Abstract
We propose a method of reversible data hiding in encrypted image. Proposed method achieves reserving room before encryption, and separates data extraction from image decryption. Our method is an improvement of Ma’s method [IEEE Trans Inf Forensic Secur 8(3):554–558, 2013]. Our improvements mainly focus on two aspects. (1) We improved the interpolation error estimate method via using Bicubic interpolation instead of pixel estimation that calculates the weighted sum of four surrounding pixels. Thus more sharp interpolation error histogram is obtained to increase the hidden information capacity. (2) We use partitioned local histogram shift instead of traditional histogram shift to reduce the amount of shifted pixels. This directly results in a higher quality of stego image in the same embedding capacity. The experimental results indicate that the improved method offers better performance. It is superior to Ma’s work in both embedding rate and the PSNR values of stego images.
Similar content being viewed by others
References
Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156
Cancellaro M, Battisti F, Carli M, Boato G, Natale FGB, Neri A (2011) A commutative digital image watermarking and encryption method in the tree structured haar transform domain. Signal Process Image Commun 26(1):1–12
Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-lsb data embedding. IEEE Trans Image Process 14(2):253–266
Chang C-C, Lin C-C, Chen Y-H (2008) Reversible data-embedding scheme using differences between original and predicted pixel values. IET Inf Secur 2(2):35–46
Feng J, Lin I, Tsai C, Chu Y (2006) Reversible watermarking: current status and key issues. Int J Netw Secur 12(3):161–171
Fridrich J, Goljan M (2002) Lossless data embedding for all image formats. In: Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol 4675, pp 572–583
Fridrich J, Goljan M, Du R (2001) Invertible authentication watermark for JPEG image. In: Proceedings of Information Technology: Coding and Computing, pp 223–227
Hong W (2011) Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism. J Vis Commun Image Represent 22:131–140
Hong W, Chen T, Wu H (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process lett 19(4):199–202
Hu Y, Lee HK, Li J (2009) DE-based reversible data hiding with improved overflow location map. IEEE Trans Circuits Syst Video Technol 19(2):250–260
Kamstra L, Heijmans H (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082–2090
Kim KS, Lee MJ, Lee HY, Lee HK (2009) Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recogn 42:3083–3096
Kim HJ, Sachnev V, Shi YQ, Nam J, Choo HG (2008) A novel difference expansion transform for reversible data embedding. IEEE Trans Inf Forensics Secur 3(3):456–465
Kuribayashi M, Tanaka H (2005) Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans Image Process 14:2129–2139
Lee CF, Huang YL (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl 39:6712–6719
Li X, Orchard MT (2001) Edge-directed prediction for lossless compression of natural images. IEEE Trans Image Process 10(6):813–817
Li XL, Yang B, Zeng TY (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20(12):3524–3533
Luo LX, Chen ZY, Chen M, Luo L et al (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187–193
Ma K, Zhang W (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8(3):554–558
Memon N, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Trans Image Process 10(4):643–649
Ni Z, Shi Y, Ansari N, Wei S (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362
Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst Video Technol 19(7):989–999
Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896
Tsai P, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89:1129–1143
Zeng W (1998) Digital watermarking and data hiding: technologies and applications. In: Proc. Int. Conf. Inf. Syst, Anal. Synth. 3: 223–229
Zhang X (2011) Reversible data hiding in encypted image. IEEE Signal Process lett 18(4):255–257
Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):826–832
Author information
Authors and Affiliations
Corresponding author
Additional information
This work was supported by the National High Technology Development 973 Program of China under Grant No. 2012CB316400; the National Natural Science Foundation of China under Grant No.61075007; The Natural Science Foundation of Shaanxi Province of China under Grant No.2015JM6262.
Rights and permissions
About this article
Cite this article
Wang, X., Han, X., Xi, J. et al. Reversible data hiding in encrypted image with separable data extraction from image decryption. Multimed Tools Appl 76, 6127–6142 (2017). https://doi.org/10.1007/s11042-016-3288-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3288-3