, Quiz games as a model for information hiding, Journal of Complexity, 34 (2016), 1-29.  doi: 10.1016/j.jco.2015.11.005.  Google Scholar

[4]

A. BasuK. NandyA. BanerjeeS. GiriS. Sarkar and S. K. Sarkar, On the implementation of ip protection using biometrics based information hiding and firewall, International Journal of Electronics, 103 (2016), 177-194.   Google Scholar

[5]

H. ChenJ. NiW. Hong and T. S. Chen, Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering, Information Sciences, C (2017), 250-265.   Google Scholar

[6]

K. DongH. J. KimS. C. YongH. J. Sang and B. H. Chung, Reversible binary image watermarking method using overlapping pattern substitution, Etri Journal, 37 (2015), 990-1000.   Google Scholar

[7]

W. F., W. L. and W. T. T, Hidden optimization algorithm simulation analysis of large capacity images, Computer Simulation, 3 (2016), 409-412. Google Scholar

[8]

N. JiangN. Zhao and L. Wang, Lsb based quantum image steganography algorithm, International Journal of Theoretical Physics, 55 (2016), 3722-3736.  doi: 10.1007/s10773-016-3001-3.  Google Scholar

[9]

H. J. L. and Z. X. H., Adjustable reversible data hiding algorithm with large embedded capacity based on image gradient prediction, Journal of Jilin University (Engineering and Technology Edition), 2074-2079. Google Scholar

[10]

M. LiD. XiaoA. Kulsoom and Y. Zhang, Improved reversible data hiding for encrypted images using full embedding strategy, Electronics Letters, 51 (2015), 690-691.   Google Scholar

[11]

T. LuoG. JiangM. YuH. Xu and F. Shao, Inter-view local texture analysis based stereo image reversible data hiding, Digital Signal Processing, 48 (2016), 116-129.  doi: 10.1016/j.dsp.2015.09.007.  Google Scholar

[12]

K. Martin and K. Shankar, How often should you clean your room?, Discrete Mathematics and Theoretical Computer Science, 17 (2015), 413-441.   Google Scholar

[13]

Z. Qian, H. Zhou, W. Zhang and X. Zhang, Comments on Steganography Using Reversible Texture Synthesis, 4, IEEE Transactions on Image Processing, 2017. Google Scholar

[14]

S. S. H., Ubiquitous data gathering algorithm based on maximization of information gain in wireless sensor networks, in Journal of China Academy of Electronics and Information Technology, 4 (2017), 371-377. Google Scholar

[15]

L. B. Si and H. Y. Qiao, Evaluation of technological innovation efficiency in equipment manufacturing industry based on input orientation-panel data analysis based on data envelopment model, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2017), 1381-1386.   Google Scholar

[16]

H. UnnoR. YamkumC. Bunporn and K. Uehira, A new displaying technology for information hiding using temporally brightness modulated pattern, IEEE Transactions on Industry Applications, 53 (2017), 596-601.   Google Scholar

[17]

C. Y. WangL. LiH. R. LiC. L. Qin and H. Y. Zhao, Research on the digital image encryption algorithm based on double chaos, Bulletin of Science and Technology, 12 (2016), 169-173.   Google Scholar

[18]

Y. J. Wang Dong—Chen, Knowledge management of web financial reporting in human-computer interactive perspective., Eurasia Journal of Mathematics Science & Technology Education, 13 (2017), 3349-3373.   Google Scholar

[19]

L. YongS. Tuo and J. Shi, Sparse solution of some special optimization problems, Journal of Interdisciplinary Mathematics, 20 (2017), 595-602.   Google Scholar

[20]

X. Y. Zhang and J. Q. Wang, Consensus-based framework to mcgdm under multi-granular uncertain linguistic environment, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 33 (2017), 1263-1274.   Google Scholar

[21]

H. ZhengY. YangD. Xiao and J. He, Rdh in bcs images based on block edge pixel separation, Electronics Letters, 53 (2016), 18-20.   Google Scholar

show all references

References:
[1]

