Multimedia Tools and Applications

, Volume 76, Issue 5, pp 6127–6142 | Cite as

Reversible data hiding in encrypted image with separable data extraction from image decryption

  • Xiaofeng Wang
  • Xiao Han
  • Jianghuan Xi
  • Shangping Wang
Article
  • 7k Downloads

Abstract

We propose a method of reversible data hiding in encrypted image. Proposed method achieves reserving room before encryption, and separates data extraction from image decryption. Our method is an improvement of Ma’s method [IEEE Trans Inf Forensic Secur 8(3):554–558, 2013]. Our improvements mainly focus on two aspects. (1) We improved the interpolation error estimate method via using Bicubic interpolation instead of pixel estimation that calculates the weighted sum of four surrounding pixels. Thus more sharp interpolation error histogram is obtained to increase the hidden information capacity. (2) We use partitioned local histogram shift instead of traditional histogram shift to reduce the amount of shifted pixels. This directly results in a higher quality of stego image in the same embedding capacity. The experimental results indicate that the improved method offers better performance. It is superior to Ma’s work in both embedding rate and the PSNR values of stego images.

Keywords

Image encryption Reversible data hiding Reserve room before encryption Bicubic interpolation Histogram shifting 

References

  1. 1.
    Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156MathSciNetCrossRefGoogle Scholar
  2. 2.
    Cancellaro M, Battisti F, Carli M, Boato G, Natale FGB, Neri A (2011) A commutative digital image watermarking and encryption method in the tree structured haar transform domain. Signal Process Image Commun 26(1):1–12CrossRefMATHGoogle Scholar
  3. 3.
    Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-lsb data embedding. IEEE Trans Image Process 14(2):253–266CrossRefGoogle Scholar
  4. 4.
    Chang C-C, Lin C-C, Chen Y-H (2008) Reversible data-embedding scheme using differences between original and predicted pixel values. IET Inf Secur 2(2):35–46CrossRefGoogle Scholar
  5. 5.
    Feng J, Lin I, Tsai C, Chu Y (2006) Reversible watermarking: current status and key issues. Int J Netw Secur 12(3):161–171Google Scholar
  6. 6.
    Fridrich J, Goljan M (2002) Lossless data embedding for all image formats. In: Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol 4675, pp 572–583Google Scholar
  7. 7.
    Fridrich J, Goljan M, Du R (2001) Invertible authentication watermark for JPEG image. In: Proceedings of Information Technology: Coding and Computing, pp 223–227Google Scholar
  8. 8.
    Hong W (2011) Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism. J Vis Commun Image Represent 22:131–140CrossRefGoogle Scholar
  9. 9.
    Hong W, Chen T, Wu H (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process lett 19(4):199–202CrossRefGoogle Scholar
  10. 10.
    Hu Y, Lee HK, Li J (2009) DE-based reversible data hiding with improved overflow location map. IEEE Trans Circuits Syst Video Technol 19(2):250–260CrossRefGoogle Scholar
  11. 11.
    Kamstra L, Heijmans H (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082–2090MathSciNetCrossRefGoogle Scholar
  12. 12.
    Kim KS, Lee MJ, Lee HY, Lee HK (2009) Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recogn 42:3083–3096CrossRefMATHGoogle Scholar
  13. 13.
    Kim HJ, Sachnev V, Shi YQ, Nam J, Choo HG (2008) A novel difference expansion transform for reversible data embedding. IEEE Trans Inf Forensics Secur 3(3):456–465CrossRefGoogle Scholar
  14. 14.
    Kuribayashi M, Tanaka H (2005) Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans Image Process 14:2129–2139CrossRefGoogle Scholar
  15. 15.
    Lee CF, Huang YL (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl 39:6712–6719CrossRefGoogle Scholar
  16. 16.
    Li X, Orchard MT (2001) Edge-directed prediction for lossless compression of natural images. IEEE Trans Image Process 10(6):813–817CrossRefMATHGoogle Scholar
  17. 17.
    Li XL, Yang B, Zeng TY (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20(12):3524–3533MathSciNetCrossRefGoogle Scholar
  18. 18.
    Luo LX, Chen ZY, Chen M, Luo L et al (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187–193CrossRefGoogle Scholar
  19. 19.
    Ma K, Zhang W (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8(3):554–558CrossRefGoogle Scholar
  20. 20.
    Memon N, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Trans Image Process 10(4):643–649CrossRefMATHGoogle Scholar
  21. 21.
    Ni Z, Shi Y, Ansari N, Wei S (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362CrossRefGoogle Scholar
  22. 22.
    Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst Video Technol 19(7):989–999CrossRefGoogle Scholar
  23. 23.
    Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730MathSciNetCrossRefGoogle Scholar
  24. 24.
    Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896CrossRefGoogle Scholar
  25. 25.
    Tsai P, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89:1129–1143CrossRefMATHGoogle Scholar
  26. 26.
    Zeng W (1998) Digital watermarking and data hiding: technologies and applications. In: Proc. Int. Conf. Inf. Syst, Anal. Synth. 3: 223–229Google Scholar
  27. 27.
    Zhang X (2011) Reversible data hiding in encypted image. IEEE Signal Process lett 18(4):255–257CrossRefGoogle Scholar
  28. 28.
    Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):826–832CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Xiaofeng Wang
    • 1
  • Xiao Han
    • 2
  • Jianghuan Xi
    • 2
  • Shangping Wang
    • 1
  1. 1.School of Science and Shaanxi Key Laboratory for Network Computing and Security TechnologyXi’an University of TechnologyXi’anChina
  2. 2.School of ScienceXi’an University of TechnologyXi’anChina

Personalised recommendations