1. Introduction
With the explosive growth of multimedia content, cloud computing has emerged as one of the most important computing paradigms in recent years. It has become an effective way for users to manage data. By outsourcing data to a cloud server, both large organizations and individual users can dynamically increase their storage space without having to purchase storage devices, and also reduce the costs of purchasing hardware equipment, managing corporate data and maintaining the system. [
1,
2,
3].
While enjoying the abundant storage and computation resources for cost saving and flexibility, the security and privacy of outsourced data also become great concerns for people. Because the cloud service providers (CSPs) are considered ‘‘honest but curious” under cloud environment, and many popular social network providers also exploit the outsourced personal image data to conduct behavioral advertising and preference analyses for improving user experience, some attackers also want to find the valuable information from the network. To provide privacy and security guarantees, people have proposed many kinds of schemes to protect the sensitive multimedia data outsourced to the cloud [
4,
5,
6].
At present, encryption and digital watermarking are two widely used means for protection of images such as medical images in the cloud [
7,
8,
9,
10,
11,
12,
13,
14,
15]. For the encryption scheme, Kanso et al. proposed a full and selective chaos-based image encryption scheme suitable for medical image encryption applications [
9]. Fu et al. proposed medical encryption based on bit plane permutation and pixel substation [
10]. Lima proposed fast medical images encryption scheme based on the cosine number transform [
11]. For the watermarking algorithms, people usually apply reversible watermarking algorithm to embed watermarking into the medical image, the original image can be totally restored when the watermarking is extracted [
12,
13,
14]. Moreover, some schemes can detect the tampers inside region of interest and recover original region of interest [
14]. Regarding the above algorithms, encryption algorithms are effective and have better performance for protection of medical images, but they can’t identify and locate the tampered position when the encrypted image is modified; digital watermarking algorithms based scheme can offset the defects of encryption algorithm, but watermarked image is visually the same as the original image, it is not suitable for privacy protection, especially not suitable for outsourcing the images to the cloud.
Based on the characteristics of the encryption and digital watermarking algorithms, people have proposed crypto-watermarking scheme by combining watermarking and encryption algorithm to protect image [
16,
17,
18,
19,
20,
21,
22,
23,
24]. One way of using crypto-watermarking scheme is that image is firstly encrypted, and then watermarking is embedded in encrypted domain [
16,
17,
18,
19,
20,
21]. For example, Priyanka et al. proposed a reversible information hiding scheme in encrypted domain, this scheme can securely transmit the media information over cloud architecture and prove rightful ownership of media using Chinese Remainder Theorem (CRT) based secret sharing algorithm [
18]. Zhang et al. presented a reversible data hiding in reversible image transformation domain [
19]. Priyanka recently gave a reversible data hiding scheme based on Shamir’s secret sharing for color images over cloud, the scheme permits the rightful owner to extract the information either directly from the cloud servers or after recovery of the media [
20].
Another kind of crypto-watermarking scheme is that watermarking is firstly embedded into the original image, and then watermarked image is encrypted [
22,
23,
24,
25]. For example, Dalel Bouslimi et al. proposed a joint encryption/watermarking system for protection of medical images based on substitutive watermarking algorithm, the quantization index modulation and an encryption algorithm. The scheme can verify integrity of restored image even though the image is stored in encrypted form [
22]. Sangita Zope-Chaudhari et al. showed a crypto-watermarking scheme by combining wavelet-based watermarking and multiplicative-transposition-based encryption to protect multispectral images [
23]. Xiang et al. studied a crypto-watermarking scheme for resource-limited client, in the scheme, the client is responsible for embedding information, while cloud server implements encryption based on chaotic systems [
24]. Recently, a verifiable secret sharing scheme based on random grid and reversible watermarking for outsourcing images to the cloud was presented by Gao et al, in the scheme, original secret image is divided into some sub-images, and reversible watermarking is used for embedding hash value of the secret image into the image itself, then encryption are implemented to generate some sharing secrets, which are outsourced into the cloud, the scheme can restore the original secret image without any loss, and can verify the integrity of the restored image[
25].
