Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Reversible data hiding in encrypted image with separable data extraction from image decryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

We propose a method of reversible data hiding in encrypted image. Proposed method achieves reserving room before encryption, and separates data extraction from image decryption. Our method is an improvement of Ma’s method [IEEE Trans Inf Forensic Secur 8(3):554–558, 2013]. Our improvements mainly focus on two aspects. (1) We improved the interpolation error estimate method via using Bicubic interpolation instead of pixel estimation that calculates the weighted sum of four surrounding pixels. Thus more sharp interpolation error histogram is obtained to increase the hidden information capacity. (2) We use partitioned local histogram shift instead of traditional histogram shift to reduce the amount of shifted pixels. This directly results in a higher quality of stego image in the same embedding capacity. The experimental results indicate that the improved method offers better performance. It is superior to Ma’s work in both embedding rate and the PSNR values of stego images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156

    Article  MathSciNet  Google Scholar 

  2. Cancellaro M, Battisti F, Carli M, Boato G, Natale FGB, Neri A (2011) A commutative digital image watermarking and encryption method in the tree structured haar transform domain. Signal Process Image Commun 26(1):1–12

    Article  MATH  Google Scholar 

  3. Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-lsb data embedding. IEEE Trans Image Process 14(2):253–266

    Article  Google Scholar 

  4. Chang C-C, Lin C-C, Chen Y-H (2008) Reversible data-embedding scheme using differences between original and predicted pixel values. IET Inf Secur 2(2):35–46

    Article  Google Scholar 

  5. Feng J, Lin I, Tsai C, Chu Y (2006) Reversible watermarking: current status and key issues. Int J Netw Secur 12(3):161–171

    Google Scholar 

  6. Fridrich J, Goljan M (2002) Lossless data embedding for all image formats. In: Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol 4675, pp 572–583

  7. Fridrich J, Goljan M, Du R (2001) Invertible authentication watermark for JPEG image. In: Proceedings of Information Technology: Coding and Computing, pp 223–227

  8. Hong W (2011) Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism. J Vis Commun Image Represent 22:131–140

    Article  Google Scholar 

  9. Hong W, Chen T, Wu H (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process lett 19(4):199–202

    Article  Google Scholar 

  10. Hu Y, Lee HK, Li J (2009) DE-based reversible data hiding with improved overflow location map. IEEE Trans Circuits Syst Video Technol 19(2):250–260

    Article  Google Scholar 

  11. Kamstra L, Heijmans H (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082–2090

    Article  MathSciNet  Google Scholar 

  12. Kim KS, Lee MJ, Lee HY, Lee HK (2009) Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recogn 42:3083–3096

    Article  MATH  Google Scholar 

  13. Kim HJ, Sachnev V, Shi YQ, Nam J, Choo HG (2008) A novel difference expansion transform for reversible data embedding. IEEE Trans Inf Forensics Secur 3(3):456–465

    Article  Google Scholar 

  14. Kuribayashi M, Tanaka H (2005) Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans Image Process 14:2129–2139

    Article  Google Scholar 

  15. Lee CF, Huang YL (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl 39:6712–6719

    Article  Google Scholar 

  16. Li X, Orchard MT (2001) Edge-directed prediction for lossless compression of natural images. IEEE Trans Image Process 10(6):813–817

    Article  MATH  Google Scholar 

  17. Li XL, Yang B, Zeng TY (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20(12):3524–3533

    Article  MathSciNet  Google Scholar 

  18. Luo LX, Chen ZY, Chen M, Luo L et al (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187–193

    Article  Google Scholar 

  19. Ma K, Zhang W (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8(3):554–558

    Article  Google Scholar 

  20. Memon N, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Trans Image Process 10(4):643–649

    Article  MATH  Google Scholar 

  21. Ni Z, Shi Y, Ansari N, Wei S (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362

    Article  Google Scholar 

  22. Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst Video Technol 19(7):989–999

    Article  Google Scholar 

  23. Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730

    Article  MathSciNet  Google Scholar 

  24. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896

    Article  Google Scholar 

  25. Tsai P, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89:1129–1143

    Article  MATH  Google Scholar 

  26. Zeng W (1998) Digital watermarking and data hiding: technologies and applications. In: Proc. Int. Conf. Inf. Syst, Anal. Synth. 3: 223–229

  27. Zhang X (2011) Reversible data hiding in encypted image. IEEE Signal Process lett 18(4):255–257

    Article  Google Scholar 

  28. Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):826–832

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaofeng Wang.

Additional information

This work was supported by the National High Technology Development 973 Program of China under Grant No. 2012CB316400; the National Natural Science Foundation of China under Grant No.61075007; The Natural Science Foundation of Shaanxi Province of China under Grant No.2015JM6262.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, X., Han, X., Xi, J. et al. Reversible data hiding in encrypted image with separable data extraction from image decryption. Multimed Tools Appl 76, 6127–6142 (2017). https://doi.org/10.1007/s11042-016-3288-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3288-3

Keywords

Navigation