M. A. AkhaeeS. M. E. SahraeianB. Sankur and F. Marvasti, Information hiding with maximum likelihood detector for correlated signals, IEEE Transactions on Multimedia, 36 (2015), 144-155.  doi: 10.1016/j.dsp.2014.09.003.  Google Scholar

[2]

M. AzizM. H. Tayarani-N and M. Afsar, A cycling chaos-based cryptic-free algorithm for image steganography, Nonlinear Dynamics, 80 (2015), 1271-1290.   Google Scholar

[3]

B. BankJ. HeintzG. MateraJ. L. MontanaL. M. Pardo and A. R. Paredes, Quiz games as a model for information hiding, Journal of Complexity, 34 (2016), 1-29.  doi: 10.1016/j.jco.2015.11.005.  Google Scholar

[4]

A. BasuK. NandyA. BanerjeeS. GiriS. Sarkar and S. K. Sarkar, On the implementation of ip protection using biometrics based information hiding and firewall, International Journal of Electronics, 103 (2016), 177-194.   Google Scholar

[5]

H. ChenJ. NiW. Hong and T. S. Chen, Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering, Information Sciences, C (2017), 250-265.   Google Scholar

[6]

K. DongH. J. KimS. C. YongH. J. Sang and B. H. Chung, Reversible binary image watermarking method using overlapping pattern substitution, Etri Journal, 37 (2015), 990-1000.   Google Scholar

[7]

W. F., W. L. and W. T. T, Hidden optimization algorithm simulation analysis of large capacity images, Computer Simulation, 3 (2016), 409-412. Google Scholar

[8]

N. JiangN. Zhao and L. Wang, Lsb based quantum image steganography algorithm, International Journal of Theoretical Physics, 55 (2016), 3722-3736.  doi: 10.1007/s10773-016-3001-3.  Google Scholar

[9]

H. J. L. and Z. X. H., Adjustable reversible data hiding algorithm with large embedded capacity based on image gradient prediction, Journal of Jilin University (Engineering and Technology Edition), 2074-2079. Google Scholar

[10]

M. LiD. XiaoA. Kulsoom and Y. Zhang, Improved reversible data hiding for encrypted images using full embedding strategy, Electronics Letters, 51 (2015), 690-691.   Google Scholar

[11]

T. LuoG. JiangM. YuH. Xu and F. Shao, Inter-view local texture analysis based stereo image reversible data hiding, Digital Signal Processing, 48 (2016), 116-129.  doi: 10.1016/j.dsp.2015.09.007.  Google Scholar

[12]

K. Martin and K. Shankar, How often should you clean your room?, Discrete Mathematics and Theoretical Computer Science, 17 (2015), 413-441.   Google Scholar

[13]

Z. Qian, H. Zhou, W. Zhang and X. Zhang, Comments on Steganography Using Reversible Texture Synthesis, 4, IEEE Transactions on Image Processing, 2017. Google Scholar

[14]

S. S. H., Ubiquitous data gathering algorithm based on maximization of information gain in wireless sensor networks, in Journal of China Academy of Electronics and Information Technology, 4 (2017), 371-377. Google Scholar

[15]

L. B. Si and H. Y. Qiao, Evaluation of technological innovation efficiency in equipment manufacturing industry based on input orientation-panel data analysis based on data envelopment model, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2017), 1381-1386.   Google Scholar

[16]

H. UnnoR. YamkumC. Bunporn and K. Uehira, A new displaying technology for information hiding using temporally brightness modulated pattern, IEEE Transactions on Industry Applications, 53 (2017), 596-601.   Google Scholar

[17]

C. Y. WangL. LiH. R. LiC. L. Qin and H. Y. Zhao, Research on the digital image encryption algorithm based on double chaos, Bulletin of Science and Technology, 12 (2016), 169-173.   Google Scholar

[18]

Y. J. Wang Dong—Chen, Knowledge management of web financial reporting in human-computer interactive perspective., Eurasia Journal of Mathematics Science & Technology Education, 13 (2017), 3349-3373.   Google Scholar

[19]

L. YongS. Tuo and J. Shi, Sparse solution of some special optimization problems, Journal of Interdisciplinary Mathematics, 20 (2017), 595-602.   Google Scholar