Medical images are a class of special images with specific characteristics and requirements. Any imperfects in image, especially in the region of interest (ROI) will result in misdiagnosis [
26]. These strict specifications regarding the quality of medical images must be met when security and privacy are considered. In this paper, a novel verifiable privacy preservation scheme for outsourcing medical image to cloud through region of interest (ROI) based crypto-watermarking is proposed. In the scheme, data owner firstly calculates the hashes of the ROI blocks of medical image, and executes substitution of S-box for ROI and separation of bit plane. Secondly, data owner embeds the hashes into the separated bit plane images. Lastly, some hashes are transformed into the initial value and parameters of chaotic maps, and encryption for two bit plane images is implemented to get two sharing secrets, which are outsourced to the different cloud servers. For any authorized user who wants to access the image, he firstly gets secret key from the data owner, downloads the corresponding sharing secrets; and then he can decrypt the sharing secrets and extract the data embedded in the sharing secrets. Thus he can confirm whether the restored image is the same as the original one, and moreover, he can also locate the tampered parts if the sharing secrets are damaged. The effectiveness of the proposed scheme is demonstrated by a large number of experiments.
The highlights of the paper lie in the following points:
(1) Compared with state-of-the-art schemes, the prosed crypto-watermarking scheme for medical image can verify the integrity of recovered image; it can also identify the tampered blocks inside ROI. This is especially suitable for the application of outsourcing medical image to the cloud.
(2) In the proposed scheme, the sharing secrets have good performance of privacy protection. Attackers can’t get any available information from the sharing secrets.
(3) The secret key of the scheme depends on image itself; different images use different secret keys. Damages to anyone of sharing secrets will affect the recovery of original image.
The rest of the paper is organized as follow:
Section 2 introduces the reversible watermarking and S-box.
Section 3 presents the proposed method in detail. The simulations and analyses are reported in
Section 4. The conclusion is given in
Section 5.
2. Preliminaries
In this section, some concepts and knowledge such as S-box and reversible watermarking used in the proposed scheme are first reviewed.
2.1. Reversible watermarking
Digital watermarking can be used for the copyright protection, tamper detection, traitor tracing of multimedia through embedding some specific data into the image [
27,
28,
29]. Reversible watermarking, also known as lossless watermarking, is a technique for reversibly embedding watermarks in digital content, the original multimedia can be totally restored when the digital watermarking is extracted, this feature makes it suitable for the protection of important multimedia data, such as images from the medical and military sectors. One of the most widely used algorithms is histogram shifting-based methods (HS) [
30]; it is reviewed below.
For a grey image, the histogram of the image is first presented. Then the data pair is found, where, is a peak point of histogram, and is a zero point in the histogram. The histogram shifting based watermarking algorithm can be implemented in the following steps.
(1) Scan all the pixels of the image, if the pixel value satisfies the condition
then, let
, where,
p is the value of the pixel.
(2) Watermarking embedding. Scan all the pixels, if the pixel value is equal to
, the watermarking is embedded according to formula (2)
where,
w is watermarking bit.
The process of extracting the watermark and restoring the original image is described below.
(1) Watermarking extraction. Scan all the pixels of the watermarked image, if the pixel value is equal to , then extracted watermarking bit is 0; if the pixel value is equal to, then bit 1 is extracted;
(2) Restoration of the original image. Scan all the pixels of the watermarked image, if the value of pixel is equal to
, then, let add the pixel value by 1, this operation restores the peak point of the image. Next, the original image will be lossless restored by formula (3)
Figure 1 illustrates the process of HS based watermarking embedding. The distribution of pixels of image is given in the
Figure 1(a). It can be seen that pixel value 133 is the peak point, and the 234 is the zero point. Then, shift the pixels between 134 and 233 to the right and it results in distribution of pixel as described in
Figure 1(b). After the shifting, the adjacent pixel value (134) of peak point is changed into the zero point, as shown in
Figure 1(c). Thus, the watermarking embedding can be conducted through pixel value 133 and 134.
