Separable Reversible Data Hiding in Encrypted Image

被引:540
作者
Zhang, Xinpeng [1 ]
机构
[1] Shanghai Univ, Sch Commun, Shanghai 200072, Peoples R China
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
Image encryption; image recovery; reversible data hiding; WATERMARKING;
D O I
10.1109/TIFS.2011.2176120
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work proposes a novel scheme for separable reversible data hiding in encrypted images. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data. With an encrypted image containing additional data, if a receiver has the data-hiding key, he can extract the additional data though he does not know the image content. If the receiver has the encryption key, he can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data-hiding key and the encryption key, he can extract the additional data and recover the original content without any error by exploiting the spatial correlation in natural image when the amount of additional data is not too large.
引用
收藏
页码:826 / 832
页数:8
相关论文
共 19 条
[1]   Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals [J].
Bianchi, Tiziano ;
Piva, Alessandro ;
Barni, Mauro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) :180-187
[2]   On the Implementation of the Discrete Fourier Transform in the Encrypted Domain [J].
Bianchi, Tiziano ;
Piva, Alessandro ;
Barni, Mauro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (01) :86-97
[3]   A commutative digital image watermarking and encryption method in the tree structured Haar transform domain [J].
Cancellaro, M. ;
Battisti, F. ;
Carli, M. ;
Boato, G. ;
De Natale, F. G. B. ;
Neri, A. .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2011, 26 (01) :1-12
[4]   Lossless generalized-LSB data embedding [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM ;
Saber, E .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (02) :253-266
[5]   Reversible data-embedding scheme using differences between original and predicted pixel values [J].
Chang, C. -C. ;
Lin, C. -C. ;
Chen, Y. -H. .
IET INFORMATION SECURITY, 2008, 2 (02) :35-46
[6]  
Deng MN, 2009, MM&SEC'09: PROCEEDINGS OF THE 2009 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, P9
[7]   A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification [J].
Hong, Wien ;
Chen, Tung-Shou ;
Chang, Yu-Ping ;
Shiu, Chih-Wei .
SIGNAL PROCESSING, 2010, 90 (11) :2911-2922
[8]   On compressing encrypted data [J].
Johnson, M ;
Ishwar, P ;
Prabhakaran, V ;
Schonberg, D ;
Ramchandran, K .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2004, 52 (10) :2992-3006
[9]   Video fingerprinting and encryption principles for digital rights management [J].
Kundur, D ;
Karthik, K .
PROCEEDINGS OF THE IEEE, 2004, 92 (06) :918-932
[10]   Fingerprinting protocol for images based on additive homomorphic property [J].
Kuribayashi, M ;
Tanaka, H .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (12) :2129-2139