1 October 2024 High-fidelity reversible data-hiding technique in encrypted images using pixel value ordering and center folding strategy
Shweta Midya, Partha Chowdhuri, Pabitra Pal
Author Affiliations +
Abstract

We propose a reversible data-hiding approach in encrypted images (RDHEI) to cope with the new security threats emerging with artificial intelligence and the Industrial Internet of Things (IIoT). This dual image-based high-capacity RDHEI technique ensures security with better embedding capacity. On the sender side, the correlations of adjacent pixels are disrupted by encryption. Hence, except for the intended receiver, no one can intercept the image. This encrypted image is used as a cover image, and pixel value ordering is applied. After that, the center folding strategy is used to form dual stego images for hiding data inside both images. Pixels with maximum and minimum values are employed for data hiding. The experimental results indicate the greater resilience and imperceptibility of the discussed technique over several current strategies. The suggested plan incorporates secret bits based on the image properties. One benefit of using the suggested technique is that the process of decrypting the image and extracting the data are independent. The recipient with just the data-hiding key may recover the concealed data without any compromise, while the receiver with only the decryption key can precisely retrieve the original image without any knowledge of the data-hiding key. This makes this scheme suitable for IIoT devices with a limited processing power for image collection.

© 2024 SPIE and IS&T
Shweta Midya, Partha Chowdhuri, and Pabitra Pal "High-fidelity reversible data-hiding technique in encrypted images using pixel value ordering and center folding strategy," Journal of Electronic Imaging 33(5), 053025 (1 October 2024). https://doi.org/10.1117/1.JEI.33.5.053025
Received: 5 April 2024; Accepted: 5 September 2024; Published: 1 October 2024
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Image processing

Data hiding

Computer security

Receivers

Image quality

Internet of things

RELATED CONTENT


Back to Top