Reversible AMBTC-Based Data Hiding With Security Improvement by Chaotic Encryption

被引:13
作者
Wang, Hsiang-Ying [1 ]
Lin, Hsin-Ju [1 ]
Gao, Xiang-Yun [1 ]
Cheng, Wen-Huang [2 ]
Chen, Yung-Yao [1 ]
机构
[1] Natl Taipei Univ Technol, Grad Inst Automat Technol, Taipei 106, Taiwan
[2] Natl Chiao Tung Univ, Inst Elect, Hsinchu 300, Taiwan
关键词
Reversible data hiding; absolute moment block truncation coding (AMBTC); encryption; chaos; SCHEME;
D O I
10.1109/ACCESS.2019.2906500
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social networking and cloud computing are being extensively used, and in this era, the frequency of sending information or images to each other is increasing. The prevention of private information leakage during communication over the Internet has become a concern in the past decades. Several data protection methods, such as cryptographic, watermarking, and steganography techniques, have been proposed to protect private data. In this paper, an embedding method is proposed based on an absolute moment block truncation coding (AMBTC)-compressed image. High and low mean tables are extracted from a compressed image and are divided into non-overlapping blocks. An adaptive variable N-bit bit plane truncation image embedding method is proposed to embed the secret data in each block. In this method, at the receiver end, the secret data are extracted, and the original AMBTC image could be recovered by recalling the stored peak and zero points. In addition, a chaotic encryption scheme is integrated into the proposed system to improve robustness against security vulnerability. The results show that the proposed method has superior performance and higher payload compared with the reference methods.
引用
收藏
页码:38337 / 38347
页数:11
相关论文
共 22 条
[1]   Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption [J].
Belazi, Akram ;
Khan, Majid ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
NONLINEAR DYNAMICS, 2017, 87 (01) :337-361
[2]   High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding [J].
Chang, I-Cheng ;
Hu, Yu-Chen ;
Chen, Wu-Lin ;
Lo, Chun-Chi .
SIGNAL PROCESSING, 2015, 108 :376-388
[3]   High-Fidelity Reversible Data Hiding Using Directionally Enclosed Prediction [J].
Chen, Haishan ;
Ni, Jiangqun ;
Hong, Wien ;
Chen, Tung-Shou .
IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (05) :574-578
[4]   IMAGE COMPRESSION USING BLOCK TRUNCATION CODING [J].
DELP, EJ ;
MITCHELL, OR .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1979, 27 (09) :1335-1342
[5]   Reversible Data Hiding Under Inconsistent Distortion Metrics [J].
Hou, Dongdong ;
Zhang, Weiming ;
Yang, Yang ;
Yu, Nenghai .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2018, 27 (10) :5087-5099
[6]   Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane [J].
Jung, Ki-Hyun .
JOURNAL OF REAL-TIME IMAGE PROCESSING, 2018, 14 (01) :127-136
[7]   A Cell-Array-Based Multibiometric Cryptosystem [J].
Kumar, Amioy ;
Kumar, Ajay .
IEEE ACCESS, 2016, 4 :15-25
[8]   Ciphertext-Only Attack on Linear Feedback Shift Register-Based Esmaeili-Gulliver Cryptosystem [J].
Lee, Yongwoo ;
Kim, Young-Sik ;
No, Jong-Seon .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (05) :971-974
[9]   ABSOLUTE MOMENT BLOCK TRUNCATION CODING AND ITS APPLICATION TO COLOR IMAGES [J].
LEMA, MD ;
MITCHELL, OR .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1984, 32 (10) :1148-1157
[10]   Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding [J].
Li, Ming ;
Li, Yang .
SIGNAL PROCESSING, 2017, 130 :190-196