2.2. S-boxes
Substitution boxes (S-boxes) are the most essential parts of modern cryptographic applications. S-boxes are multi-input and multi-output boolean functions that map binary input to binary output values [
31]. S-boxes with high cryptographic features have been used in encryption to resist differential cryptanalysis. The Rijndael S-box shown in
Table 1 is a square matrix, which the Advanced Encryption Standard (AES) crptographic algorithm is based on. In order to enhance the security of algorithm, the Rijndael S-box is used for substitution of pixel in the proposed scheme.
3. Proposed scheme
To protect the privacy of the data, the data owner often encrypts the data before it is outsourced to the cloud. As shown in
Figure 2, some roles based on real applications for outsourced data management are data owner, authorized user and cloud server.
Data owner:He has some set of files . He wants to outsource these files in encrypted form to the cloud server. And he also hopes that these files can be searched by a series of keywords . To protect the file from attack, he hopes to create a secure, ranked, searchable index from the keywords. This would be stored on the cloud server.
Authorized user: He hopes that the files relevant to certain or several keywords will be sent to the cloud server. The cloud server selects the corresponding files, and he can download the files from the cloud, and then decrypt it.
Cloud server: It stores the files and the index of the keywords. When it receives the query from the user, it can index the query and return the search results according to a number of ranked relevance criteria.
In this paper, what we concern is how to outsource the image to the cloud safely, such that for authorized user, he can verify the integrity of the file when he downloads the file. The detailed scheme is given in next subsections.
3.1. Generation of sharing secret
To generate the sharing secret, the following steps are followed to achieve the goal.
(1) Manually partition the original image into ROI and non-ROI sections, and the coordinate of upper left of the ROI is given by , and the coordinate in lower right is recoded by .
(2) Divide ROI into some no overlapping sub-blocks with the size of , the corresponding number of block is . Next, the 256-bits hash is calculated for every block. These hashes are represented by .
(3) Transform every
expressed by
into 128-bits by formula (4).
(4) Conduct substitution of pixels value for the ROI using S-box. Firstly, for every pixel value p in ROI, extract its high 4-bits and low 4-bits, respectively, they can be named and . Next, replaces the pixel value of ROI with the value of S-box in the coordinate position of . stands for the row, andstands for column in the S-box. The generated image after S-box substitution is expressed by .
(5) Bit plane separation. Separate the image
into two images
and
, where,
is generated by the most significant bits (MSBs), which is the high 4-bits of the
, and
is generated by the least significant bits (LSBs), which is the low 4-bits of the
. The process of bit plane separation is depicted in
Figure 3.
(6) Embed the hashes of 128 bits into the two images, and based on HS method. The produced images are labeled by and .
(7) Select secret key for image diffusion. Select the number and , the following steps are used to generate two sharing secret images.
1) Divide
of 128-bits, expressed by
into two sections, every section has 64 bits, then convert
into some integers, respectively.
Obviously,
,
,
,
.Then,
u,
and
k are transformed with the following constraints.
Next, iterate chaotic Sine-Sine system (SSS) defined in the formula (7) for
times, and then dispose these elements by formula (8).
Here, N is the number of pixel in image. stands for the absolute value of x. is equal to the value of x to the nearest integers less than or equal to x, generates the remainder after division.
Lastly, arrange the last N integers from to into a matrix with the same size as that of the image to be diffused.
2) For other 64-bits
of
, use the procedures as the same of 1) to generate a matrix
, here, the chaotic map used is Chebyshev-Chebyshev system (CCS) defined in formula (9)
The better performances of chaotic CCS and SSS for encryption can be found in Reference [
32,
33].
3) Obtain sharing secret from the diffusion of the
. by the following diffusion equation.
where,
,
.
and
L are the length and width of image, respectively.
is the arithmetic plus operator, and
is the bit-level XOR operator. The generated
is one of the sharing secrets.
In the same way, the second sharing secret image can be derived using and. Then, the tow shares are outsourced to different cloud servers.
Figure 4 shows the detailed flowchart of generation of sharing secret.
3.2. Restoration of original secret image
For authorized users, when they want to access the image from the cloud, the data owner will give them the secret key in a secret way. The original secret image is then restored using the following steps.
(1) Download two sharing secrets and from two cloud servers.
(2) Use the same key as that used in the generation procedures of sharing secrets to generate matrixes using chaotic maps (7) and (9). Then implements the inverse operation of formula (10) between the matrixes and sharing secret, thus two images with the size of are produced.
