Separable Reversible Data Hiding in Encrypted Image Against Ciphertext- Only Attack

被引:0
|
作者
Huang M. [1 ]
He H. [1 ]
Chen F. [1 ]
机构
[1] The School of Information Science and Technology, Southwest Jiaotong University, Chengdu
来源
Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics | 2020年 / 32卷 / 06期
关键词
Ciphertext-only attack; Data hiding; Embedding capacity; Image encryption; Reversible data hiding;
D O I
10.3724/SP.J.1089.2020.17875
中图分类号
学科分类号
摘要
To improve the security and reversibility, a reversible data hiding in encrypted image capable of ciphertext-only attack (COA) is proposed. The image owner segments the original image into a number of non-overlapping blocks and the encrypted image is generated by combining block scrambling and the designed XOR encryption which three MSBs and five LSBs of pixels in the block are encrypted respectively with different key stream. And then the data hider uses the pixel fluctuation value and lossless compression to gain extra space and embeds the additional information into pixels by bit flipping. To achieve full reversibility, the fluctuation value of the pixels is recorded in marked image. At last, the receiver extracts the embedded data correctly and recovery original image. The proposed algorithm was evaluated on uncompressed color image database. Experimental results show that the correct rate of stream cipher obtained by COA on encrypted image sets of 20, 50, 70, 100 is about 50%, which can effectively resist COA. Compared with three similar algorithms, the embedding capacity is improved respectively by 145.69%, 148.21% and 240.85%, and the quality of decrypted image is improved about 5 dB. © 2020, Beijing China Science Journal Publishing Co. Ltd. All right reserved.
引用
收藏
页码:874 / 882
页数:8
相关论文
共 22 条
  • [1] Celik M U, Sharma G, Tekalp A M, Et al., Lossless generalized-LSB data embedding, IEEE Transactions on Image Processing, 14, 2, pp. 253-266, (2005)
  • [2] Tian J., Reversible data embedding using a difference expansion, IEEE Transactions on Circuits and Systems for Video Technology, 13, 8, pp. 890-896, (2003)
  • [3] Thodi D M, Rodriguez J J., Expansion embedding techniques for reversible watermarking, IEEE Transactions on Image Processing, 16, 3, pp. 721-730, (2007)
  • [4] Zhang Haifeng, Zhang Wei, Tian Tian, Et al., PEE-based reversible data hiding for high dynamic range image, Journal of Computer-Aided Design & Computer Graphics, 28, 3, pp. 427-432, (2016)
  • [5] Xiong Xiangguang, Cao Yongfeng, Ou Weihua, Et al., High capacity reversible data hiding algorithm using interpolation and sorting, Journal of Computer-Aided Design & Computer Graphics, 30, 10, pp. 1954-1965, (2018)
  • [6] Ma K D, Zhang W M, Zhao X F, Et al., Reversible data hiding in encrypted images by reserving room before encryption, IEEE Transactions on Information Forensics and Security, 8, 3, pp. 553-562, (2013)
  • [7] Xu D W, Wang R D., Separable and error-free reversible data hiding scheme for encrypted images, Signal Processing, 123, pp. 9-21, (2016)
  • [8] Nyuyen T S, Chang C C, Chang W C., High capacity reversible data hiding scheme for encrypted images, Signal Processing, Image Communication, 44, pp. 84-91, (2016)
  • [9] Yi S, Zhou Y C., Binary-block embedding for reversible data hiding in encrypted images, Signal Processing, 133, pp. 40-51, (2017)
  • [10] Zhang X P., Separable reversible data hiding in encrypted image, IEEE Transactions on Information Forensics and Security, 7, 2, pp. 826-832, (2012)