Secure Reversible Data Hiding in Encrypted Image Based on 2D Labeling and Block Classification Coding

被引:0
作者
Yang, Yaolin [1 ]
He, Hongjie [1 ]
Chen, Fan [2 ]
Yuan, Yuan [1 ]
Mao, Ningxiong [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 611756, Peoples R China
[2] Southwest Jiaotong Univ, Sch Comp & Artificial Intelligence, Chengdu 611756, Peoples R China
基金
中国国家自然科学基金;
关键词
reversible data hiding; encrypted images; 2D labeling; block classification coding; mixed permutation; ONLY MULTIMEDIA CIPHERS; QUANTITATIVE CRYPTANALYSIS; PERMUTATION;
D O I
10.1016/j.jisa.2024.103771
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The existing lossless compression methods in reversible data hiding in encrypted images (RDHEI) do not fully utilize pixel and local redundancy, and encryption methods can not resist various attack algorithms. To solve the above problem, a secure RDHEI algorithm based on 2D labeling and block classification coding is proposed. In the proposed RDHEI algorithm, the retained total LSB (least significant bit) data as the image feature in the mixed permutation to generate the encryption key that varied with image, which improves the security of the algorithm. In addition, 2D labeling and block classification coding are designed. The former improves the utilization of pixel redundancy by labeling the length of the first '0' string and the next '1' string in the predicted value. The latter effectively utilizes the local correlation of the image, reduces the number of label values in the smooth block, so the length of the compressed coding stream is reduced. The combination of 2D labeling and block classification coding effectively improves the capacity. Experimental results show that the proposed method can effectively resist statistical, known plaintext and differential attacks, and the average capacity of three databases is 0.41bpp higher than the state-of-the-art algorithms.
引用
收藏
页数:12
相关论文
共 31 条
  • [1] Extensive Study of Cloud Computing Technologies, Threats and Solutions Prospective
    Abu-Alhaija, Mwaffaq
    Turab, Nidal M.
    Hamza, AbdelRahman
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (01): : 225 - 240
  • [2] Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram
    Anushiadevi, R.
    Amirtharajan, Rengarajan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72
  • [3] Adaptive Coding and Ordered-Index Extended Scrambling Based RDH in Encrypted Images
    Chen, Fan
    Yang, Yaolin
    He, Hongjie
    Yuan, Yuan
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2023, 25 : 2864 - 2875
  • [4] Multi-MSB Compression Based Reversible Data Hiding Scheme in Encrypted Images
    Chen, Fan
    Yuan, Yuan
    He, Hongjie
    Tian, Miao
    Tai, Heng-Ming
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31 (03) : 905 - 916
  • [5] Reversible data hiding in encrypted images using block-based adaptive MSBs prediction
    Chen, Sisheng
    Chang, Chin -Chen
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 69
  • [6] Effective reversible data hiding in encrypted image with adaptive encoding strategy
    Fu, Yujie
    Kong, Ping
    Yao, Heng
    Tang, Zhenjun
    Qin, Chuan
    [J]. INFORMATION SCIENCES, 2019, 494 : 21 - 36
  • [7] Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain
    Ke, Yan
    Zhang, Min-Qing
    Liu, Jia
    Su, Ting-Ting
    Yang, Xiao-Yuan
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2020, 30 (08) : 2353 - 2365
  • [8] On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain
    Khelifi, Fouad
    [J]. SIGNAL PROCESSING, 2018, 143 : 336 - 345
  • [9] Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
    Li, Chengqing
    Lo, Kwok-Tung
    [J]. SIGNAL PROCESSING, 2011, 91 (04) : 949 - 954
  • [10] A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
    Li, Shujun
    Li, Chengqing
    Chen, Guanrong
    Bourbakis, Nikolaos G.
    Lo, Kwok-Tung
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2008, 23 (03) : 212 - 223