Complete Separable Reversible Data Hiding for Encrypted Digital Images Using Code Division Multiplexing with Versatile Bit Depth Management
David Mata-Mendoza,
Diana Nuñez-Ramirez,
Manuel Cedillo-Hernandez (),
Mariko Nakano-Miyatake and
Hector Perez-Meana
Additional contact information
David Mata-Mendoza: Instituto Politecnico Nacional IPN SEPI ESIME Culhuacan, Av. Santa Ana 1000 Culhuacan CTM V, Ciudad de Mexico C.P. 04440, Mexico
Diana Nuñez-Ramirez: Instituto Politecnico Nacional IPN SEPI ESIME Culhuacan, Av. Santa Ana 1000 Culhuacan CTM V, Ciudad de Mexico C.P. 04440, Mexico
Manuel Cedillo-Hernandez: Instituto Politecnico Nacional IPN SEPI ESIME Culhuacan, Av. Santa Ana 1000 Culhuacan CTM V, Ciudad de Mexico C.P. 04440, Mexico
Mariko Nakano-Miyatake: Instituto Politecnico Nacional IPN SEPI ESIME Culhuacan, Av. Santa Ana 1000 Culhuacan CTM V, Ciudad de Mexico C.P. 04440, Mexico
Hector Perez-Meana: Instituto Politecnico Nacional IPN SEPI ESIME Culhuacan, Av. Santa Ana 1000 Culhuacan CTM V, Ciudad de Mexico C.P. 04440, Mexico
Mathematics, 2023, vol. 11, issue 4, 1-29
Abstract:
A reversible data hiding in the encrypted domain (RDH-ED) aims to hide data within encrypted images, protecting its content, while allowing additional information to be distributed. This paper presents a complete separable RDH-ED scheme, whose main contribution is allowing the receiver to extract data and restore the image, either from the cryptogram with hidden data or from the directly decrypted version. With versatile bit-depth management, the most significant bits of each pixel are encrypted with AES-CTR cipher algorithm, while the additional data will be inserted inside the least significant bit planes of the encrypted pixels, by means of the code division multiplexing technique. Considering the marked/encrypted images, and encryption/data-hiding keys, a receiver could: (a) directly decrypt the encrypted image and obtain its approximate version, (b) extract the error-free hidden data, and (c) recover the data and original image. Considering an image approximation version and the data hiding key, a receiver could: (d) extract the hidden data from the plaintext domain, and (e) restore the image to its original state, while accessing the hidden data without any loss. Experimental results show the performance of the developed algorithm, evaluating the capacity and imperceptibility of the proposed scheme with respect to current state of the art.
Keywords: complete separable reversible data hiding; image encryption; digital image processing; information security; code division multiplexing (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations: View citations in EconPapers (2)
Downloads: (external link)
https://www.mdpi.com/2227-7390/11/4/1017/pdf (application/pdf)
https://www.mdpi.com/2227-7390/11/4/1017/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:11:y:2023:i:4:p:1017-:d:1070854
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().