(3) Extract the watermarking from using HS based reversible watermarking algorithm to get two images, and then produce one image using the formula.
(4) Implement inverse S-box replacement of ROI for image to produce image I.
(5) Use the same method as Step 2 in the phase of generation of sharing secret to obtain . And then compare these hash values with the watermarking data extracted in Step 3, thus, we can locate whether the corresponding block in ROI is tampered. Moreover, the position of tampered parts can be located.
4. Experimental results and discussions
The experiment was conducted by MATLAB version 12b. The 256-grey scale test images with the size of
are given in
Figure 5.
4.1. Experimental results
Firstly, the ROI is described for every test image, the coordinates of upper left and lower right of test image are given in
Table 2. As an example, for image IM-0001-0012, the separated bit plane image of MSBs and LSBs following the S-box substitution are given in
Figure 6 (a-b).
Figure 6(c-d) displays the two sharing secrets outsourced to the cloud.
4.2. Security analysis of the proposed scheme
A good encryption algorithm should have large key space to resist brute force attacks, and also should be sensitive to key. In this section, some security analyses are presented.
1) Key space analysis
It can be seen from the scheme that the medical image is safely outsourced to the cloud. Because different sharing secret is outsourced to the different cloud server, anyone, including cloud server itself can’t obtain useful information about the image, and different sharing secret can only be decrypted by specific secret key. For example, the 128-bit secret key “50192EC81EFD534ED830D3BE68F0B53F” is used to generate sharing secret
Figure 6(c); another secret key used for generating sharing secret
Figure 6(d) is “8437EBF46D99CB55A00D77FCDF143369”. In the meantime, the secret key highly depends on the image itself. Moreover, based on the characteristic of hash function, for any two different images, the secret keys used for generating sharing secret are different. This is a one-time pad from the point of encryption. The coordinate of the ROI, S-boxes, and hash of the image constitute the secret space of the scheme, combining to form the secret key with the size of more than
. This ensures the security of the scheme.
2) Key Sensitivity Analysis
Here, we test the key sensitivities in the process of generation of sharing secret. For this test, the secret key is changed only one bit, and then conducts encryption. Result of this encryption is compared with the sharing secret generated by correct key. Key sensitivity is measured by NPCR (number of pixels change rate) and UACI (unified average changing intensity), which are expressed by formula (11).
W and
L are the width and length of the sharing secret,
are pixel values of two sharing secrets generated by different secret keys.
All the tests are implemented based on modification of the last bit of the secret key. The corresponding values of NPCR and UACI for test images are summarized in
Table 3. In reference [
34], the expected values of NPCR and for a 256-Grayscale image are 99.6094% and 33.4635%. Obviously, the average values of UACI and NPCR are 33.465% and 99.61%, the proposed scheme has high sensitivity to the secret key in the encryption process.
3) Analysis against Known-Plaintext Attack and Chosen Cipher text Attack
In the known-plaintext attack, attackers attempt to find secret keys by obtained plaintext and the corresponding cipher text. For chosen-cipher text, attackers try to find plain text information by obtaining the decryptions of chosen cipher texts. In the proposed scheme, attackers can’t obtain any plain image in the cloud, and they also can’t decrypt anyone of the sharing secret using incorrect keys. Even if the attacker knows the correct keys, owing to he does not know how to implement the encryption/decryption operations, he also cannot decrypt the image correctly.
4) Analysis against collude attack
Obviously, the scheme shows that the sharing secrets are in the different cloud servers, and they use different keys to generate the sharing secret. The data owner or user can perform the final verification and acknowledgement of the original image. So even if different servers can collude to use a fake sharing secret to pretend to be the real one, the data owner can also distinguish the real from the fake of the restored original image, because only the owner has the private key to restore the original image. This makes it difficult for multiple servers to collude to deceive data owners or users.
4.3. Privacy protection analysis
Privacy in the cloud includes data privacy, index privacy and keyword and enquiry privacy. Here, we only discuss data privacy; others are outside of the paper.
Data privacy means the data in the cloud is secure and anyone including CSPs can’t obtain the plaintext of the data.
