Reversible Data Hiding in Encrypted Images based on Adaptive Local Entropy Analysis

被引:0
作者
Puteaux, Pauline [1 ]
Puech, William [1 ]
机构
[1] Univ Montpellier, CNRS, UMR 5506, LIRMM Lab, Montpellier, France
来源
PROCEEDINGS OF THE 2017 SEVENTH INTERNATIONAL CONFERENCE ON IMAGE PROCESSING THEORY, TOOLS AND APPLICATIONS (IPTA 2017) | 2017年
关键词
Multimedia security; reversible data hiding; image encryption; image recovery; statistical analysis;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of cloud computing, the growth in information technology has led to serious security issues. For this reason, a lot of multimedia files are stored in encrypted forms. Methods of reversible data hiding in encrypted images (RDHEI) have been designed to provide authentication and integrity in the encrypted domain. The original image is firstly encrypted to ensure confidentiality, by making the content unreadable. A secret message is then embedded in the encrypted image, without the need of the encryption key or any access to the clear content. The challenge lies in finding the best tradeoff between embedding capacity and quality of the reconstructed image. In 2008, Puech et al. suggested using the AES algorithm to encrypt an original image and to embed one bit in each block of 16 pixels (payload = 0.0625 bpp) [12]. During the decryption phase, the original image is reconstructed by measuring the standard deviation into each block. In this paper, we propose an improvement to this method, by performing an adaptive local entropy measurement. We can achieve a larger payload without altering the recovered image quality. Our obtained results are very good and better than most of the modern state-of-the-art methods, whilst offering an improved security level with the use of the AES algorithm, defined as the encryption standard by the NIST.
引用
收藏
页数:6
相关论文
共 24 条
[1]  
Bas P., IMAGE DATABASE BOWS
[2]   High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation [J].
Cao, Xiaochun ;
Du, Ling ;
Wei, Xingxing ;
Meng, Dan ;
Guo, Xiaojie .
IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (05) :1132-1143
[3]   Lossless generalized-LSB data embedding [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM ;
Saber, E .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (02) :253-266
[4]  
Erkin Z., 2007, EURASIP Journal on Information Security, V7, P1, DOI 10.1155/2007/78943
[5]   Invertible authentication [J].
Fridrich, J ;
Gojan, M ;
Du, R .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 :197-208
[6]   Lossless Data Embedding Using Generalized Statistical Quantity Histogram [J].
Gao, Xinbo ;
An, Lingling ;
Yuan, Yuan ;
Tao, Dacheng ;
Li, Xuelong .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2011, 21 (08) :1061-1070
[7]   An Improved Reversible Data Hiding in Encrypted Images Using Side Match [J].
Hong, Wien ;
Chen, Tung-Shou ;
Wu, Han-Yan .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (04) :199-202
[8]   A Reversible Data Hiding Scheme Based on Code Division Multiplexing [J].
Ma, Bin ;
Shi, Yun Q. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) :1914-1927
[9]   Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption [J].
Ma, Kede ;
Zhang, Weiming ;
Zhao, Xianfeng ;
Yu, Nenghai ;
Li, Fenghua .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (03) :553-562
[10]  
Minemura K, 2012, IEEE IMAGE PROC, P261, DOI 10.1109/ICIP.2012.6466845