On the Design of Multi-Party Reversible Data Hiding over Ciphered Overexposed Images
<p>Four overexposed images used for the experiment. (<b>a</b>) 1851.pgm, (<b>b</b>) 1933.pgm, (<b>c</b>) 2025.pgm, and (<b>d</b>) 7343.pgm.</p> "> Figure 2
<p>The framework of the presented approach, in which there are three parties actively involved.</p> "> Figure 3
<p>Sketch of the key generation process, where the security level of the secure hash algorithm is 256 bits.</p> "> Figure 4
<p>An example of the difference retaining in a group.</p> "> Figure 5
<p>Validate the proposed approach employing (3,4) modified secret sharing. (<b>a</b>) The primitive overexposed image, (<b>b</b>) the first ciphered overexposed image, (<b>c</b>) the second ciphered overexposed image, (<b>d</b>) the third ciphered overexposed image, (<b>e</b>) the fourth ciphered overexposed image, (<b>f</b>) the first marked ciphered overexposed image, (<b>g</b>) the second marked ciphered overexposed image, (<b>h</b>) the third marked ciphered overexposed image, (<b>i</b>) the fourth marked ciphered overexposed image, (<b>j</b>) the reestablished overexposed image with (<b>f</b>–<b>h</b>), (<b>k</b>) the reestablished overexposed image with (<b>f</b>,<b>g</b>,<b>i</b>), (<b>l</b>) the reestablished overexposed image with (<b>f</b>,<b>h</b>,<b>i</b>), and (<b>m</b>) the reestablished overexposed image with (<b>g</b>–<b>i</b>).</p> "> Figure 6
<p>Imperceptibility of the presented approach. (<b>a</b>) Primitive overexposed image, (<b>b</b>) the scrambled overexposed image, (<b>c</b>) the ciphered overexposed image, (<b>d</b>) the marked ciphered overexposed image with an embedding rate of 0.2 bpp, and (<b>e</b>) the marked ciphered overexposed image with an embedding rate of 0.4 bpp.</p> "> Figure 7
<p>Histograms of the overexposed images for statistical security analysis. (<b>a</b>) Primitive overexposed image “1851.pgm”, (<b>b</b>–<b>d</b>) the three ciphered overexposed images of (<b>a</b>), (<b>e</b>–<b>g</b>) the three marked ciphered overexposed images with respect to (<b>b</b>–<b>d</b>), (<b>h</b>) primitive overexposed image “7343.pgm”, (<b>i</b>–<b>k</b>) the three ciphered overexposed images of (<b>h</b>), and (<b>l</b>–<b>m</b>) the three marked ciphered overexposed images with respect to (<b>i</b>–<b>k</b>).</p> "> Figure 8
<p>Effect of the parameter <span class="html-italic">d</span> changes on embedding capacity for different overexposed images. (<b>a</b>) 1851.pgm, (<b>b</b>) 1933.pgm, (<b>c</b>) 2025.pgm, and (<b>d</b>) 7343.pgm.</p> ">
Abstract
:1. Introduction
- By decomposing the pixel of the overexposed image into two parts, each of which is suitable for secret sharing, it is thus efficient to handle overflow pixels.
- An encryption algorithm combining group scrambling and modified secret sharing is given for the overexposed image, by which the differences of the groups of ciphered overexposed images are retained. It means that the ciphered overexposed images can be facilely used for data hiding.
- According to the given overexposed image encryption, the overflow pixels can be encrypted without labeling, so the executing time of the overexposed image encryption is reduced.
2. Related Works
3. Presented Approach
3.1. Overexposed Image Encryption
Algorithm 1 Overexposed image encryption. |
Input: Overexposed Image O, Encryption Key. |
Output: Ciphered Overexposed Image . |
Divide O into groups with size 1 × 2; |
Obtain scrambled overexposed image by scrambling the groups; |
for r ← 1 : n do |
Generate with the encryption key; |
for i ← 1 : P do |
for j ← 1 : Q do |
if ≥ d && ≤ 255 then |
←; |
Construct polynomial by Equation (1) with , d and random integer ; |
else |
←; |
Construct polynomial by Equation (2) with and random integer ; |
end if |
← Calculate with ; |
end for |
end for |
end for |
3.2. Data Hiding
- Compute the integer mean and difference of the groups of ciphered overexposed images. For each , the integer mean and difference are computed by and , respectively, where is a floor function.
- Determine the expandable and non-expandable groups. A group is expandable if its integer mean l and difference h satisfy , where b is the bit of the secret data; otherwise, it is considered non-expandable. In addition, an LM is created to label expandable and non-expandable groups, and their associated bits are set to 0 and 1, respectively.
