Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3524889.3524896acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciitConference Proceedingsconference-collections
research-article

Reversible Data Hiding in Encrypted Images Based on Multi-Predictor and Quad-tree Block Encoding

Published: 02 May 2022 Publication History

Abstract

With the rapid development of the Internet, people's awareness of privacy protection is also gradually improved. Reversible data hiding of encrypted image is a technique that encrypts the original image and allows the embedding of secret data without knowing the original image information. This method can accurately extract the secret data and reconstruct the original image completely. In this paper, a reversible data hiding algorithm of encrypted image based on multi-predictor and quad-tree block encoding is proposed. First, the original image is divided into 8×8 non-overlapping blocks. Then, multi-predictor is used to predict each block to get the prediction error image, then block scrambling is used to encrypt it. Since the pixel values of the encrypted image are small integer closes to zero, the quad-tree block encoding method can be used to embed a large amount of data. Experimental results show that the embedding rate of this method is better than that of some new algorithms.

References

[1]
J. Tian, 2002. “Reversible watermarking by difference expansion”. in Proc. Workshop Multimedia Secur, 19: 1-4.
[2]
J. Tian, 2003. “Reversible data embedding using a difference expansion”. IEEE Trans. Circuits Syst. Video Technol, 13(8): 890-896.
[3]
Y. Hu, H.-K. Lee, and J. Li, 2009. “DE-based reversible data hiding with improved overflow location map,” IEEE Trans. Circuits Syst. Video Technol, 19(2): 250-260.
[4]
A. K. Sahu and G. Swain, 2018. “Pixel overlapping image steganography using PVD and modulus function”. 3D Res, 9(3): 40.
[5]
A. K. Sahu and G. Swain, 2019. “High fidelity based reversible data hiding using modified LSB matching and pixel difference”. J. King Saud Univ.-Comput. Inf. Sci, 7(4): 1-15.
[6]
A. K. Sahu and G. Swain, 2019. “An optimal information hiding approach based on pixel value differencing and modulus function”. Wireless Pers. Commun, 108(1): 159-174.
[7]
X. Gao, L. An, Y. Yuan, D. Tao, and X. Li, 2011. “Lossless data embedding using generalized statistical quantity histogram”. IEEE Trans. Circuits Syst. Video Technol, 21(8): 1061-1070.
[8]
W.-L. Tai, C.-M. Yeh, and C.-C. Chang, 2009. “Reversible data hiding based on histogram modification of pixel differences”. IEEE Trans. Circuits Syst. Video Technol, 19(6): 906-910.
[9]
Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, 2006. “Reversible data hiding”. IEEE Trans. Circuits Syst. Video Technol, 16(3): 354-362.
[10]
X. Li, B. Li, B. Yang, and T. Zeng, 2013. “General framework to histogram-shifting-based reversible data hiding”. IEEE Trans. Image Process, 22(6): 2181-2191.
[11]
X. Li, W. Zhang, X. Gui, and B. Yang, 2015. “Efficient reversible data hiding based on multiple histograms modification”. IEEE Trans. Inf. Forens. Security, 10(9): 2016-2027.
[12]
J. Wang, J. Ni, X. Zhang and Y. Shi, 2017. “Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting”. IEEE Trans. Cybernetics, 47(2): 315-326.
[13]
G.-D. Su, Y. Liu, and C.-C. Chang, 2019. “A square lattice oriented reversible information hiding scheme with reversibility and adaptivity for dual images”. J. Vis. Commun. Image Represent, 64(102618).
[14]
W. Zhang, X. Hu, X. Li, and N. Yu, 2013. “Recursive histogram modification: Establishing equivalency between reversible data hiding and lossless data compression”. IEEE Trans. Image Process, 22(7): 2775-2785.
[15]
W. Puech, M. Chaumont, and O. Strauss, 2008. “A reversible data hiding method for encrypted images”. Proc. SPIE, 6819.
[16]
