Reversible data hiding in compressed and encrypted images by using Kd-tree

被引:10
作者
Nasrullah, Nasrullah [1 ,2 ]
Sang, Jun [1 ,2 ]
Mateen, Muhammad [1 ,2 ]
Akbar, Muhammad Azeem [1 ,2 ]
Xiang, Hong [1 ,2 ]
Xia, Xiaofeng [1 ,2 ]
机构
[1] Chongqing Univ, Key Lab Dependable Serv Comp, Cyber Phys Soc, Minist Educ, Chongqing 400044, Peoples R China
[2] Chongqing Univ, Sch Big Data & Software Engn, Chongqing 401331, Peoples R China
基金
国家重点研发计划;
关键词
Compression; Encryption; Integer wavelet transform (IWT); Kd-tree; Reversible data hiding (RDH); Set partition in hierarchical tree (SPIHT); WATERMARKING TECHNIQUE; HISTOGRAM-MODIFICATION; ROBUST; DOMAIN;
D O I
10.1007/s11042-018-7130-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a joint scheme and a separable scheme for reversible data hiding (RDH) in compressed and encrypted images by reserving room through Kd-tree were proposed. Firstly, the plain cover image was losslessly compressed and encrypted with lifting based integer wavelet transform (IWT) and set partition in hierarchical tree (SPIHT) encoding. Then, several shift operations were performed on the generated SPIHT bit-stream. The shifted bit-stream was restructured into small chunks and packed in the form of a large square matrix. The binary square matrix was exposed to Kd-tree with random permutations and reserving uniform areas of ones and zeros for secret data hiding. After that, a joint or a separable RDH scheme can be performed in these reserved spaces. In the joint RDH scheme, the secret data were embedded in the reserved spaces before encrypting with multiple chaotic maps. Thus, secret data extraction and cover image recovery were achieved together. In the separable RDH scheme, the secret data were embedded in the reserved spaces after encrypting with multiple chaotic maps. Since message extraction and cover image recovery are performed separately, anyone who has the embedding key can extract the secret message from the marked encrypted copy, while cannot recover the cover image. A complete encoding and decoding procedure of RDH for compressed and encrypted images was elaborated. The imperceptibility analysis showed that the proposed methods bring no distortion to the cover image because there was no change to the original cover image. The experimental results showed that the proposed schemes can perform better for secret data extraction and can restore the original image with 100% reversibility with much more embedding capacity and security. The proposed schemes significantly outperform the state-of-the-art RDH methods in the literature on compressed and encrypted images.
引用
收藏
页码:17535 / 17554
页数:20
相关论文
共 31 条
[1]  
AMIRTHARAJAN R, 2013, RES J INFORM TECHNOL, V5, P341
[2]  
[Anonymous], 2017, Micro Electro Mech. Syst, DOI DOI 10.1007/978-981-10-2798-7_34-1
[3]  
Arivazhagan S, 2014, 2014 INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK TECHNOLOGIES (ICCNT), P100, DOI 10.1109/CNT.2014.7062733
[4]   Lossless data hiding for color images based on block truncation coding [J].
Chang, Chin-Chen ;
Lin, Chih-Yang ;
Fan, Yi-Hsuan .
PATTERN RECOGNITION, 2008, 41 (07) :2347-2357
[5]   Reversible hiding in DCT-based compressed images [J].
Chang, Chin-Chen ;
Lin, Chia-Chen ;
Tseng, Chun-Sen ;
Tai, Wei-Liang .
INFORMATION SCIENCES, 2007, 177 (13) :2768-2786
[6]   A lossless data embedding technique by joint neighboring coding [J].
Chang, Chin-Chen ;
Kieu, The Duc ;
Wu, Wen-Chuan .
PATTERN RECOGNITION, 2009, 42 (07) :1597-1603
[7]   A separable reversible data hiding scheme for encrypted JPEG bitstreams [J].
Chang, Jen-Chun ;
Lu, Yi-Zhi ;
Wu, Hsin-Lung .
SIGNAL PROCESSING, 2017, 133 :135-143
[8]   Reversible data embedding into images using wavelet techniques and sorting [J].
Kamstra, L ;
Heijmans, HJAM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (12) :2082-2090
[9]  
Kavin BE, 2014, INF COMM EMB SYST IC, P1
[10]   Enhanced Joint and Separable Reversible Data Hiding in Encrypted Images with High Payload [J].
Khanam, Fatema-Tuz-Zohra ;
Kim, Sunghwan .
SYMMETRY-BASEL, 2017, 9 (04)