A. N. Khan, Mingquan Fan, Asad Malik, M. A. Husain
{"title":"使用公钥加密技术在加密图像中隐藏可逆数据的研究进展","authors":"A. N. Khan, Mingquan Fan, Asad Malik, M. A. Husain","doi":"10.1109/ICCT46177.2019.8969030","DOIUrl":null,"url":null,"abstract":"With the evolving needs of cloud-based information exchange, the challenge of a reliable and secure communication channel has also been the center of attention recently. Although cryptography has been a traditional tool for secure communication; yet it also carries a possibility of attacks aimed to gain access to the sensitive information. As an alternative, the use of reversible data hiding (RDH) technique has been proposed. RDH scheme involves concealment of the data in the cover image, both of which are retrieved in a lossless manner at the receiver end. Over an insecure channel in cloud communication, the cover content is encrypted; thus resulting in Reversible Data Hiding in Encrypted Images (RDHEI). RDHEI traditionally uses symmetric key cryptography involving a drawback of key management overhead. Public key cryptography (PKC) offers an alternate and efficient solution for cloud-based environments in which the homomorphic properties of public key are utilized. This paper provides an overview of the recent advancements in research in the context RDHEI based on PKC; discussing several proposed schemes addressing the core challenges of data expansion and complex computations using public key encryption. In addition to this, the shortcomings of the discussed schemes are highlighted along with possible remedies that will also guide new directions for future work.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Advancements in Reversible Data Hiding in Encrypted Images Using Public Key Cryptography\",\"authors\":\"A. N. Khan, Mingquan Fan, Asad Malik, M. A. Husain\",\"doi\":\"10.1109/ICCT46177.2019.8969030\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the evolving needs of cloud-based information exchange, the challenge of a reliable and secure communication channel has also been the center of attention recently. Although cryptography has been a traditional tool for secure communication; yet it also carries a possibility of attacks aimed to gain access to the sensitive information. As an alternative, the use of reversible data hiding (RDH) technique has been proposed. RDH scheme involves concealment of the data in the cover image, both of which are retrieved in a lossless manner at the receiver end. Over an insecure channel in cloud communication, the cover content is encrypted; thus resulting in Reversible Data Hiding in Encrypted Images (RDHEI). RDHEI traditionally uses symmetric key cryptography involving a drawback of key management overhead. Public key cryptography (PKC) offers an alternate and efficient solution for cloud-based environments in which the homomorphic properties of public key are utilized. This paper provides an overview of the recent advancements in research in the context RDHEI based on PKC; discussing several proposed schemes addressing the core challenges of data expansion and complex computations using public key encryption. In addition to this, the shortcomings of the discussed schemes are highlighted along with possible remedies that will also guide new directions for future work.\",\"PeriodicalId\":118655,\"journal\":{\"name\":\"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCT46177.2019.8969030\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCT46177.2019.8969030","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Advancements in Reversible Data Hiding in Encrypted Images Using Public Key Cryptography
With the evolving needs of cloud-based information exchange, the challenge of a reliable and secure communication channel has also been the center of attention recently. Although cryptography has been a traditional tool for secure communication; yet it also carries a possibility of attacks aimed to gain access to the sensitive information. As an alternative, the use of reversible data hiding (RDH) technique has been proposed. RDH scheme involves concealment of the data in the cover image, both of which are retrieved in a lossless manner at the receiver end. Over an insecure channel in cloud communication, the cover content is encrypted; thus resulting in Reversible Data Hiding in Encrypted Images (RDHEI). RDHEI traditionally uses symmetric key cryptography involving a drawback of key management overhead. Public key cryptography (PKC) offers an alternate and efficient solution for cloud-based environments in which the homomorphic properties of public key are utilized. This paper provides an overview of the recent advancements in research in the context RDHEI based on PKC; discussing several proposed schemes addressing the core challenges of data expansion and complex computations using public key encryption. In addition to this, the shortcomings of the discussed schemes are highlighted along with possible remedies that will also guide new directions for future work.