In the proposed scheme, medical images are stored in the cloud in the encrypted sharing secret form. The histograms of the sharing secrets generated by image IM-0001-0012 are shown in
Figure 7. Obviously, the histograms of the sharing secrets are nearly distributed uniformly; they don’t provide any clues to statistical attack. On the other hand, adjacent pixels of a meaningful image have high correlation. In order to test the correlation between two adjacent pixels, 16384 pairs of two adjacent pixels for sharing secret are randomly selected to calculate the correlation coefficient by the following formulas [
12].
where
x and
y are grey values of two adjacent pixels in the image. The outcomes of sharing secret images are listed in
Table 4. It can be seen that the correlation of adjacent pixels in the sharing secret images are very low. One can’t obtain any useful information from the sharing secrets. The scheme has better performance of privacy protection.
4.4. Tampers localization of restored image.
From the description of the proposed scheme, we know that the user can verify the integrity of ROI for the restored image, and locate the position of the tampered image. In order to give a total understanding of tampers localization, the example illustrates the verification process for the restored image.
For example, for the second sharing secret image generated from image IM-0001-0012, see the image block in blue color in
Figure 8(a), the first pixel value is changed to 111 from the original value 106; the second pixel is changed to 100 from 97. Obviously, the sharing secret is tampered. Next the tampered image block will be located.
Firstly, the two sharing secrets are decrypted, and then hashes of the original image blocks are extracted, the data is represented by . N is the total number of block.
Secondly, conduct the superposition of two sharing secret to produce one image by plus the pixels of the corresponding position, and then carry out the reversible substitution of S-box for the ROI. The restored image is shown in
Figure 8(b).
Lastly, for the restored image, calculate the hashes of every block in ROI, these values are marked by
It is found that the hash value of
is different from the value of
by comparing
and
,:
Thus, the tampered part is located, which is shown in blue color in
Figure 8(c).
It can be seen that the original image is not losslessly restored, although there is no clear visual difference between the restored image and the original.
4.5. Comparison Analysis of Performance
Up to now, people have proposed many effective ways to protect medical image. Some comparisons with other state-of-art methods on integrity verification, tampers localization and error in image recovery (ROI) are given in
Table 5 and
Table 6.
- (1)
Comparison with the existing encryption algorithms
Most of available encryption schemes for medical images have no integrity verification ability for restored one from the encrypted image. When the encrypted image is tampered, even if the secret key is correct, one can’t make sure whether the restored image is the same as the original one. This will affect the application of medical images. Some comparisons in integrity verification and tamper localization are summarized in
Table 5.
- (2)
Comparison with the existing Crypto-Watermarking algorithms
Digital watermarking can provide performance of integrity verification, especially for reversible watermarking based crypto-watermarking schemes, but some methods can’t achieve totally reversibility. The comparison results are done in
Table 6.
- (3)
Comparison with newly proposed verifiable secret sharing for outsourcing images into cloud
Different from the scheme proposed in [
25], the scheme in this paper aims at ROI in medical image, and the hashes of blocks in ROI are embedded into the two bit planes, we can verify the integrity of the restored image, and moreover, the tampered sections in ROI can also be located, this is the better performance that reference [
25] has not.
In addition to, the generation process of sharing secrets are different between the proposed scheme and reference [
25], and the proposed scheme needs some secret keys to recover the original secret image, but the secret keys are located on the sharing secrets in reference [
25].
Obviously, because the special characteristics and requirements of medical images must be met, any compromise on the quality of medical images could result in misdiagnosis. The proposed scheme has better privacy protection, and it can restore the original medical image in reversible operation, verify the integrity of ROI and locate the tampers inside ROI. These better performances outperform many protection schemes for medical images. The proposed scheme can be used for outsourcing medical image to the cloud.
