JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2016, Vol. 51 ›› Issue (9): 76-83.doi: 10.6040/j.issn.1671-9352.2.2015.221

Previous Articles     Next Articles

Reversible data hiding in encrypted image based on an integer transform

  

  1. Jinan University, School of Information Science and Technology, Guangzhou 510632, Guangdong, China
  • Received:2015-08-17 Online:2016-09-20 Published:2016-09-23

Abstract: This paper proposed a novel reversible data hiding scheme in encrypted image which exploits an integer transform to achieve both high embedding capacity and security.In the proposed scheme, content owner implements an integer transform on the pixel groups which are selected by a transform key and composed of two adjacent pixels.Based on properties of the transform,the original pixels values can be recovered perfectly if one of LSBs(Least Significant Bit)in the transformed pixel group is altered.Data hider can seek the transformed pixel groups out from the encrypted image with the same transform key, select one pixel in each transformed group using an embedding key and embed additional data reversibly by replacing corresponding LSBs of the chosen pixels. Only if the receiver has both the transform key and embedding key, can the secret data be extracted without error.Only if the receiver has both the transform key and encryption key, can the original image be recovered perfectly. The experimental results demonstrate that additional data can be embedded and extracted directly in encrypted domain and the original image can be recovered losslessly. Besides, the embedding rate can reach 0.47 bpp(bit per pixel).

Key words: image encryption, integer transform, high embedding capacity, reversible data hiding

CLC Number: 

  • TP309
[1] HONSINGER C W, JONES P W, RABBAN I M, et al.Lossless recoveryof an original image containing embedded data: U.S. 6278791[P]. 2001-08-21.
[2] MACQ B. Lossless multiresolution transform for image authenticatingwatermarking [J]. European Signal Processing Conference, 2000, 23(4):731-753.
[3] FRIDRICH A J, GOLJAN M, DU R. Lossless data embedding for all image formats [J]. Electronic Imaging, 2002, 4675:572-583.
[4] CELIK M U, SHARMA G, TEKALP A M, et al.Lossless generalized-LSB data embedding[J]. IEEE Transactions on Image Processing, 2005, 14(2):253-266.
[5] TIAN J. Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits & Systems for Video Technology, 2003, 13(8):890-896.
[6] THODI D M, RODRÍGUEZ J J. Expansion embedding techniques for reversible watermarking[J]. IEEE Transactions on Image Processing, 2007, 16(3):721-730.
[7] NI Z, SHI Y, ANSARI N, et al. Reversible data hiding[J]. IEEE Transactions on Circuitsand Systemsfor Video Technology, 2006, 16(3):354-362.
[8] SACHNEV V, KIM H J, NAM J H, et al.Reversible watermarking algorithm using sorting and prediction[J]. IEEE Transactions on Circuitsand Systems for Video Technology, 2009, 19(7):989-999.
[9] LUO L, CHEN Z, CHEN M. Reversible imagewatermarking using interpolation technique[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1):187-193.
[10] COLTUC D. Improved embedding for prediction-based reversible watermarking[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):873-882.
[11] LIX L, YANG B, ZENGT Y. Efficient reversible watermarkingbased on adaptive prediction-error expansion and pixel selection[J]. IEEE Transactions on Image Processing, 2011, 20(12):3524-3533.
[12] PUECH W, CHAUMONT M, STRAUSS O. A reversible data hiding method for encrypted images[J]. Proceedings of SPIE, 2008, 6819.
[13] ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258.
[14] HONG W, CHENT S, WU H Y. An improved reversible data hiding in encrypted images using side match[J]. IEEE Signal Processing Letters, 2012, 19(4):199-202.
[15] YU J, ZHU G, LI X, et al. An improved algorithm for reversible data hiding in encrypted image[J]. International Workshop on Digital-Forensics and Watermark, 2012, 7809:384-394.
[16] ZHANG X. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2):826-832.
[17] QIAN Z, ZHANG X, WANG S.Reversible data hiding in encrypted JPEG bit stream[J]. IEEE Transactions on Multimedia, 2014, 16(5):1486-1491.
[18] MA K, ZHANG W, ZHAO X, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3):553-562.
[19] COLTUC D, CHASSERY J M. High capacity reversible watermarking[J]. IEEE International Conference on Image Processing. Piscataway: IEEE, 2006: 2565-2568.
[1] YAN Yan, HAO Xiao-hong. Differential privacy partitioning algorithm based on adaptive density grids [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 12-22.
[2] JIAO Hong-ru, QIN Jing. Quantum secret sharing scheme realizing all hyperstar quantum access structure [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 62-68.
[3] XU Li-dong, WANG Ming-qiang. A meet-in-the-middle attack on 10-round AES-128 [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 39-45.
[4] ZHANG Jian-biao, LI Zhi-gang, LIU Guo-jie, WANG Chao, WANG Wei. Process active dynamic measurement method for Windows environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 46-50.
[5] CUI Zhao-yang, SUN Jia-qi, XU Song-yan, JIANG Xin. A secure clustering algorithm of Ad Hoc network for colony UAVs [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 51-59.
[6] LIU Zheng, NIU Fang-lin, QIAN Da-xing, CAI Xi-biao, GUO Ying. Design of anti-eavesdropping code based on fountain codes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 60-64.
[7] LIU Ming-ming, ZHANG Min-qing, LIU Jia, GAO Pei-xian. Steganalysis method based on shallow convolution neural network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 63-70.
[8] RUAN Shu-hua, WENG Jun-hao, MAO Hui, CHEN Xue-lian. Metric model for cloud computing security risk assessment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 71-76.
[9] KANG Hai-yan, HUANG Yu-xuan, CHEN Chu-qiao. Enhancing privacy for geographic information based on video analysis [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 19-29.
[10] MENG Bo, LU Jin-tian, WANG De-jun, HE Xu-dong. Survey of security analysis of security protocol implementations [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 1-18.
[11] TAN Ren, YIN Xiao-chuan, JIAO Xian-long, LIAN Zhe, CHEN Yu-xin. Software defined APT attack moving target defense network architecture [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 38-45.
[12] SUN Ze-rui, WANG Ji-jun, LI Guo-xiang, XIA Guo-en. New reversible data hiding algorithm based on interpolation images [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 46-52.
[13] SUN Liang, CHEN Xiao-chun, ZHONG Yang, LIN Zhi-peng, REN Tong. Secure startup mechanism of server based on trusted BMC [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 89-94.
[14] YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22.
[15] HAN Pan-pan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 41-53.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!