Advertisement

Multimedia Tools and Applications

, Volume 77, Issue 23, pp 30749–30768 | Cite as

Separable reversible data hiding in encrypted images with improved security and capacity

  • Qi Li
  • Bin Yan
  • Hui Li
  • Na Chen
Article
  • 303 Downloads

Abstract

Reversible data hiding (RDH) has to be conducted in the encrypted images when original images are encrypted for privacy protection in some open environments, including the cloud computing. However, the current RDH algorithms in encrypted images with error-free decryption may lead to leakage of image content and low embedding rate. In this paper, a novel RDH algorithm for image in encryption domain is proposed. To improve security, we propose a combined block permutation and a stream cipher into the encryption step, which considers data hiding in later steps. We further increase the embedding rate by proposing bit replacement in prediction error. This scheme has the advantages of built-in embedding flag, error-free decryption and high embedding rate. It can be applied to a wide variety of scenarios: If the recipient has only the data-hiding key, he can extract the hidden data but cannot restore the image; If the recipient has only the image encryption key, he can read the distorted image but cannot extract the hidden data; If the recipient has both keys, he can extract the hidden data and restore the original image completely.

Keywords

Personal privacy Image encryption Reversible data hiding Stream encryption Block permutation 

Notes

Acknowledgments

This work is supported by the National Natural Science Foundation of China (NSFC) (No. 61272432) and Shandong Provincial Natural Science Foundation (No. ZR2014JL044).

References

  1. 1.
    Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253–266CrossRefGoogle Scholar
  2. 2.
    Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process 19(4):199–202CrossRefGoogle Scholar
  3. 3.
    Huang F, Huang J, Shi YQ (2016) New framework for Reversible data hiding in encrypted domain. IEEE Trans Inf Forensics Secur 11(12):2777–2789CrossRefGoogle Scholar
  4. 4.
    Li M, Li Y (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190–196CrossRefGoogle Scholar
  5. 5.
    Liu Y, Nie LQ, Han L, Zhang LM, Rosenblum DS (2015) Action2activity: recognizing complex activities from sensor data. In: International conference on artificial intelligence, pp 1617–1623Google Scholar
  6. 6.
    Liu Y, Nie LQ, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108–115CrossRefGoogle Scholar
  7. 7.
    Liu Y, Zhang LM, Nie LQ, Yan Y, Rosenblum DS (2016) Fortune teller: predicting your career path. In: Proceedings of the Thirtieth AAAI conference on artificial intelligence, pp 201–207Google Scholar
  8. 8.
    Liu Y, Zheng Y, Liang YX, Liu SM, Rosenblum DS (2016) Urban water quality prediction based on multi-task multi-view learning. In: Proceedings of the Twenty-Fifth international joint conference on artificial intelligence, pp 2576–2582Google Scholar
  9. 9.
    Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5 (3):187–191CrossRefGoogle Scholar
  10. 10.
    Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8(3):553–562CrossRefGoogle Scholar
  11. 11.
    Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362CrossRefGoogle Scholar
  12. 12.
    Preotiuc-Pietro D, Liu Y, Hopkins DJ, Ungar L (2017) Beyond binary labels: political ideology prediction of twitter users. In: Meeting of the association for computational linguistics, pp 729–740Google Scholar
  13. 13.
    Qian Z, Zhang XP (2016) Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans Circuits Syst Video Technol 26(4):636–646CrossRefGoogle Scholar
  14. 14.
    Qin C, Chang CC, Hsu TJ (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimedia Tools and Applications 74(15):5861–5872CrossRefGoogle Scholar
  15. 15.
    Qin C, Zhang XP (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164CrossRefGoogle Scholar
  16. 16.
    Tian J (2003) Reversible data embedding using a difference expansion. IEEE Transactions on Cricuits and Systems for Video Technology 13(8):890–896CrossRefGoogle Scholar
  17. 17.
    Xiao D, Xiang YP, Zheng HY, Wang Y (2017) Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism. J Vis Commun Image R 45:1–10CrossRefGoogle Scholar
  18. 18.
    Xu DW, Wang RD (2016) Separable and error-free reversible data hiding in encrypted images. Signal Process 123:9–21CrossRefGoogle Scholar
  19. 19.
    Zhang XP (2011) Reversible data hiding in encrypted image. IEEE Signal Process 18(4):255–258CrossRefGoogle Scholar
  20. 20.
    Zhang XP (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):826–832CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.College of Electronics, Communication and PhysicsShandong University of Science and TechnologyQingdaoPeople’s Republic of China

Personalised recommendations