Effective reversible data hiding in encrypted image with adaptive encoding strategy

被引:79
作者
Fu, Yujie [1 ]
Kong, Ping [2 ]
Yao, Heng [1 ]
Tang, Zhenjun [3 ]
Qin, Chuan [1 ]
机构
[1] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
[2] Shanghai Univ Med & Hlth Sci, Shanghai Key Lab Mol Imaging, Shanghai 201318, Peoples R China
[3] Guangxi Normal Univ, Guangxi Key Lab Multisource Informat Min & Secur, Guilin 541004, Peoples R China
基金
中国国家自然科学基金;
关键词
Reversible data hiding; Encrypted image; Block encoding; Image recovery; WATERMARKING; DIFFERENCE; EXPANSION;
D O I
10.1016/j.ins.2019.04.043
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, reversible data hiding in encrypted image have attracted extensive attentions, which can be applied in secure cloud computing and privacy-preserving image processing. In this paper, a reversible data hiding scheme in encrypted image based on the adaptive encoding strategy is proposed. On the content-owner side, block permutation and stream cipher encryption are applied to mask the contents of original image. Through analyzing the distribution of MSB layers, embeddable blocks are first determined and auxiliary data are then generated by data hider. In order to vacate room for data accommodation, MSB layers of embeddable blocks are adaptively compressed according to occurrence frequency of MSB. Thus, additional data can be embedded into MSB layers of encrypted image together with reversed Huffman codewords and auxiliary data. Based on the availability of encryption key and data-hiding key, the receiver can realize separable operations of data extraction, image decryption and image recovery efficiently. Experimental results demonstrate that, our scheme not only can achieve satisfactory rate-distortion performance, but also can obtain greater embedding rate compared with the state-of-the-art schemes. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:21 / 36
页数:16
相关论文
共 46 条
  • [1] Abu-Marie W., 2010, International Journal of Signal and Image Processing, V1, P196
  • [2] Al-Juaid NA., 2018, J INFORM SECURITY CY, V1, P5, DOI [10.26735/16587790.2018.006, DOI 10.26735/16587790.2018.006]
  • [3] [Anonymous], 2014, INT C ADV ENG TECHN
  • [4] High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation
    Cao, Xiaochun
    Du, Ling
    Wei, Xingxing
    Meng, Dan
    Guo, Xiaojie
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (05) : 1132 - 1143
  • [5] Chang C-C., 2018, INT J NETWORK SECUR, V20, P478
  • [6] Encrypted signal-based reversible data hiding with public key cryptosystem
    Chen, Yu-Chi
    Shiu, Chih-Wei
    Horng, Gwoboa
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) : 1164 - 1170
  • [7] Invisibility and application functionalities in perceptual watermarking - An overview
    De Vleeschouwer, C
    Delaigle, JF
    Macq, B
    [J]. PROCEEDINGS OF THE IEEE, 2002, 90 (01) : 64 - 77
  • [8] Lossless data embedding for all image formats
    Fridrich, J
    Goljan, M
    Du, R
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 572 - 583
  • [9] Gutub Adnan Abdul-Aziz, 2010, Journal of Emerging Technologies in Web Intelligence, V2, P56, DOI 10.4304/jetwi.2.1.56-64
  • [10] Counting-based secret sharing technique for multimedia applications
    Gutub, Adnan
    Al-Juaid, Nouf
    Khan, Esam
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (05) : 5591 - 5619