5. Conclusions
Medical images are more typical than any other ordinary images, since it can be used for diagnosis purpose. Such images need security and confidentiality; it also needs to be totally restored when it is used. Region of interest (ROI) are the most important parts for diagnostic in medical image. A novel verifiable privacy preservation scheme for outsourcing medical image to cloud through ROI based crypto-watermarking is proposed in the paper. In the proposed scheme, data owner carries out substitution of S-box for the region of interest (ROI), separation the image, watermarking embedding and image diffusion based on chaotic maps, and outsources to generated two sharing secrets to the cloud servers. For any authorized user, he can download shares from a cloud server and, through a series of decryption operations, can recover the original medical image without loss. Furthermore, the user can verify whether the original image is completely reconstructed, and even can locate the tampered parts inside ROI if anyone of the sharing secrets is damaged. A large number of experiments demonstrate the effectiveness of the proposed scheme and better performance in comparison with most existing methods.
Next, under the condition that the tampers are located in restored image, the restoration technology of the tampered parts inside ROI in medical image by using crypto-watermarking, will be researched.
Author Contributions
Conceptualization, Chuan Zhou; Investigation, Yi Zhou; Methodology, Chuan Zhou; Project administration, Xiangzhi Liu; Supervision, Xiangzhi Liu; Writing – original draft, Chuan Zhou; Writing – review & editing, Chuan Zhou.
Funding
This research received no external funding.
Data Availability Statement
The data presented in this study are available on request from the corresponding author.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Keying Li and Hua Ma: Outsourcing decryption of multi-authority ABE cipher texts, International Journal of Network Security, 16(4) (2014) 286-294.
- Arpita Banik, Zeba Shamsi, Dolendro Singh Laiphrakpam, An encryption scheme for securing multiple medical images, Journal of Information Security and Applications 49 (2019) 102398. [CrossRef]
- Praveen Kumar P, Syam Kumar P, Alphonse P.J.A. Attribute based encryption in cloud computing: A survey, gap analysis, and future directions Journal of Network and Computer Applications, 108(15) (2018) 37-52. [CrossRef]
- D. Agrawal, A. A. El, F. Emekci, A.Metwally and S. Wang: Secure data management service on cloud computing infrastructures, Proceedings of Service and Application Design Challenges in the Cloud, (2011) 57-80. [CrossRef]
- J. L. Dautrich and C. V. Ravishankar: Security limitations of using secret sharing for data outsourcing, in Proc. of Proceedings of the 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, Paris, France, (2012) 145-160. [CrossRef]
- Hui Zhu, Rongxing Lu, Cheng Huang et.al: An efficient privacy-preserving location-based services query scheme in outsourced cloud, IEEE Transactions on Vehicular Technology, 65(9) (2016).7729-7739. [CrossRef]
- Qin Zou, Jianfeng Wang, Jun Ye et.al: Efficient and secure encrypted image search in mobile cloud computing. Soft Computing, 4 (2016) 1-11. [CrossRef]
- Ali Al-Haj, Gheith Abandah, Noor Hussein, Crypto-based algorithms for secured medical image transmission, IET Information Security, 9(6) (2015) 365–373. [CrossRef]
- Zhongyun Hua, Shuang Yi, Yicong Zhou, Medical image encryption using high-speed scrambling and pixel adaptive diffusion, Signal Processing 144 (2018) 134-144. [CrossRef]
- Kanso, M. Ghebleh, An efficient and robust image encryption scheme for medical applications, Communication in Nonlinear Science and Numerical Simulation, 24 (2015) 98-116. [CrossRef]
- Chong Fu, Wei-hong Meng, Yong-feng Zhan, An efficient and secure medical image protection scheme based on chaotic maps, Computers in Biology and Medicine 43(2013)1000-1010. [CrossRef]
- J.B. Lima, F.Madeiro, F.J.R.Sales, Encryption of medical images based on the cosine number transform, Signal Processing: Image Communication 35 (2015) 1-8. [CrossRef]
- Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang, A reversible data hiding method by histogram shifting in high quality medical images, The Journal of Systems and Software 86 (2013) 716-727. [CrossRef]
