Skip to main content

Discrete Wavelet Transform-Based Reversible Data Hiding in Encrypted Images

  • Conference paper
  • First Online:
Proceedings of Academia-Industry Consortium for Data Science

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1411))

Abstract

In the era of multimedia technology, not only reinstatement of the original media without any loss of information is required but also the security of the content is of utmost importance. In this paper, a novel discrete wavelet transforms (DWT)-based RDH-EI scheme is proposed. The approximation band of DWT has been utilized for data embedding. Also, disarrangement of DWT sub-bands is practiced for enhancing the security. Proposed scheme is simple to implement and takes less time to execute. Standard grayscale images are tested and compared with existing techniques. The results reflect supremacy of proposed scheme in terms of correlation, PSNR, and computational efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. James B (1997, July 8) Method and apparatus for embedding authentication information within digital data, U.S. Patent 5,646,997

    Google Scholar 

  2. Chris H., Paul, J., Majid, R., and James, S., Lossless recovery of an original image containing embedded data, U.S. Patent 6,278,791 (2001, August 21)

    Google Scholar 

  3. Kai H, Deyi L (2010) Trusted cloud computing with secure resources and data coloring. IEEE Internet Comput 14(5):14–22

    Article  Google Scholar 

  4. Feng B, Robert D, Beng O, Yanjiang Y (2005) Tailored reversible watermarking schemes for authentication of electronic clinical atlas. IEEE Trans Inf Technol Biomed 9(4):554–563

    Article  Google Scholar 

  5. Gouenou C, Clare G, Jean C, Christian R (2009) Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans Inf Technol Biomed 13(2):158–165

    Article  Google Scholar 

  6. Fridrich J, Goljan M, Du R (2002) Lossless data embedding—new paradigm in digital watermarking. EURASIP J Adv Signal Process 986842

    Google Scholar 

  7. Mehmet C, Gaurav S, Tekalp A (2006) Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans Image Process 15(4):1042–1049

    Article  Google Scholar 

  8. Mehmet C, Gaurav S, Tekalp A, Eli S (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253–266

    Article  Google Scholar 

  9. Jun T (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890–896

    Article  Google Scholar 

  10. Chih L, Hsien W, Chwei T, Yen C (2008) Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recogn 41(6):2097–2106

    Article  MATH  Google Scholar 

  11. Ju H, Ke C, Morris C (2009) Block-based reversible data embedding. Signal Process 89(4):556–569

    Article  MATH  Google Scholar 

  12. Zhicheng N, Yunqing S, Nirwan A, Wei S (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16(3):354–362

    Article  Google Scholar 

  13. Gouenou C, Wei P, Nora B, Frédéric C, Christian R (2013) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inf Forensics Secur 8(1):111–120

    Article  Google Scholar 

  14. Suah K, Xiaochao Q, Vasily S, Hyoung K (2019) Skewed histogram shifting for reversible data hiding using a pair of extreme predictions. IEEE Trans Circ Syst Video Technol 29(11):3236–3246

    Article  Google Scholar 

  15. Jessica F (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge Univ. Press, Cambrid

    MATH  Google Scholar 

  16. Mehdi F (2008) Reversible image data hiding based on gradient adjusted prediction. IEICE Electron 5(20):870–876

    Article  Google Scholar 

  17. Lute K, Henk H (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082–2090

    Article  MathSciNet  Google Scholar 

  18. Kede M, Weiming Z, Xianfeng Z, Nenghai Y, Fenghua L (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8(3):553–562

    Article  Google Scholar 

  19. Weiming Z, Kede M, Nenghai Y (2014) Reversibility improved data hiding in encrypted images. Signal Process 94:118–127

    Article  Google Scholar 

  20. Smita A, Manoj K (2017) Mean value based reversible data hiding in encrypted images. Optik 130:922–934

    Article  Google Scholar 

  21. Pauline P, William P (2018) An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans Inf Forensics Secur 13(7):1670–1681

    Article  Google Scholar 

  22. Yi P, Zhaoxia Y, Zhenxing Q (2008, December 1–7) Reversible data hiding in encrypted images with two-MSB prediction. In: Proceedings of IEEE international workshop information forensics security, Hong Kong

    Google Scholar 

  23. Asad M, Hong W, Yanli C, Ahmad K (2020) A reversible data hiding in encrypted image based on prediction-error estimation and location map. Multimedia Tools Appl. 79:1–24

    Article  Google Scholar 

  24. Xinpeng Z (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258

    Article  Google Scholar 

  25. Wien H, Tung C, Han W (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19(4):199–202

    Article  Google Scholar 

  26. Xinpeng Z (2012) Separable reversible data hiding in encrypted Image. IEEE Signal Process Lett 7(2):826–832

    Google Scholar 

  27. Shuang Y, Yicong Z (2019) Separable and reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans Multimedia 21(1):51–64

    Article  Google Scholar 

  28. Youqing W, Youzhi X, Yutang G, Jutang T, Zhaoxia Y (2020) An improved reversible data hiding in encrypted images using parametric binary tree labelling. IEEE Trans Multimedia 22(8):1929–1938

    Article  Google Scholar 

  29. Haoli G, Yan C, Zhenxing Q, Jianjun W (2019) A high capacity multi-level approach for reversible data hiding in encrypted images. IEEE Trans Circ Syst Video Technol 29(8):2285–2295

    Article  Google Scholar 

  30. Delu H, Jianjun W (2020) High-capacity reversible data hiding in encrypted image based on specific encryption process. Signal Process Image Commun 80:115632

    Google Scholar 

  31. Ren H, Shaozhang N, Xinyi W (2019) Reversible data hiding in encrypted images using pob number system. IEEE Access 7:149527–149541

    Article  Google Scholar 

  32. Chen Y-C, Shiu C-W, Horng G (2014) Encrypted signal-based reversible data hiding with public key cryptosystem. J Vis Commun Image Represent 25(5):1164–1170

    Google Scholar 

  33. Chih S, Yu C, Wien H (2015) Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process Image Commun 39:226–233

    Google Scholar 

  34. Xinpeng Z, Jing L, Zichi W, Hang C (2016) Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Trans Circ Syst Video Technol 26(9):1622–1631

    Article  Google Scholar 

  35. Ming L, Yang L (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190–196

    Article  Google Scholar 

  36. Yu C, Tsung H, Sung H, Chih S (2019) A New Reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms. IEEE Trans Inf Forensics Secur 14(12):3332–3343

    Article  Google Scholar 

  37. Rafael G, Richard W (2013) Digital image processing, 3rd edn. Pearson Education, New Delhi

    Google Scholar 

  38. Wu Y (2011) NPCR and UACI randomness tests for image encryption. Cyber J J Sel Areas Telecommun

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ahmed, S., Agarwal, R., Kumar, M. (2022). Discrete Wavelet Transform-Based Reversible Data Hiding in Encrypted Images. In: Gupta, G., Wang, L., Yadav, A., Rana, P., Wang, Z. (eds) Proceedings of Academia-Industry Consortium for Data Science. Advances in Intelligent Systems and Computing, vol 1411. Springer, Singapore. https://doi.org/10.1007/978-981-16-6887-6_21

Download citation

Publish with us

Policies and ethics