Reference Hub10
Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image

Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image

Asad Malik, Hongxia Wang, Hanzhou Wu, Sani M. Abdullahi
Copyright: © 2019 |Volume: 11 |Issue: 1 |Pages: 16
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781522565147|DOI: 10.4018/IJDCF.2019010104
Cite Article Cite Article

MLA

Malik, Asad, et al. "Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image." IJDCF vol.11, no.1 2019: pp.46-61. http://doi.org/10.4018/IJDCF.2019010104

APA

Malik, A., Wang, H., Wu, H., & Abdullahi, S. M. (2019). Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image. International Journal of Digital Crime and Forensics (IJDCF), 11(1), 46-61. http://doi.org/10.4018/IJDCF.2019010104

Chicago

Malik, Asad, et al. "Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image," International Journal of Digital Crime and Forensics (IJDCF) 11, no.1: 46-61. http://doi.org/10.4018/IJDCF.2019010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article presents a new method which embeds multiple data from multiple users in an encrypted image. Here, the data from several users is embedded into an encrypted image. Initially, the image is encrypted by the owner followed by embedding phase, where the encrypted image is divided into four sets. Two of them are used to embed the secret data, while others are remain unaltered. The secret data from multiple users are embedded into Most Significant Bit (MSB) of the encrypted image using their location maps. In the extraction phase, an individual owner can extract the data from the encrypted image using the assigned private key. Subsequently, in the image decryption and recovery phase, images can be recovered using the unaltered neighbor pixels. However, the secret image can be recovered losslessly using the encryption key only. The proposed scheme allows the extraction of the embedded information only for the authorized user out of several users without knowing the cover information. Various simulations have been made related to this, which show the high embedding rate and accuracy.