Loading…

An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment

Nowadays there are numerous intruders trying to get the privacy information from cloud resources and consequently need a high security to secure our data. Moreover, research concerns have various security standards to secure the data using data hiding. In order to maintain the privacy and security i...

Full description

Saved in:
Bibliographic Details
Published in:Cluster computing 2019-09, Vol.22 (Suppl 5), p.12839-12847
Main Authors: Senthilnathan, T., Prabu, P., Sivakumar, R., Sakthivel, S.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c316t-c5e79e704070994f8a4df7cae6eaeb143618df35f7ed0a02b282745e591023ea3
cites cdi_FETCH-LOGICAL-c316t-c5e79e704070994f8a4df7cae6eaeb143618df35f7ed0a02b282745e591023ea3
container_end_page 12847
container_issue Suppl 5
container_start_page 12839
container_title Cluster computing
container_volume 22
creator Senthilnathan, T.
Prabu, P.
Sivakumar, R.
Sakthivel, S.
description Nowadays there are numerous intruders trying to get the privacy information from cloud resources and consequently need a high security to secure our data. Moreover, research concerns have various security standards to secure the data using data hiding. In order to maintain the privacy and security in the cloud and big data processing, the recent crypto policy domain combines key policy encryption with reversible data hiding (RDH) techniques. However in this approach, the data is directly embedded resulting in errors during data extraction and image recovery due to reserve leakage of data. Hence, a novel shuffle block key encryption with RDH technique is proposed to hide the data competently. RDH is applied to encrypted images by which the data and the protection image can be appropriately recovered with histogram bit shifting algorithm. The hidden data can be embedded with shuffle key in the form of text with the image. The proposed method generates the room space to hide data with random shuffle after encrypting image using the definite encryption key. The data hider reversibly hides the data, whether text or image using data hiding key with histogram shifted values. If the requestor has both the embedding and encryption keys, can excerpt the secret data and effortlessly extract the original image using the spread source decoding. The proposed technique overcomes the data loss errors competently with two seed keys and also the projected shuffle state RDH procedure used in histogram shifting enhances security hidden policy. The results show that the proposed method outperforms the existing approaches by effectively recovering the hidden data and cover image without any errors, also scales well for large amount of data.
doi_str_mv 10.1007/s10586-018-1765-3
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918246464</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2918246464</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-c5e79e704070994f8a4df7cae6eaeb143618df35f7ed0a02b282745e591023ea3</originalsourceid><addsrcrecordid>eNp1kEtLxDAUhYsoOI7-AHcB19U8mqZdDoMvENzoOqTpzUzmkYxJOjC_wL9tSgVXche5nHznXDhFcUvwPcFYPESCeVOXmDQlETUv2VkxI1ywUvCKneed5V_RcHFZXMW4wRi3graz4nvhELi1ctq6FQpwhBBttwPUq6TQ2vajbHxAEfQQoJ_0IY5yXA_GZLTbeb1FWzjlJB1Oh2S9Q8r12R6TXwW1R51NGbcmjT7rkN75oc_40Qbv9uDSdXFh1C7Cze87Lz6fHj-WL-Xb-_PrcvFWakbqVGoOogWBKyxw21amUVVvhFZQg4KOVKwmTW8YNwJ6rDDtaENFxYG3BFMGis2Luyn3EPzXADHJjR-CyyclbUlDqzpPpshE6eBjDGDkIdi9CidJsBz7llPfMvctx74lyx46eWJm3QrCX_L_ph-lkoV6</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918246464</pqid></control><display><type>article</type><title>An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment</title><source>Springer Nature</source><creator>Senthilnathan, T. ; Prabu, P. ; Sivakumar, R. ; Sakthivel, S.</creator><creatorcontrib>Senthilnathan, T. ; Prabu, P. ; Sivakumar, R. ; Sakthivel, S.</creatorcontrib><description>Nowadays there are numerous intruders trying to get the privacy information from cloud resources and consequently need a high security to secure our data. Moreover, research concerns have various security standards to secure the data using data hiding. In order to maintain the privacy and security in the cloud and big data processing, the recent crypto policy domain combines key policy encryption with reversible data hiding (RDH) techniques. However in this approach, the data is directly embedded resulting in errors during data extraction and image recovery due to reserve leakage of data. Hence, a novel shuffle block key encryption with RDH technique is proposed to hide the data competently. RDH is applied to encrypted images by which the data and the protection image can be appropriately recovered with histogram bit shifting algorithm. The hidden data can be embedded with shuffle key in the form of text with the image. The proposed method generates