Reversible data hiding in encrypted images using cross division and additive homomorphism

被引:80
作者
Li, Ming [1 ]
Xiao, Di [2 ]
Zhang, Yushu [3 ]
Nan, Hai [2 ]
机构
[1] Henan Normal Univ, Coll Comp & Informat Engn, Xinxiang 453007, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[3] Southwest Univ, Sch Elect & Informat Engn, Chongqing 400715, Peoples R China
基金
中国国家自然科学基金;
关键词
Reversible data hiding; Image encryption; Cross division; Additive homomorphism; Histogram shifting; WATERMARKING; SCHEME; EXPANSION; RC4;
D O I
10.1016/j.image.2015.10.001
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
There are three problems in the existing reversible data hiding (RDH) algorithms in encrypted images: one is that some algorithms are not processed in the encrypted domain; another is that the reversibility which implies exact data extraction and perfect image recovery cannot be ensured in some cases; the last is that data expansion occurs when probabilistic public-key cryptosystem is used for image encryption in some homomorphic schemes. In this paper, a complete RDH in encrypted images is proposed. By using the idea of cross division and additive homomorphism, we solve all of the problems. Experimental results verify the superiority of the proposed method, which will have a good potential for practical applications of multimedia privacy protection. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:234 / 248
页数:15
相关论文
共 43 条
[1]  
Ai H., 2015, STANDARD TEST IMAGES
[2]   Reversible watermark using the difference expansion of a generalized integer transform [J].
Alattar, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (08) :1147-1156
[3]  
Alligood K. T., 1996, CHAOS
[4]  
[Anonymous], IEEE T CIRCUITS SYST
[5]  
[Anonymous], 1978, FDN SEC COMPUT
[6]  
[Anonymous], 2007, Applied Cryptography: Protocols, Algorithms, and Source Code in C
[7]   Intelligent reversible watermarking in integer wavelet domain for medical images [J].
Arsalan, Muhammad ;
Malik, Sana Ambreen ;
Khan, Asifullah .
JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (04) :883-894
[8]   Tailored reversible watermarking schemes for authentication of electronic clinical atlas [J].
Bao, F ;
Deng, RH ;
Ooi, BC ;
Yang, YJ .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2005, 9 (04) :554-563
[9]   A commutative digital image watermarking and encryption method in the tree structured Haar transform domain [J].
Cancellaro, M. ;
Battisti, F. ;
Carli, M. ;
Boato, G. ;
De Natale, F. G. B. ;
Neri, A. .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2011, 26 (01) :1-12
[10]   Lossless generalized-LSB data embedding [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM ;
Saber, E .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (02) :253-266