Reversible Data Hiding in Encrypted Image Based on Block Classification Scrambling

被引:1
作者
Chen, Fan [1 ]
He, Hongjie [1 ]
Ma, Tinghuai [2 ]
Yan, Shu [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 611756, Sichuan, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT II | 2017年 / 10603卷
基金
中国国家自然科学基金;
关键词
Reversible data hiding; Block classification; Scrambling encryption; SCHEME; ERROR;
D O I
10.1007/978-3-319-68542-7_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To improve the security and the quality of decrypted image, this work proposes a reversible data hiding in encrypted image based on block classification scrambling. In image encryption phase, all 8 x 8 blocks are firstly classified into the smooth blocks and texture ones and the corresponding block-type matrix is generated according to their most significant bits (MSB). And then the XOR-encrypted smooth and texture blocks are scrambled by the encryption key, respectively. At last, the encrypted image is generated by scanning the scrambled smooth and texture blocks in order. The risk of content disclosure of encrypted image obtained by the proposed method is reduced since the value and location of each pixel are both protected. Experimental results demonstrate that the probability for lossless recovery of proposed method is 100% even if for texture image Baboon at a high embedding rate of 0.15 bpp.
引用
收藏
页码:162 / 174
页数:13
相关论文
共 25 条
[1]   Self-embedding watermarking scheme against JPEG compression with superior imperceptibility [J].
Chen, Fan ;
He, Hongjie ;
Huo, Yaoran .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (07) :9681-9712
[2]   Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement [J].
Fu, Zhangjie ;
Wu, Xinle ;
Guan, Chaowen ;
Sun, Xingming ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2706-2716
[3]   Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement [J].
Fu, Zhangjie ;
Ren, Kui ;
Shu, Jiangang ;
Sun, Xingming ;
Huang, Fengxiao .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (09) :2546-2559
[4]   An Improved Reversible Data Hiding in Encrypted Images Using Side Match [J].
Hong, Wien ;
Chen, Tung-Shou ;
Wu, Han-Yan .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (04) :199-202
[5]   New Framework for Reversible Data Hiding in Encrypted Domain [J].
Huang, Fangjun ;
Huang, Jiwu ;
Shi, Yun-Qing .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2777-2789
[6]  
[柯彦 Ke Yan], 2016, [计算机研究与发展, Journal of Computer Research and Development], V53, P2307
[7]   A belief propagation-based method for task allocation in open and dynamic cloud environments [J].
Kong, Yan ;
Zhang, Minjie ;
Ye, Dayong .
KNOWLEDGE-BASED SYSTEMS, 2017, 115 :123-132
[8]   Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels [J].
Liao, Xin ;
Shu, Changwen .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2015, 28 :21-27
[9]   A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment [J].
Liu, Qi ;
Cai, Weidong ;
Shen, Jian ;
Fu, Zhangjie ;
Liu, Xiaodong ;
Linge, Nigel .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) :4002-4012
[10]   Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption [J].
Ma, Kede ;
Zhang, Weiming ;
Zhao, Xianfeng ;
Yu, Nenghai ;
Li, Fenghua .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (03) :553-562