[20]

X. Y. Zhang and J. Q. Wang, Consensus-based framework to mcgdm under multi-granular uncertain linguistic environment, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 33 (2017), 1263-1274.   Google Scholar

[21]

H. ZhengY. YangD. Xiao and J. He, Rdh in bcs images based on block edge pixel separation, Electronics Letters, 53 (2016), 18-20.   Google Scholar

Figure 1.  coefficient of medical images after block compression perception processing
Figure 2.  grouping rules of medical image
Figure 3.  standard test medical images
Figure 4.  average computing time for LE in medical images
Table 1.  the number of inlay pixels for eight test images
LE AI BA BN BO HI PE LA
b/($\uparrow$) 0 3 514 285 26 0 2 1
LE AI BA BN BO HI PE LA
b/($\uparrow$) 0 3 514 285 26 0 2 1
Table 2.  maximum embedding rate and maximum pure embedding rate of eight test images
LE AI BA BN BO HI PE LA
Maximum embedding rate/bpp 0.4855 0.4855 0.4802 0.4812 0.4855 0.4855 0.4932 0.4932
Maximum embedding rate/bpp 0..4854 0.4852 0.4525 0.4758 0.4825 0.4821 0.4921 0.4924
LE AI BA BN BO HI PE LA
Maximum embedding rate/bpp 0.4855 0.4855 0.4802 0.4812 0.4855 0.4855 0.4932 0.4932
Maximum embedding rate/bpp 0..4854 0.4852 0.4525 0.4758 0.4825 0.4821 0.4921 0.4924
Table 3.  Comparison of the results of different algorithms performed on LE
Algorithm Embedding rate = 0.0145 Embedding rate = 0.0524
Error rate/% Direct decryption image restore image Error/% rate/% Direct decryption image restore image
KF 1.425 38.1 54.25 14.25 36.58 45.8
ZF 0.074 38.1 68.47 2.58 36.58 51.41
LO 0.185 38.27 61.58 3.68 36.74 48.52
The proposed algorithm 0 26.85-42.1 $ \uparrow $ 0 22.14-49.55 $ \uparrow $
Algorithm Embedding rate = 0.0145 Embedding rate = 0.0524
Error rate/% Direct decryption image restore image Error/% rate/% Direct decryption image restore image
KF 1.425 38.1 54.25 14.25 36.58 45.8
ZF 0.074 38.1 68.47 2.58 36.58 51.41
LO 0.185 38.27 61.58 3.68 36.74 48.52
The proposed algorithm 0 26.85-42.1 $ \uparrow $ 0 22.14-49.55 $ \uparrow $
Table 4.  Comparison of the results of different algorithms performed on AI
Algorithm Embedding rate = 0.0145 Embedding rate = 0.0524
Error rate/% Direct decryption image restore image Error/% rate/% Direct decryption image restore image
KF 4.362 37.58 50.25 16.25 37.58 42.58
ZF 0.124 37.58 65.25 4.584 36.58 48.47
LO 0.685 36.78 48.25 5.147 36.14 48.62
The proposed algorithm 0 26.85-41.8 $ \uparrow $ 0 22.14-52.41 $ \uparrow $
Algorithm Embedding rate = 0.0145 Embedding rate = 0.0524
Error rate/% Direct decryption image restore image Error/% rate/% Direct decryption image restore image
KF 4.362 37.58 50.25 16.25 37.58 42.58
ZF 0.124 37.58 65.25 4.584 36.58 48.47
LO 0.685 36.78 48.25 5.147 36.14 48.62
The proposed algorithm 0 26.85-41.8 $ \uparrow $ 0 22.14-52.41 $ \uparrow $
Table 5.  Comparison of the results of different algorithms performed on BA
Algorithm Embedding rate = 0.0145 Embedding rate = 0.0524
Error rate/% Direct decryption image restore image Error/% rate/% Direct decryption image restore image
KF 33.25 36.25 38.58 25.25 36.25 39.58
ZF 20.54 36.25 40.25 9.25 36.25 43.25
LO 22.14 36.84 41.05 12.54 36.87 40.14
The proposed algorithm 0 22.14-32.14 $ \uparrow $ 0 21.15-50.15 $ \uparrow $
Algorithm Embedding rate = 0.0145 Embedding rate = 0.0524
Error rate/% Direct decryption image restore image Error/% rate/% Direct decryption image restore image
KF 33.25 36.25 38.58 25.25 36.25 39.58
ZF 20.54 36.25 40.25 9.25 36.25 43.25
LO 22.14 36.84 41.05 12.54 36.87 40.14
The proposed algorithm 0 22.14-32.14 $ \uparrow $ 0 21.15-50.15 $ \uparrow $
[1]

