IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image

Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image
View Sample PDF
Author(s): Asad Malik (School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China), Hongxia Wang (School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China), Hanzhou Wu (Institute of Automation, Chinese Academy of Sciences (CAS), Beijing, China & State Key Laboratory of Cryptology, Beijing, China)and Sani M. Abdullahi (School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China)
Copyright: 2019
Volume: 11
Issue: 1
Pages: 16
Source title: International Journal of Digital Crime and Forensics (IJDCF)
Editor(s)-in-Chief: Feng Liu (Chinese Academy of Sciences, China)
DOI: 10.4018/IJDCF.2019010104

Purchase

View Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image on the publisher's website for pricing and purchasing information.

Abstract

This article presents a new method which embeds multiple data from multiple users in an encrypted image. Here, the data from several users is embedded into an encrypted image. Initially, the image is encrypted by the owner followed by embedding phase, where the encrypted image is divided into four sets. Two of them are used to embed the secret data, while others are remain unaltered. The secret data from multiple users are embedded into Most Significant Bit (MSB) of the encrypted image using their location maps. In the extraction phase, an individual owner can extract the data from the encrypted image using the assigned private key. Subsequently, in the image decryption and recovery phase, images can be recovered using the unaltered neighbor pixels. However, the secret image can be recovered losslessly using the encryption key only. The proposed scheme allows the extraction of the embedded information only for the authorized user out of several users without knowing the cover information. Various simulations have been made related to this, which show the high embedding rate and accuracy.

Related Content

Shakir A. Mehdiyev, Tahmasib Kh. Fataliyev. © 2024. 17 pages.
Fuhai Jia, Yanru Jia, Jing Li, Zhenghui Liu. © 2024. 13 pages.
Dawei Zhang. © 2024. 16 pages.
Yuwen Zhu, Lei Yu. © 2023. 16 pages.
Vijay Kumar, Sahil Sharma, Chandan Kumar, Aditya Kumar Sahu. © 2023. 14 pages.
Wenjun Yao, Ying Jiang, Yang Yang. © 2023. 20 pages.
Dawei Zhang. © 2023. 14 pages.
Body Bottom