- Embed secret data into the expandable groups. First, for each expandable group, a new difference is generated with the difference h by
Algorithm 2 Data hiding. |
Input: Ciphered Overexposed Image , Embedded Bit b. Output: Marked Ciphered Overexposed Image .
|
3.3. Data Extraction and Overexposed Image Restoration
3.3.1. Data Extraction
- Fix the expandable groups. Extract the compressed LM from the pixels of the initial few rows of marked ciphered overexposed images, and decode it to obtain the associated LM. By the decoded LM, the expandable groups are fixed, that is, if the bit of LM is 0, the corresponding group is expandable.
- Compute the integer mean and difference of the expandable groups. For an expandable group , the integer mean and difference are computed by and , respectively.
- Retrieve the secret data by utilizing the difference . The embedded secret data are obtained by
Algorithm 3 Data extraction. |
Input: Any t Marked Ciphered Overexposed Image . Output: Embedded bit b.
|
3.3.2. Overexposed Image Restoration
Algorithm 4 Overexposed image restoration. |
Input: Any t Marked Ciphered Overexposed Image , Encryption Key. Output: Primitive Overexposed Image O.
|
4. Experimental Results and Analysis
4.1. Experimental Setup
4.2. Effectiveness of the Presented Scheme
4.3. Security Analysis
4.3.1. Key Strength
4.3.2. Imperceptibility
4.3.3. Statistical Security
4.3.4. Occlusion Attack
4.4. Discussion on Parameter d
4.5. Efficiency Comparison
4.6. Embedding Capacity Analysis
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Mathivanan, P.; Balaji Ganesh, A. QR code based color image stego-crypto technique using dynamic bit replacement and logistic map. Optik 2021, 225, 165838. [Google Scholar]
- Mathivanan, P.; Balaji Ganesh, A. ECG steganography using Base64 encoding and pixel swapping technique. Multimed. Tools Appl. 2023, 82, 14945–14962. [Google Scholar] [CrossRef]
- Yang, Y.; Xiao, X.; Cai, X.; Zhang, W. A Secure and Privacy-Preserving Technique Based on Contrast-Enhancement Reversible Data Hiding and Plaintext Encryption for Medical Images. IEEE Signal Process. Lett. 2020, 27, 256–260. [Google Scholar] [CrossRef]
- Peng, Y.; Zhao, Y.; Mao, N.; Wang, J.; Fang, Y.; Zhang, T.; Shi, F. Color image reversible data hiding based on multi-channel synchronized histogram. J. King Saud Univ. Comput. Inf. Sci. 2023, 35, 101804. [Google Scholar] [CrossRef]
- Weng, S.; Zhou, Y.; Zhang, T.; Xiao, M.; Zhao, Y. Reversible data hiding for JPEG images with adaptive multiple two-dimensional histogram and mapping generation. IEEE Trans. Multimed. 2023, 25, 8738–8752. [Google Scholar] [CrossRef]
- Mandal, P.C.; Mukherjee, I.; Chatterji, B.N. High capacity reversible and secured data hiding in images using interpolation and difference expansion technique. Multimed. Tools Appl. 2021, 80, 3623–3644. [Google Scholar] [CrossRef]
- Tian, J. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 890–896. [Google Scholar] [CrossRef]
- Sahu, A.K.; Swain, G. High fidelity based reversible data hiding using modified LSB matching and pixel difference. J. King Saud Univ. Comput. Inf. Sci. 2022, 34, 1395–1409. [Google Scholar] [CrossRef]
- Qi, W.; Li, X.; Zhang, T.; Guo, Z. Optimal Reversible Data Hiding Scheme Based on Multiple Histograms Modification. IEEE Trans. Circuits Syst. Video Technol. 2020, 30, 2300–2312. [Google Scholar] [CrossRef]
- Weng, S.; Tan, W.; Ou, B.; Pan, J.S. Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm. Inf. Sci. 2021, 549, 13–33. [Google Scholar] [CrossRef]
- Pan, Z.; Gao, X.; Gao, E.; Fan, G. Adaptive Complexity for Pixel-Value-Ordering Based Reversible Data Hiding. IEEE Signal Process. Lett. 2020, 27, 915–919. [Google Scholar] [CrossRef]
- Zhang, T.; Li, X.; Qi, W.; Guo, Z. Location-Based PVO and Adaptive Pairwise Modification for Efficient Reversible Data Hiding. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2306–2319. [Google Scholar] [CrossRef]
- He, W.; Cai, Z. Reversible Data Hiding Based on Dual Pairwise Prediction-Error Expansion. IEEE Trans. Image Process. 2021, 30, 5045–5055. [Google Scholar] [CrossRef]