Juliang Zhang, Jian Chen. Information sharing in a make-to-stock supply chain. Journal of Industrial & Management Optimization, 2014, 10 (4) : 1169-1189. doi: 10.3934/jimo.2014.10.1169

[2]

J. Frédéric Bonnans, Justina Gianatti, Francisco J. Silva. On the convergence of the Sakawa-Shindo algorithm in stochastic control. Mathematical Control & Related Fields, 2016, 6 (3) : 391-406. doi: 10.3934/mcrf.2016008

[3]

Demetres D. Kouvatsos, Jumma S. Alanazi, Kevin Smith. A unified ME algorithm for arbitrary open QNMs with mixed blocking mechanisms. Numerical Algebra, Control & Optimization, 2011, 1 (4) : 781-816. doi: 10.3934/naco.2011.1.781

[4]

Lekbir Afraites, Abdelghafour Atlas, Fahd Karami, Driss Meskine. Some class of parabolic systems applied to image processing. Discrete & Continuous Dynamical Systems - B, 2016, 21 (6) : 1671-1687. doi: 10.3934/dcdsb.2016017

[5]

Simone Cacace, Maurizio Falcone. A dynamic domain decomposition for the eikonal-diffusion equation. Discrete & Continuous Dynamical Systems - S, 2016, 9 (1) : 109-123. doi: 10.3934/dcdss.2016.9.109

[6]

Zhihua Zhang, Naoki Saito. PHLST with adaptive tiling and its application to antarctic remote sensing image approximation. Inverse Problems & Imaging, 2014, 8 (1) : 321-337. doi: 10.3934/ipi.2014.8.321

[7]

Israa Mohammed Khudher, Yahya Ismail Ibrahim, Suhaib Abduljabbar Altamir. Individual biometrics pattern based artificial image analysis techniques. Numerical Algebra, Control & Optimization, 2021  doi: 10.3934/naco.2020056

[8]

Jia Cai, Guanglong Xu, Zhensheng Hu. Sketch-based image retrieval via CAT loss with elastic net regularization. Mathematical Foundations of Computing, 2020, 3 (4) : 219-227. doi: 10.3934/mfc.2020013

[9]

Carlos Fresneda-Portillo, Sergey E. Mikhailov. Analysis of Boundary-Domain Integral Equations to the mixed BVP for a compressible stokes system with variable viscosity. Communications on Pure & Applied Analysis, 2019, 18 (6) : 3059-3088. doi: 10.3934/cpaa.2019137

[10]

Xiaomao Deng, Xiao-Chuan Cai, Jun Zou. A parallel space-time domain decomposition method for unsteady source inversion problems. Inverse Problems & Imaging, 2015, 9 (4) : 1069-1091. doi: 10.3934/ipi.2015.9.1069

[11]

Teddy Pichard. A moment closure based on a projection on the boundary of the realizability domain: 1D case. Kinetic & Related Models, 2020, 13 (6) : 1243-1280. doi: 10.3934/krm.2020045

[12]

Luigi C. Berselli, Jishan Fan. Logarithmic and improved regularity criteria for the 3D nematic liquid crystals models, Boussinesq system, and MHD equations in a bounded domain. Communications on Pure & Applied Analysis, 2015, 14 (2) : 637-655. doi: 10.3934/cpaa.2015.14.637

2019 Impact Factor: 1.233

Metrics

  • PDF downloads (144)
  • HTML views (486)
  • Cited by (3)

Other articles
by authors

[Back to Top]