Next Article in Journal
Hybrid Image-Retrieval Method for Image-Splicing Validation
Previous Article in Journal
The Ambiguity in the Definition and Behavior of the Gravitational and Cosmological ‘Coupling Constants’ in the Theory of Induced Gravity
Previous Article in Special Issue
Using Two Meaningful Shadows to Share Secret Messages with Reversibility
Article Menu
Issue 1 (January) cover image

Export Article

Open AccessArticle
Symmetry 2019, 11(1), 82; https://doi.org/10.3390/sym11010082

Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud

1
School of Computer Science, Northwestern Polytechnical University, Xi’an 710072, China
2
College of Electronic Information and Engineering, Taiyuan University of Science and Technology, Taiyuan 030024, China
3
Department of Electronics and Computer Engineering, New Jersey Institute of Technology, Newark, NJ 07102, USA
4
Department of Information Engineering and Computer Science, Feng Chia University, No. 100, Wenhwa Rd., Seatwen, Taichung 40724, Taiwan
*
Author to whom correspondence should be addressed.
Received: 11 December 2018 / Revised: 4 January 2019 / Accepted: 8 January 2019 / Published: 13 January 2019
(This article belongs to the Special Issue Emerging Data Hiding Systems in Image Communications)
Full-Text   |   PDF [14756 KB, uploaded 13 January 2019]   |  

Abstract

As cloud computing becomes popular, the security of users’ data is faced with a great threat, i.e., how to protect users’ privacy has become a pressing research topic. The combination of data hiding and encryption can provide dual protection for private data during cloud computing. In this paper, we propose a new separable data-hiding scheme for encrypted images based on block compressive sensing. First, the original uncompressed image is compressed and encrypted by block compressive sensing (BCS) using a measurement matrix, which is known as an encryption key. Then, some additional data can be hidden into the four least significant bits of measurement using the data-hiding key during the process of encoding. With an encrypted image that contains hidden data, the receiver can extract the hidden data or decrypt/reconstruct the protected private image, according to the key he/she possesses. This scheme has important features of flexible compression and anti-data-loss. The image reconstruction and data extraction are separate processes. Experimental results have proven the expected merits of the proposed scheme. Compared with the previous work, our proposed scheme reduces the complexity of the scheme and also achieves better performance in compression, anti-data-loss, and hiding capacity. View Full-Text
Keywords: separable; data hiding; compressive sensing; Cloud separable; data hiding; compressive sensing; Cloud
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Liu, L.; Wang, L.; Shi, Y.-Q.; Chang, C.-C. Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud. Symmetry 2019, 11, 82.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Symmetry EISSN 2073-8994 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top