- Yu, C.; Zhang, X.; Wang, D.; Tang, Z. Reversible data hiding with pairwise PEE and 2D-PEH decomposition. Signal Process. 2022, 196, 108527. [Google Scholar] [CrossRef]
- Kouhi, A.; Sedaaghi, M.H. Reversible data hiding based on high fidelity prediction scheme for reducing the number of invalid modifications. Inf. Sci. 2022, 589, 46–61. [Google Scholar] [CrossRef]
- Dragoi, I.C.; Coltuc, D. On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction. IEEE Trans. Inf. Forensics Secur. 2021, 16, 187–189. [Google Scholar] [CrossRef]
- Wang, Y.; He, W. High Capacity Reversible Data Hiding in Encrypted Image Based on Adaptive MSB Prediction. IEEE Trans. Multimed. 2022, 24, 1288–1298. [Google Scholar] [CrossRef]
- Gao, K.; Horng, J.H.; Chang, C.C. High-capacity reversible data hiding in encrypted images based on adaptive block encoding. J. Vis. Commun. Image Represent. 2022, 84, 103481. [Google Scholar] [CrossRef]
- Sui, L.; Li, H.; Liu, J.; Xiao, Z.; Tian, A. Reversible Data Hiding in Encrypted Images Based on Hybrid Prediction and Huffman Coding. Symmetry 2023, 15, 1222. [Google Scholar] [CrossRef]
- Qian, Z.; Xu, H.; Luo, X.; Zhang, X. New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams. IEEE Trans. Circuits Syst. Video Technol. 2019, 29, 351–362. [Google Scholar] [CrossRef]
- Ge, B.; Ge, G.; Xia, C.; Duan, X. High-Capacity Reversible Data Hiding in Encrypted Images Based on 2D-HS Chaotic System and Full Bit-Plane Searching. Symmetry 2023, 15, 1423. [Google Scholar] [CrossRef]
- Wu, H.T.; Cheung, Y.M.; Yang, Z.; Tang, S. A high-capacity reversible data hiding method for homomorphic encrypted images. J. Vis. Commun. Image Represent. 2019, 62, 87–96. [Google Scholar] [CrossRef]
- Zheng, S.; Wang, Y.; Hu, D. Lossless Data Hiding Based on Homomorphic Cryptosystem. IEEE Trans. Dependable Secur. Comput. 2021, 18, 692–705. [Google Scholar] [CrossRef]
- Ke, Y.; Zhang, M.Q.; Liu, J.; Su, T.T.; Yang, X.Y. Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain. IEEE Trans. Circuits Syst. Video Technol. 2020, 30, 2353–2365. [Google Scholar] [CrossRef]
- Chen, B.; Lu, W.; Huang, J.; Weng, J.; Zhou, Y. Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders. IEEE Trans. Dependable Secur. Comput. 2022, 19, 978–991. [Google Scholar] [CrossRef]
- Hua, Z.; Wang, Y.; Yi, S.; Zhou, Y.; Jia, X. Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing. IEEE Trans. Circuits Syst. Video Technol. 2022, 32, 4968–4982. [Google Scholar] [CrossRef]
- Shamir, A. How to Share a Secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
- The Bossbase 1.01 Image Database, 2023. Available online: http://dde.binghamton.edu/download/ (accessed on 20 November 2023).
Schemes | Overexposed Images | Encryption Strategies | ||||
---|---|---|---|---|---|---|
(3,4) | (3,5) | (4,5) | (3,6) | (4,6) | ||
Hua et al. [26] | 1851.pgm | 13.53 | 15.28 | 11.82 | 17.06 | 12.39 |
1933.pgm | 12.61 | 14.23 | 10.38 | 16.01 | 12.16 | |
2025.pgm | 15.09 | 16.07 | 12.17 | 18.58 | 14.05 | |
7343.pgm | 9.95 | 11.48 | 8.75 | 12.77 | 9.58 | |
Proposed | 1851.pgm | 6.28 | 7.76 | 7.65 | 8.89 | 9.24 |
1933.pgm | 7.15 | 8.21 | 7.70 | 9.17 | 9.89 | |
2025.pgm | 6.33 | 9.31 | 8.07 | 9.22 | 9.83 | |
7343.pgm | 6.51 | 7.47 | 8.05 | 9.44 | 9.53 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chen, B.; Yang, R.; Fang, W.; Zhan, X.; Cai, J. On the Design of Multi-Party Reversible Data Hiding over Ciphered Overexposed Images. Symmetry 2024, 16, 45. https://doi.org/10.3390/sym16010045
Chen B, Yang R, Fang W, Zhan X, Cai J. On the Design of Multi-Party Reversible Data Hiding over Ciphered Overexposed Images. Symmetry. 2024; 16(1):45. https://doi.org/10.3390/sym16010045
Chicago/Turabian StyleChen, Bing, Ranran Yang, Wanhan Fang, Xiuye Zhan, and Jun Cai. 2024. "On the Design of Multi-Party Reversible Data Hiding over Ciphered Overexposed Images" Symmetry 16, no. 1: 45. https://doi.org/10.3390/sym16010045
APA StyleChen, B., Yang, R., Fang, W., Zhan, X., & Cai, J. (2024). On the Design of Multi-Party Reversible Data Hiding over Ciphered Overexposed Images. Symmetry, 16(1), 45. https://doi.org/10.3390/sym16010045