the room space to hide data with random shuffle after encrypting image using the definite encryption key. The data hider reversibly hides the data, whether text or image using data hiding key with histogram shifted values. If the requestor has both the embedding and encryption keys, can excerpt the secret data and effortlessly extract the original image using the spread source decoding. The proposed technique overcomes the data loss errors competently with two seed keys and also the projected shuffle state RDH procedure used in histogram shifting enhances security hidden policy. The results show that the proposed method outperforms the existing approaches by effectively recovering the hidden data and cover image without any errors, also scales well for large amount of data.</description><identifier>ISSN: 1386-7857</identifier><identifier>EISSN: 1573-7543</identifier><identifier>DOI: 10.1007/s10586-018-1765-3</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Access control ; Algorithms ; Big Data ; Cloud computing ; Computer Communication Networks ; Computer Science ; Data encryption ; Data loss ; Data processing ; Embedding ; Encryption ; Histograms ; Metadata ; Operating Systems ; Outsourcing ; Privacy ; Processor Architectures ; Security</subject><ispartof>Cluster computing, 2019-09, Vol.22 (Suppl 5), p.12839-12847</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2018</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2018.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-c5e79e704070994f8a4df7cae6eaeb143618df35f7ed0a02b282745e591023ea3</citedby><cites>FETCH-LOGICAL-c316t-c5e79e704070994f8a4df7cae6eaeb143618df35f7ed0a02b282745e591023ea3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27922,27923</link.rule.ids></links><search><creatorcontrib>Senthilnathan, T.</creatorcontrib><creatorcontrib>Prabu, P.</creatorcontrib><creatorcontrib>Sivakumar, R.</creatorcontrib><creatorcontrib>Sakthivel, S.</creatorcontrib><title>An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment</title><title>Cluster computing</title><addtitle>Cluster Comput</addtitle><description>Nowadays there are numerous intruders trying to get the privacy information from cloud resources and consequently need a high security to secure our data. Moreover, research concerns have various security standards to secure the data using data hiding. In order to maintain the privacy and security in the cloud and big data processing, the recent crypto policy domain combines key policy encryption with reversible data hiding (RDH) techniques. However in this approach, the data is directly embedded resulting in errors during data extraction and image recovery due to reserve leakage of data. Hence, a novel shuffle block key encryption with RDH technique is proposed to hide the data competently. RDH is applied to encrypted images by which the data and the protection image can be appropriately recovered with histogram bit shifting algorithm. The hidden data can be embedded with shuffle key in the form of text with the image. The proposed method generates the room space to hide data with random shuffle after encrypting image using the definite encryption key. The data hider reversibly hides the data, whether text or image using data hiding key with histogram shifted values. If the requestor has both the embedding and encryption keys, can excerpt the secret data and effortlessly extract the original image using the spread source decoding. The proposed technique overcomes the data loss errors competently with two seed keys and also the projected shuffle state RDH procedure used in histogram shifting enhances security hidden policy. The results show that the proposed method outperforms the existing approaches by effectively recovering the hidden data and cover image without any errors, also scales well for large amount of data.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Big Data</subject><subject>Cloud computing</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Data encryption</subject><subject>Data loss</subject><subject>Data processing</subject><subject>Embedding</subject><subject>Encryption</subject><subject>Histograms</subject><subject>Metadata</subject><subject>Operating Systems</subject><subject>Outsourcing</subject><subject>Privacy</subject><subject>Processor Architectures</subject><subject>Security</subject><issn>1386-7857</issn><issn>1573-7543</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNp1kEtLxDAUhYsoOI7-AHcB19U8mqZdDoMvENzoOqTpzUzmkYxJOjC_wL9tSgVXche5nHznXDhFcUvwPcFYPESCeVOXmDQlETUv2VkxI1ywUvCKneed5V_RcHFZXMW4wRi3graz4nvhELi1ctq6FQpwhBBttwPUq6TQ2vajbHxAEfQQoJ_0IY5yXA_GZLTbeb1FWzjlJB1Oh2S9Q8r12R6TXwW1R51NGbcmjT7rkN75oc_40Qbv9uDSdXFh1C7Cze87Lz6fHj-WL-Xb-_PrcvFWakbqVGoOogWBKyxw21amUVVvhFZQg4KOVKwmTW8YNwJ6rDDtaENFxYG3BFMGis2Luyn3EPzXADHJjR-CyyclbUlDqzpPpshE6eBjDGDkIdi9CidJsBz7llPfMvctx74lyx46eWJm3QrCX_L_ph-lkoV6</recordid><startdate>20190901</startdate><enddate>20190901</enddate><creator>Senthilnathan, T.