A High Capacity Multi-Level Approach for Reversible Data Hiding in Encrypted Images

被引:88
作者
Ge, Haoli [1 ]
Chen, Yan [1 ]
Qian, Zhenxing [2 ]
Wang, Jianjun [1 ]
机构
[1] Fudan Univ, Sch Informat Sci & Technol, Shanghai 200433, Peoples R China
[2] Fudan Univ, Shanghai Inst Intelligent Elect & Syst, Sch Comp Sci, Shanghai 200433, Peoples R China
关键词
Information hiding; reversible data hiding; image encryption; histogram shifting; WATERMARKING; PREDICTION; DIFFERENCE;
D O I
10.1109/TCSVT.2018.2863029
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a novel method of reversible data hiding in encrypted images (RDH-EI). We first provide an RDH-EI approach using single-level embedding, in which three parties are involved, including an image owner, a data hider, and a recipient. The image owner encrypts an original image into a ciphertext image. After dividing the original image into blocks, the owner pseudo-randomly permutes all blocks by a permutation key. With an encryption key, the image owner further encrypts the contents of all blocks using a stream cipher algorithm, during which pixels inside each block share the same stream bytes. Once the encrypted image is uploaded onto the server, a data hider embeds additional messages into the ciphertext. The data hider divides the encrypted image into blocks and selects peak pixels from each block using an embedding key. With the peak pixels, the data hider embeds an additional message using histogram shifting inside each block. On the receiver side, a recipient extracts the hidden message using the embedding key, and losslessly recover the original image with the permutation key and the encryption key. Based on the single-level algorithm, we further construct a multi-level approach. The embedding process is iteratively used to generate the marked encrypted images. Compared with state-of-the-art works, the proposed method achieves a better embedding efficiency and an error-free recovery.
引用
收藏
页码:2285 / 2295
页数:11
相关论文
共 37 条
[1]  
[Anonymous], 2012, PROC IWDW
[2]   A commutative digital image watermarking and encryption method in the tree structured Haar transform domain [J].
Cancellaro, M. ;
Battisti, F. ;
Carli, M. ;
Boato, G. ;
De Natale, F. G. B. ;
Neri, A. .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2011, 26 (01) :1-12
[3]   High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation [J].
Cao, Xiaochun ;
Du, Ling ;
Wei, Xingxing ;
Meng, Dan ;
Guo, Xiaojie .
IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (05) :1132-1143
[4]   Reversible watermarking method based on asymmetric-histogram shifting of prediction errors [J].
Chen, Xianyi ;
Sun, Xingming ;
Sun, Huiyu ;
Zhou, Zhili ;
Zhang, Jianjun .
JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (10) :2620-2626
[5]   High capacity lossless data hiding based on histogram modification [J].
Fallahpour, M. ;
Sedaaghi, M. H. .
IEICE ELECTRONICS EXPRESS, 2007, 4 (07) :205-210
[6]   Invertible authentication [J].
Fridrich, J ;
Gojan, M ;
Du, R .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 :197-208
[7]   An Improved Reversible Data Hiding in Encrypted Images Using Side Match [J].
Hong, Wien ;
Chen, Tung-Shou ;
Wu, Han-Yan .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (04) :199-202
[8]  
Honsinger C. W., 2001, US Patent, Patent No. [6,278,791, 6278791]
[9]   New Framework for Reversible Data Hiding in Encrypted Domain [J].
Huang, Fangjun ;
Huang, Jiwu ;
Shi, Yun-Qing .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2777-2789
[10]   Reversible Watermarking Method Using Optimal Histogram Pair Shifting Based on Prediction and Sorting [J].
Hwang, Hee Joon ;
Kim, Hyoung Joong ;
Sachnev, Vasiliy ;
Joo, Sang Hyun .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (04) :655-670