Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Reversible data hiding in compressed and encrypted images by using Kd-tree

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a joint scheme and a separable scheme for reversible data hiding (RDH) in compressed and encrypted images by reserving room through Kd-tree were proposed. Firstly, the plain cover image was losslessly compressed and encrypted with lifting based integer wavelet transform (IWT) and set partition in hierarchical tree (SPIHT) encoding. Then, several shift operations were performed on the generated SPIHT bit-stream. The shifted bit-stream was restructured into small chunks and packed in the form of a large square matrix. The binary square matrix was exposed to Kd-tree with random permutations and reserving uniform areas of ones and zeros for secret data hiding. After that, a joint or a separable RDH scheme can be performed in these reserved spaces. In the joint RDH scheme, the secret data were embedded in the reserved spaces before encrypting with multiple chaotic maps. Thus, secret data extraction and cover image recovery were achieved together. In the separable RDH scheme, the secret data were embedded in the reserved spaces after encrypting with multiple chaotic maps. Since message extraction and cover image recovery are performed separately, anyone who has the embedding key can extract the secret message from the marked encrypted copy, while cannot recover the cover image. A complete encoding and decoding procedure of RDH for compressed and encrypted images was elaborated. The imperceptibility analysis showed that the proposed methods bring no distortion to the cover image because there was no change to the original cover image. The experimental results showed that the proposed schemes can perform better for secret data extraction and can restore the original image with 100% reversibility with much more embedding capacity and security. The proposed schemes significantly outperform the state-of-the-art RDH methods in the literature on compressed and encrypted images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Amirtharajan R, Archana P, Rayappan J (2013) Why image encryption for better steganography. Res J Inf Technol 5:341–351

    Google Scholar 

  2. Arivazhagan S, Jebarani WSL, Karthika C (2014) Reversible data hiding by reserving room. In: Communication and Network Technologies (ICCNT), 2014 International Conference on, IEEE, pp 100-104

  3. Chang C-C, Lin C-C, Tseng C-S, Tai W-L (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177(13):2768–2786

    Article  Google Scholar 

  4. Chang C-C, Lin C-Y, Fan Y-H (2008) Lossless data hiding for color images based on block truncation coding. Pattern Recogn 41(7):2347–2357

    Article  MATH  Google Scholar 

  5. Chang C-C, Kieu TD, Wu W-C (2009) A lossless data embedding technique by joint neighboring coding. Pattern Recogn 42(7):1597–1603

    Article  MATH  Google Scholar 

  6. Chang J-C, Lu Y-Z, Wu H-L (2017) A separable reversible data hiding scheme for encrypted JPEG bitstreams. Signal Process 133:135–143

    Article  Google Scholar 

  7. Kamstra L, Heijmans HJ (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082–2090

    Article  MathSciNet  Google Scholar 

  8. Kavin BE, Latha B (2014) Reversible data hiding in image encryption with efficient compression and enhanced security. In: Information Communication and Embedded Systems (ICICES), 2014 International Conference on. IEEE, pp 1-5

  9. Khanam F-T-Z, Kim S (2017) Enhanced joint and separable reversible data hiding in encrypted images with high payload. Symmetry 9(4):50

    Article  MathSciNet  Google Scholar 

  10. Lee J-D, Chiou Y-H, Guo J-M (2010) Reversible data hiding based on histogram modification of SMVQ indices. IEEE Transactions on Information Forensics and Security 5(4):638–648

    Article  Google Scholar 

  11. Li Z, Wu W (2016) Reversible Data Hiding for Encrypted Images Based on Statistical Learning. In: Australasian Conference on Information Security and Privacy, Springer, pp 198-212

  12. Li Q, Yan B, Li H, Chen N (2018) Separable reversible data hiding in encrypted images with improved security and capacity. Multimed Tools Appl:1–20

  13. Lin C-C, Liu X-L, Tai W-L, Yuan S-M (2015) A novel reversible data hiding scheme based on AMBTC compression technique. Multimed Tools Appl 74(11):3823–3842

    Article  Google Scholar 

  14. Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6:19876–19897

    Article  Google Scholar 

  15. Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics and Security 8(3):553–562

    Article  Google Scholar 

  16. McCartney M (2011) Lyapunov exponents for multi-parameter tent and logistic maps. Chaos: An Interdisciplinary Journal of Nonlinear Science 21(4):043104

    Article  MathSciNet  MATH  Google Scholar 

  17. Mohan AK, Saranya M, Anusudha K (2014) Separable Reversible Data Hiding using Chaotic Encryption and Histogram Shifting. International Journal of Simulation--Systems, Science & Technology 15 (4)

  18. Nasrullah SJ, Akbar M, Cai B, Xiang H, Hu H (2018, 1963) Joint image compression and encryption using IWT with SPIHT, Kd-tree and chaotic maps. Appl Sci 8(10)

  19. Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digital Signal Processing 53:11–24

    Article  Google Scholar 

  20. Parah SA, Sheikh JA, Dey N, Bhat G (2017) Realization of a new robust and secure watermarking technique using DC coefficient modification in pixel domain and chaotic encryption. Journal of Global Information Management (JGIM) 25(4):80–102

    Article  Google Scholar 

  21. Parah SA, Loan NA, Shah AA, Sheikh JA, Bhat G (2018) A new secure and robust watermarking technique based on logistic map and modification of DC coefficient. Nonlinear Dynamics:1-19

  22. Parah SA, Sheikh JA, Loan NA, Ahad F, Bhat GM (2018) Utilizing neighborhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks. Multidim Syst Sign Process 29(3):1095–1117

    Article  MathSciNet  Google Scholar 

  23. Qian Z, Zhou H, Zhang X, Zhang W (2016) Separable reversible data hiding in encrypted JPEG bitstreams. IEEE Transactions on Dependable and Secure Computing

  24. Shi Y-Q, Li X, Zhang X, Wu H-T, Ma B (2016) Reversible data hiding: advances in the past two decades. IEEE Access 4:3210–3237

    Article  Google Scholar 

  25. Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Transactions on Circuits and Systems for Video technology 19(6):906–910

    Article  Google Scholar 

  26. Tang Z, Xu S, Yao H, Qin C, Zhang X (2018) Reversible data hiding with differential compression in encrypted image. Multimedia Tools and Applications:1-25

  27. Thanikaiselvan V, Shastri S, Ahmad S (2017) Information Hiding: Steganography. In: Intelligent Techniques in Signal Processing for Multimedia Security. Springer, pp 65-91

  28. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video technology 13(8):890–896

    Article  Google Scholar 

  29. Wang L, Pan Z, Zhu R (2017) A novel reversible data hiding scheme by introducing current state codebook and prediction strategy for joint neighboring coding. Multimedia Tools and Applications:1-24

  30. Xu D, Chen K, Wang R, Su S (2015) Completely Separable Reversible Data Hiding in Encrypted Images. In: International Workshop on Digital Watermarking, Springer, pp 365-377

  31. Yin Z, Niu X, Zhang X, Tang J, Luo B (2018) Reversible data hiding in encrypted AMBTC images. Multimedia Tools and Applications:1-17

Download references

Acknowledgements

This research was supported by National Key R&D Program of China (No. 2017YFB0802400).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Sang.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nasrullah, N., Sang, J., Mateen, M. et al. Reversible data hiding in compressed and encrypted images by using Kd-tree. Multimed Tools Appl 78, 17535–17554 (2019). https://doi.org/10.1007/s11042-018-7130-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-7130-y

Keywords

Navigation