Reversible Data Hiding in Encrypted Images Using POB Number System

被引:10
作者
Ren, Hua [1 ]
Niu, Shaozhang [1 ]
Wang, Xinyi [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp, Beijing Key Lab Intelligent Telecommun Software &, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Data mining; Image restoration; Synchronization; Ciphers; Receivers; Reversible data hiding; encrypted image; prediction-error expansion; POB number system; SCHEME;
D O I
10.1109/ACCESS.2019.2946929
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Prediction-error expansion (PEE) methods usually involve the shifting process between peak points and zero points in order to vacate room for embedding. This occurrence will inevitably impose a troublesome because overflow/underflow issue after data embedding may occur, in turn, it dramatically increases the amount of auxiliary information to be transmitted or map information to be embedded. Besides, PEE-based reversible data hiding in encrypted images (RDHEI) methods usually adopt a block-size encryption strategy, but the correlation reservation of intra-block for subsequently embedding may leave opportunities for potential attacks. To deal with these issues, we proposed a novel RDHEI method with the functionality of embedding synchronized with re-encryption, which is well carried out by a data hider using a permutation ordered binary (POB) number system. Unlike conventional PEE-based RDHEI techniques, this scheme takes advantage of two peak points for embedding, but thoroughly abandons the former idea of shifting process. Experimental results verify the superiority of the proposed method, which not only may extend the applications of PEE-based RDHEI schemes substantially, but also vastly extend POB number application scenarios in practice.
引用
收藏
页码:149527 / 149541
页数:15
相关论文
共 28 条
[1]   Encrypted signal-based reversible data hiding with public key cryptosystem [J].
Chen, Yu-Chi ;
Shiu, Chih-Wei ;
Horng, Gwoboa .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) :1164-1170
[2]   Reversible Data Hiding-Based Approach for Intra-Frame Error Concealment in H.264/AVC [J].
Chung, Kuo-Liang ;
Huang, Yong-Huai ;
Chang, Po-Chun ;
Liao, Hong-Yuan Mark .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2010, 20 (11) :1643-1647
[3]   Lossless data embedding - New paradigm in digital watermarking [J].
Fridrich, J ;
Goljan, M ;
Du, R .
EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2002, 2002 (02) :185-196
[4]   A chaos-based digital image encryption scheme with an improved diffusion strategy [J].
Fu, Chong ;
Chen, Jun-jie ;
Zou, Hao ;
Meng, Wei-hong ;
Zhan, Yong-feng ;
Yu, Ya-wen .
OPTICS EXPRESS, 2012, 20 (03) :2363-2378
[5]   An Improved Reversible Data Hiding in Encrypted Images Using Side Match [J].
Hong, Wien ;
Chen, Tung-Shou ;
Wu, Han-Yan .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (04) :199-202
[6]   Reversible data hiding based on histogram modification of prediction-error [J].
Lee, C-F ;
Chen, H-L .
IMAGING SCIENCE JOURNAL, 2011, 59 (05) :278-292
[7]   Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding [J].
Li, Ming ;
Li, Yang .
SIGNAL PROCESSING, 2017, 130 :190-196
[8]   Reversible data hiding in encrypted images using cross division and additive homomorphism [J].
Li, Ming ;
Xiao, Di ;
Zhang, Yushu ;
Nan, Hai .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2015, 39 :234-248
[9]   Efficient Reversible Data Hiding Based on Multiple Histograms Modification [J].
Li, Xiaolong ;
Zhang, Weiming ;
Gui, Xinlu ;
Yang, Bin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) :2016-2027
[10]   Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption [J].
Ma, Kede ;
Zhang, Weiming ;
Zhao, Xianfeng ;
Yu, Nenghai ;
Li, Fenghua .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (03) :553-562