REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES WITH AUXILIARY SYNDROME

被引:0
作者
Yu, Jiang [1 ]
Si, Wen [1 ]
Li, Fenyong [2 ]
机构
[1] Shanghai Business Sch, Sch Informat & Comp, Shanghai, Peoples R China
[2] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai, Peoples R China
来源
2017 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS 2017) | 2017年
基金
美国国家科学基金会;
关键词
Steganography; encrypt; reversible data hiding; histogram shifting; auxiliary syndrome; WATERMARKING; EXPANSION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a novel data hiding scheme combing reversible, encryption mechanism and auxiliary syndrome. An original plain image is segmented into two parts. Then, with the aid of histogram shifting, the auxiliary syndrome generated from the first part subimage is embedded into the second part of the original uncompressed image and the encoded image is encrypted using an encryption key. After image encoding and encryption, message is embedded into the first subimage of cipher image and every pixel can load a bit of secret message. At the receiver side, using the encryption key and extracted auxiliary syndrome, the embedded data can be successfully extracted and the original image can be perfectly recovered.
引用
收藏
页码:237 / 241
页数:5
相关论文
共 11 条
  • [1] A commutative digital image watermarking and encryption method in the tree structured Haar transform domain
    Cancellaro, M.
    Battisti, F.
    Carli, M.
    Boato, G.
    De Natale, F. G. B.
    Neri, A.
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2011, 26 (01) : 1 - 12
  • [2] Lossless generalized-LSB data embedding
    Celik, MU
    Sharma, G
    Tekalp, AM
    Saber, E
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (02) : 253 - 266
  • [3] An Improved Reversible Data Hiding in Encrypted Images Using Side Match
    Hong, Wien
    Chen, Tung-Shou
    Wu, Han-Yan
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (04) : 199 - 202
  • [4] Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism
    Hong, Wien
    Chen, Tung-Shou
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2011, 22 (02) : 131 - 140
  • [5] Video fingerprinting and encryption principles for digital rights management
    Kundur, D
    Karthik, K
    [J]. PROCEEDINGS OF THE IEEE, 2004, 92 (06) : 918 - 932
  • [6] Commutative encryption and watermarking in video compression
    Lian, Shiguo
    Liu, Zhongxuan
    Ren, Zhen
    Wang, Haila
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2007, 17 (06) : 774 - 778
  • [7] Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
    Ma, Kede
    Zhang, Weiming
    Zhao, Xianfeng
    Yu, Nenghai
    Li, Fenghua
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (03) : 553 - 562
  • [8] Reversible data hiding
    Ni, ZC
    Shi, YQ
    Ansari, N
    Su, W
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2006, 16 (03) : 354 - 362
  • [9] Expansion embedding techniques for reversible watermarking
    Thodi, Diljith M.
    Rodriguez, Jeffrey J.
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2007, 16 (03) : 721 - 730
  • [10] Reversible data embedding using a difference expansion
    Tian, J
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (08) : 890 - 896