Skip to main content
Log in

An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Nowadays there are numerous intruders trying to get the privacy information from cloud resources and consequently need a high security to secure our data. Moreover, research concerns have various security standards to secure the data using data hiding. In order to maintain the privacy and security in the cloud and big data processing, the recent crypto policy domain combines key policy encryption with reversible data hiding (RDH) techniques. However in this approach, the data is directly embedded resulting in errors during data extraction and image recovery due to reserve leakage of data. Hence, a novel shuffle block key encryption with RDH technique is proposed to hide the data competently. RDH is applied to encrypted images by which the data and the protection image can be appropriately recovered with histogram bit shifting algorithm. The hidden data can be embedded with shuffle key in the form of text with the image. The proposed method generates the room space to hide data with random shuffle after encrypting image using the definite encryption key. The data hider reversibly hides the data, whether text or image using data hiding key with histogram shifted values. If the requestor has both the embedding and encryption keys, can excerpt the secret data and effortlessly extract the original image using the spread source decoding. The proposed technique overcomes the data loss errors competently with two seed keys and also the projected shuffle state RDH procedure used in histogram shifting enhances security hidden policy. The results show that the proposed method outperforms the existing approaches by effectively recovering the hidden data and cover image without any errors, also scales well for large amount of data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Secur. 5(1), 187–193 (2010)

    Article  Google Scholar 

  2. Hong, W., Chen, T.-S., WuAn, H.-Y.: Improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)

    Article  Google Scholar 

  3. Zhang, X.: Separable encrypted image reversible data hiding. IEEE Trans. 7(2), 826–832 (2012)

    Google Scholar 

  4. Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255–258 (2011)

    Article  Google Scholar 

  5. Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)

    Article  Google Scholar 

  6. Chelliah, B.J., Jagadeesan, J., Nyapathy, N., Tiwari, N.: Reversible data hiding in encrypted images using AES data encryption technique. Int. J. Emerg. Res. Manag. Technol. 3(4), 28–35 (2014)

    Google Scholar 

  7. Wang, H., Zhang, W., Yu, N.: Protecting patient confidential information based on ECG reversible data hiding. Multimed. Tools Appl. 75(21), 13733–13747 (2015)

    Article  Google Scholar 

  8. Fu, Z., et al.: Achieving efficient cloud search services: multi keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2017)

    Article  Google Scholar 

  9. Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE Internet Comput. 14(5), 14–22 (2010)

    Article  Google Scholar 

  10. Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7), 989–999 (2009)

    Article  Google Scholar 

  11. ou, B., Li, X., Zhao, Y., Ni, R.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010–5021 (2013)

  12. Zhang, W., Hu, X., Li, X., Yu, N.: Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans. Image Process. 22(7), 2775–2785 (2013)

    Article  Google Scholar 

  13. Ni, Z., Shi, Y., Ansari, N., Wei, S.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)

    Article  Google Scholar 

  14. Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)

    Article  Google Scholar 

  15. Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 14(2), 253–266 (2005)

    Article  Google Scholar 

  16. Hong, W., Chen, T.-S., Chang, Y.-P., Shiu, C.-W.: A high capacity reversible data hiding scheme using orthogonal projection and prediction errormodification. Signal Process. 90, 2911–2922 (2010)

    Article  Google Scholar 

  17. Chang, C.-C., Lin, C.-C., Chen, Y.-H.: Reversible data-embedding scheme using differences between original and predicted pixel values. Inf. Secur. 2(2), 35–46 (2008)

    Article  Google Scholar 

  18. Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007)

    Article  Google Scholar 

  19. Hu, X., Zhang, W., Li, X., Yu, N.: Minimum rate prediction and optimized histograms modification for reversible data hiding. IEEE Trans. Inf. Forensics Secur. 10(3), 653–664 (2015)

    Article  Google Scholar 

  20. Ma, K., Zhang, W., Zhao, X.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)

    Article  Google Scholar 

  21. Hong, W., Chen, T., Wu, H.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)

    Article  Google Scholar 

  22. Ruj, S., Stojmenovic, M., Nayak, A.: Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans. Parallel Distrib. Syst. 25(2), 384–394 (2014)

    Article  Google Scholar 

  23. Devaki, P., Rao, Raghavendra, G.: A novel algorithm to protect the secret image through image fusion and verifying the dealer and the secret image. In: Proceedings of the 2014 Fifth International Conference on Signal and Image Processing (ICSIP). IEEE , pp. 77–80 (2014)

  24. Sharma, S., Mittal, U.: Comparative analysis of various authentication techniques in cloud computing. Int. J. Innov. Res. Sci. Eng. Technol. 2(4), 994–998 (2016)

    Google Scholar 

  25. Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)

    Article  Google Scholar 

  26. Ye, J., Xu, Z., Ding, Y.: Secure outsourcing of modular exponentiations in cloud and cluster computing. Clust. Comput. 19(2), 811–820 (2016)

    Article  Google Scholar 

  27. Pawar, A., Dani, A.: Review of security and privacy techniques in cloud computing environment. Springer Cloud Computing 1(2), 543–551 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. Senthilnathan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Senthilnathan, T., Prabu, P., Sivakumar, R. et al. An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment. Cluster Comput 22 (Suppl 5), 12839–12847 (2019). https://doi.org/10.1007/s10586-018-1765-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-1765-3

Keywords

Navigation