Reversible data hiding scheme in multiple encrypted images based on code division multiplexing

被引:11
作者
Chen, Xianyi [1 ]
Zhong, Haidong [1 ]
Qiu, Anqi [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Jiangsu, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Reversible data hiding (RDH); Code division multiplexing (CDM); Encrypted image in cloud; WATERMARKING; DIFFERENCE; SEARCH;
D O I
10.1007/s11042-018-6446-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, a reversible data hiding (RDH) scheme based on code division multiplexing (CDM) has been reported, in which secret information and pseudo bits are transformed into spreading sequences. Most sequences may be mutually offset when they are repeatedly embedded, which leads to image quality and embedding capacity improvement. Despite of these advantages, the pseudo bits may cause the image distortion, especially in the low embedding rates. Moreover, it is hard to protect image content when the image is uploaded to cloud server. In order to solve these problems, we propose an RDH scheme based on CDM in multiple encrypted images (RDHMEI) with public key cryptography. The proposed method first encrypted the image using the Paillier homomorphic encryption. Afterwards, the encrypted pixels that have a same coordinate in the multiple images are selected as the elements of the embedding vector. Instead of traditional dual-images based RDH, the proposed method can embed additional bits into the embedding vector while the pixel correlation disappears after encrypting. Experimental results demonstrate the effectiveness and advantages of the proposed method.
引用
收藏
页码:7499 / 7516
页数:18
相关论文
共 34 条
[1]  
[Anonymous], IEEE TRANS INF FOREN
[2]  
Chang C.-C., 2007, P IEEE REG 10 INT C, P1, DOI DOI 10.1109/TENCON.2007.4483783
[3]   A high payload frequency-based reversible image hiding method [J].
Chang, Chin-Chen ;
Pai, Pei-Yan ;
Yeh, Chia-Ming ;
Chan, Yung-Kuan .
INFORMATION SCIENCES, 2010, 180 (11) :2286-2298
[4]   Reversible watermarking method based on asymmetric-histogram shifting of prediction errors [J].
Chen, Xianyi ;
Sun, Xingming ;
Sun, Huiyu ;
Zhou, Zhili ;
Zhang, Jianjun .
JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (10) :2620-2626
[5]   Encrypted signal-based reversible data hiding with public key cryptosystem [J].
Chen, Yu-Chi ;
Shiu, Chih-Wei ;
Horng, Gwoboa .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) :1164-1170
[6]   Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data [J].
Fu, Zhangjie ;
Wu, Xinle ;
Wang, Qian ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (12) :2986-2997
[7]   Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data [J].
Fu, Zhangjie ;
Huang, Fengxiao ;
Ren, Kui ;
Weng, Jian ;
Wang, Cong .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) :1874-1884
[8]  
Fujiyoshi M., 2007, P IEEE ICIP, V3
[9]   An Improved Reversible Data Hiding in Encrypted Images Using Side Match [J].
Hong, Wien ;
Chen, Tung-Shou ;
Wu, Han-Yan .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (04) :199-202
[10]   An efficient reversible data hiding algorithm using two steganographic images [J].
Jafar, Iyad F. ;
Darabkh, Khalid A. ;
Al-Zubi, Raed T. ;
Saifan, Ramzi R. .
SIGNAL PROCESSING, 2016, 128 :98-109