Reversible data hiding in compressed and encrypted images by using Kd-tree

被引:10
作者
Nasrullah, Nasrullah [1 ,2 ]
Sang, Jun [1 ,2 ]
Mateen, Muhammad [1 ,2 ]
Akbar, Muhammad Azeem [1 ,2 ]
Xiang, Hong [1 ,2 ]
Xia, Xiaofeng [1 ,2 ]
机构
[1] Chongqing Univ, Key Lab Dependable Serv Comp, Cyber Phys Soc, Minist Educ, Chongqing 400044, Peoples R China
[2] Chongqing Univ, Sch Big Data & Software Engn, Chongqing 401331, Peoples R China
基金
国家重点研发计划;
关键词
Compression; Encryption; Integer wavelet transform (IWT); Kd-tree; Reversible data hiding (RDH); Set partition in hierarchical tree (SPIHT); WATERMARKING TECHNIQUE; HISTOGRAM-MODIFICATION; ROBUST; DOMAIN;
D O I
10.1007/s11042-018-7130-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a joint scheme and a separable scheme for reversible data hiding (RDH) in compressed and encrypted images by reserving room through Kd-tree were proposed. Firstly, the plain cover image was losslessly compressed and encrypted with lifting based integer wavelet transform (IWT) and set partition in hierarchical tree (SPIHT) encoding. Then, several shift operations were performed on the generated SPIHT bit-stream. The shifted bit-stream was restructured into small chunks and packed in the form of a large square matrix. The binary square matrix was exposed to Kd-tree with random permutations and reserving uniform areas of ones and zeros for secret data hiding. After that, a joint or a separable RDH scheme can be performed in these reserved spaces. In the joint RDH scheme, the secret data were embedded in the reserved spaces before encrypting with multiple chaotic maps. Thus, secret data extraction and cover image recovery were achieved together. In the separable RDH scheme, the secret data were embedded in the reserved spaces after encrypting with multiple chaotic maps. Since message extraction and cover image recovery are performed separately, anyone who has the embedding key can extract the secret message from the marked encrypted copy, while cannot recover the cover image. A complete encoding and decoding procedure of RDH for compressed and encrypted images was elaborated. The imperceptibility analysis showed that the proposed methods bring no distortion to the cover image because there was no change to the original cover image. The experimental results showed that the proposed schemes can perform better for secret data extraction and can restore the original image with 100% reversibility with much more embedding capacity and security. The proposed schemes significantly outperform the state-of-the-art RDH methods in the literature on compressed and encrypted images.
引用
收藏
页码:17535 / 17554
页数:20
相关论文
共 31 条
[21]   Utilizing neighborhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks [J].
Parah, Shabir A. ;
Sheikh, Javaid A. ;
Loan, Nazir A. ;
Ahad, Farhana ;
Bhat, Ghulam M. .
MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2018, 29 (03) :1095-1117
[22]   Realization of a New Robust and Secure Watermarking Technique Using DC Coefficient Modification in Pixel Domain and Chaotic Encryption [J].
Parah, Shabir A. ;
Sheikh, Javaid A. ;
Dey, Nilanjan ;
Bhat, G. M. .
JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2017, 25 (04) :80-102
[23]   Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing [J].
Parah, Shabir A. ;
Sheikh, Javaid A. ;
Loan, Nazir A. ;
Bhat, Ghulam M. .
DIGITAL SIGNAL PROCESSING, 2016, 53 :11-24
[24]  
Qian Z., 2016, IEEE T DEPENDABLE SE
[25]   Reversible Data Hiding: Advances in the Past Two Decades [J].
Shi, Yun-Qing ;
Li, Xiaolong ;
Zhang, Xinpeng ;
Wu, Hao-Tian ;
Ma, Bin .
IEEE ACCESS, 2016, 4 :3210-3237
[26]   Reversible Data Hiding Based on Histogram Modification of Pixel Differences [J].
Tai, Wei-Liang ;
Yeh, Chia-Ming ;
Chang, Chin-Chen .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2009, 19 (06) :904-908
[27]  
Tang Z., 2018, MULTIMED TOOLS APPL, P1
[28]  
Thanikaiselvan V, 2017, STUD COMPUT INTELL, V660, P65, DOI 10.1007/978-3-319-44790-2_4
[29]   Reversible data embedding using a difference expansion [J].
Tian, J .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (08) :890-896
[30]   ACIS: An Improved Actor-Critic Method for POMDPs with Internal State [J].
Xu, Dan ;
Liu, Quan .
2015 IEEE 27TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2015), 2015, :369-376