</creator><creator>Prabu, P.</creator><creator>Sivakumar, R.</creator><creator>Sakthivel, S.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20190901</creationdate><title>An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment</title><author>Senthilnathan, T. ; Prabu, P. ; Sivakumar, R. ; Sakthivel, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-c5e79e704070994f8a4df7cae6eaeb143618df35f7ed0a02b282745e591023ea3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Big Data</topic><topic>Cloud computing</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Data encryption</topic><topic>Data loss</topic><topic>Data processing</topic><topic>Embedding</topic><topic>Encryption</topic><topic>Histograms</topic><topic>Metadata</topic><topic>Operating Systems</topic><topic>Outsourcing</topic><topic>Privacy</topic><topic>Processor Architectures</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Senthilnathan, T.</creatorcontrib><creatorcontrib>Prabu, P.</creatorcontrib><creatorcontrib>Sivakumar, R.</creatorcontrib><creatorcontrib>Sakthivel, S.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Cluster computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Senthilnathan, T.</au><au>Prabu, P.</au><au>Sivakumar, R.</au><au>Sakthivel, S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment</atitle><jtitle>Cluster computing</jtitle><stitle>Cluster Comput</stitle><date>2019-09-01</date><risdate>2019</risdate><volume>22</volume><issue>Suppl 5</issue><spage>12839</spage><epage>12847</epage><pages>12839-12847</pages><issn>1386-7857</issn><eissn>1573-7543</eissn><abstract>Nowadays there are numerous intruders trying to get the privacy information from cloud resources and consequently need a high security to secure our data. Moreover, research concerns have various security standards to secure the data using data hiding. In order to maintain the privacy and security in the cloud and big data processing, the recent crypto policy domain combines key policy encryption with reversible data hiding (RDH) techniques. However in this approach, the data is directly embedded resulting in errors during data extraction and image recovery due to reserve leakage of data. Hence, a novel shuffle block key encryption with RDH technique is proposed to hide the data competently. RDH is applied to encrypted images by which the data and the protection image can be appropriately recovered with histogram bit shifting algorithm. The hidden data can be embedded with shuffle key in the form of text with the image. The proposed method generates the room space to hide data with random shuffle after encrypting image using the definite encryption key. The data hider reversibly hides the data, whether text or image using data hiding key with histogram shifted values. If the requestor has both the embedding and encryption keys, can excerpt the secret data and effortlessly extract the original image using the spread source decoding. The proposed technique overcomes the data loss errors competently with two seed keys and also the projected shuffle state RDH procedure used in histogram shifting enhances security hidden policy. The results show that the proposed method outperforms the existing approaches by effectively recovering the hidden data and cover image without any errors, also scales well for large amount of data.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10586-018-1765-3</doi><tpages>9</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1386-7857
ispartof Cluster computing, 2019-09, Vol.22 (Suppl 5), p.12839-12847
issn 1386-7857
1573-7543
language eng
recordid cdi_proquest_journals_2918246464
source Springer Nature
subjects Access control
Algorithms
Big Data
Cloud computing
Computer Communication Networks
Computer Science
Data encryption
Data loss
Data processing
Embedding
Encryption
Histograms
Metadata
Operating Systems
Outsourcing
Privacy
Processor Architectures
Security
title An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T05%3A11%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20enhancing%20reversible%20data%20hiding%20for%20secured%20data%20using%20shuffle%20block%20key%20encryption%20and%20histogram%20bit%20shifting%20in%20cloud%20environment&rft.jtitle=Cluster%20computing&rft.au=Senthilnathan,%20T.&rft.date=2019-09-01&rft.volume=22&rft.issue=Suppl%205&rft.spage=12839&rft.epage=12847&rft.pages=12839-12847&rft.issn=1386-7857&rft.eissn=1573-7543&rft_id=info:doi/10.1007/s10586-018-1765-3&rft_dat=%3Cproquest_cross%3E2918246464%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c316t-c5e79e704070994f8a4df7cae6eaeb143618df35f7ed0a02b282745e591023ea3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2918246464&rft_id=info:pmid/&rfr_iscdi=true