X. Zhang, 2011. “Reversible data hiding in encrypted image”. IEEE Signal Process. Lett, 18(4): 255-258.
[17]
W. Hong, T.-S. Chen, and H.-Y. Wu, 2012. “An improved reversible data hiding in encrypted images using side match”. IEEE Signal Process. Lett, 19(4): 199-202.
[18]
X. Zhang, 2012. “Separable reversible data hiding in encrypted image”. IEEE Trans. Inf. Forensics Security, 7(2): 826-832.
[19]
X. Wu, W. Sun, 2014. “High-capacity reversible data hiding in encrypted images by prediction error”. Signal Processing, 104: 387–400.
[20]
J. Zhou, W. Sun, L. Dong, X. Liu, O. C. Au, and Y. Y. Tang, 2016. “Secure reversible image data hiding over encrypted domain via key modulation”. IEEE Trans. Circuits Syst. Video Technol, 26(3): 441-452.
[21]
K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, 2013. “Reversible data hiding in encrypted images by reserving room before encryption”. IEEE Trans. Inf. Forensics Security, 8(3): 553-562.
[22]
Ali Soleymani, Md Jan Nordin, and Zulkarnain Md Ali, 2013. “A Novel Public Key Image Encryption Based on Elliptic Curves over Prime Group Field”. Journal of Image and Graphics, 1(1): 43-49.
[23]
X. Cao, L. Du, X. Wei, D. Meng, and X. Guo, 2016. “High capacity reversible data hiding in encrypted images by patch-level sparse representation”. IEEE Trans. Cybern, 46(5): 1132-1143.
[24]
X. Zhang, J. Long, Z. Wang, and H. Cheng, 2016. “Lossless and reversible data hiding in encrypted images with public-key cryptography”. IEEE Trans. Circuits Syst. Video Technol, 26(9): 1622-1631.
[25]
V. M. Manikandan and V. Masilamani, 2018. “A Novel Reversible Data Hiding Scheme that Provides Image Encryption”. Journal of Image and Graphics, 6(1): pp. 64-68.
[26]
P. Puteaux and W. Puech, 2018. “An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images”. IEEE Trans. Inf. Forensics Security, 13(7): 1670-1681.
[27]
Z. Tang, S. Xu, H. Yao and C. Qin, 2019. “Reversible data hiding with differential compression in encrypted image”. Multimed Tools Appl, 78(8): 9691-9715.
[28]
S. Yi and Y. Zhou, 2019. “Separable and reversible data hiding in encrypted images using parametric binary tree labeling”. IEEE Trans. Multimedia, 21(1): 51-64.
[29]
P. Wang, B. Cai, S. Xu and B. Chen, 2020. “Reversible data hiding scheme based on adjusting pixel modulation and block-wise compression for encrypted images”. IEEE Access, 8:28902-28914.
[30]
B. Guan, D. Xu, 2020. “An efficient high-capacity reversible data hiding scheme for encrypted images”. J. Vis. Commun. Image Represent, 66(102744).
[31]
H. Zhang, L. Li and Q. Li, 2021. “Reversible Data Hiding in Encrypted Images Based on Block-Wise Multi-Predictor”. IEEE Access, 9: 61943-61954.
[32]
X. Wang, C.C Chang, C.C Lin, C.C Chang, 2021. “Privacy-Preserving Reversible Data Hiding Based on Quad-Tree Block Encoding and Integer Wavelet Transform”. J. Vis. Commun. Image Represent, 79(103203).
[33]
Rivest RL, 1992. “The RC4 Encryption Algorithm”. RSA Data Security Inc.
[34]
BossBase Dataset. Accessed: Nov. 2014. [Online]. Available:http://agents.fel.cvut.cz/stegodata/
[35]
P. Bas and T. Furon. Image Database of BOWS-2. Accessed: Jun. 20, 2017. [Online]. Available: http://bows2.ec-lille.fr/

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIIT '22: Proceedings of the 2022 7th International Conference on Intelligent Information Technology
February 2022
137 pages
ISBN:9781450396172
DOI:10.1145/3524889
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 May 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Multi-predictor
  2. RDHEI
  3. quad-tree block encoding

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIIT 2022

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 40
    Total Downloads
  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)1
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media