- Nazir A. Loan, Shabir A. Parah, Javaid A. Sheikh, Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications, Journal of Biomedical Informatics 73 (2017) 125-136. [CrossRef]
- Rayachoti Eswaraiah, Edara Sreenivasa Reddy, Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest, IET Image Process., 9(8) (2015) 615-625. [CrossRef]
- Amit Kumar Singh, Mayank Dave, Anand Mohan, Hybrid technique for robust and imperceptible multiple watermarking using medical images, Multimedia Tools and Applications, 75(14) (2016) 8381-8401. [CrossRef]
- Chih-Wei Shiu, Yu-Chi Chen, Wien Hong, Encrypted image-based reversible data hiding with public key cryptography from difference expansion, Signal Processing: Image Communication 39 (2015) 226-233. [CrossRef]
- Jiantao Zhou, Weiwei Sun, Li Dong, et al. Secure reversible image data hiding over encrypted domain via key modulation, IEEE Transactions on Circuits and Systems for Video Technology, 26(3) (2016) 441-452. [CrossRef]
- Priyanka Singh, Balasubramanian Raman, Reversible data hiding for rightful ownership assertion of images in encrypted domain over cloud, International Journal of Electronics and Communications (AEÜ) 76 (2017) 18-35. [CrossRef]
- Weiming Zhang, Hui Wang, Dongdong Hou, Reversible data hiding in encrypted images by reversible image transformation, IEEE Transactions on Multimedia, 18(8) (2016) 1469. [CrossRef]
- Priyanka Singh, Balasubramanian Raman, Reversible data hiding based on Shamir’s secret sharing for color images over cloud, Information Sciences 422 (2018) 77-97. [CrossRef]
- Han-Zhou Wu, Yun-Qing Shi, Hong-Xia Wang, Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification, IEEE Transactions on Circuits and Systems for Video Technology, 27(8) (2017) 1-1. [CrossRef]
- Dalel Bouslimi, Gouenou Coatrieux, Michel Cozic et.al, A joint encryption/watermarking system for verifying the reliability of medical images, IEEE Transactions on Information Technology in Biomedicine, 16(5) (2012) 891. [CrossRef]
- Sangita Zope-Chaudhari, Parvatham Venkatachalam, Krishna Mohan Buddhiraju, Secure dissemination and protection of multispectral images using crypto-watermarking, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 8(11) (2015) 5388-5394. [CrossRef]
- Tao Xiang, Jia Hu, Jianglin Sun, Outsourcing chaotic selective image encryption to the cloud with steganography, Digital Signal Processing 43 (2015) 28-37. [CrossRef]
- Hang, Gao, Mengting Hu, Tiegang Gao, et al. Random grid and reversible watermarking-based on verifiable secret sharing for outsourcing images in cloud, International Journal of Digital Crime and Forensics, 10(1)(2018) 24-39.. [CrossRef]
- Aggeliki Giakoumaki, Sotiris Pavlopoulos, Dimitris Koutsouris, Multiple image watermarking applied to health information management, IEEE Transactions on Information Technology in Biomedicine, 10(4) (2006) 722-732. [CrossRef]
- Xiaojun Qi, Xing Xin: A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization, Journal of Visual Communication and Image Representation, 30 (2015) 312-327. [CrossRef]
- Nasrin M. Makbol, Bee Ee Khoo: A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition, Digital Signal Processing, 33 (2014) 134-147. [CrossRef]
- Zhang Wenyin, Frank Y. Shih: Semi-fragile spatial watermarking based on local binary pattern operators, Optics Communications, 284(16-17) (2011) 3904-3912. [CrossRef]
- Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding, IEEE Transactions on Circuits Systems for Video Technology, 16 (3) (2006) 354-362 . [CrossRef]
- Dimitris Souravlias, Konstantinos E. Parsopoulos, Gerasimos C. Meletiou, Designing bijective s-boxes using algorithm portfolios with limited time budgets, Applied Soft Computing 59 (2017) 475-486. [CrossRef]
- C Pak, L. Huang, A new color image encryption using combination of the 1D chaotic map, Signal Processing, 138 (2017) 129-137. [CrossRef]
- A Pandey , BS Saini , B Singh ,An Integrated Approach Using Chaotic Map & Sample Value Difference Method for Electrocardiogram Steganography and OFDM Based Secured Patient Information Transmission. Journal of Medical Systems , 41 (12) (2017) 187. [CrossRef]
- C. Zhu, A novel image encryption scheme based on improved hyper-chaotic sequences. Opt Communications. 285(1) (2012) 29-37. [CrossRef]
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).