Reversible data hiding scheme in multiple encrypted images based on code division multiplexing
- 47 Downloads
Recently, a reversible data hiding (RDH) scheme based on code division multiplexing (CDM) has been reported, in which secret information and pseudo bits are transformed into spreading sequences. Most sequences may be mutually offset when they are repeatedly embedded, which leads to image quality and embedding capacity improvement. Despite of these advantages, the pseudo bits may cause the image distortion, especially in the low embedding rates. Moreover, it is hard to protect image content when the image is uploaded to cloud server. In order to solve these problems, we propose an RDH scheme based on CDM in multiple encrypted images (RDHMEI) with public key cryptography. The proposed method first encrypted the image using the Paillier homomorphic encryption. Afterwards, the encrypted pixels that have a same coordinate in the multiple images are selected as the elements of the embedding vector. Instead of traditional dual-images based RDH, the proposed method can embed additional bits into the embedding vector while the pixel correlation disappears after encrypting. Experimental results demonstrate the effectiveness and advantages of the proposed method.
KeywordsReversible data hiding (RDH) Code division multiplexing (CDM) Encrypted image in cloud
This work is supported by the National Natural Science Foundation of China under grant 61502242, U1536206, U1405254, 61772283, 61602253, 61672294; by the National Key R&D Program of China under grant 2018YFB1003205; by the Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20150925 and BK20151530; by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund; by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) fund, China.
- 1.Chang CC, Kieu TD, Chou YC (2007) Reversible data hiding scheme using two steganographic images. In: IEEE Region 10 Conference, TENCON 2007, pp 1–4Google Scholar
- 3.Chen XY, Sun XM, Sun HY, Zhou ZL, Zhang JJ (2013) Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. J Syst Softw 86(10):2620–2626Google Scholar
- 7.Fujiyoshi M, Sato S, Jin HL, Kiya H (2007) A location-map free reversible data hiding method using block-based single parameter. In: IEEE International Conference on Image Processing, ICIP 2007, 3: pp III–257Google Scholar
- 13.Liu YL, Qu XX, Xin GJ (2016) A ROI-based reversible data hiding scheme in encrypted medical images. J Vis Commun Image Represent 39(5):51–57Google Scholar
- 18.Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp 223–238Google Scholar
- 20.Ren Y, Shen J, Liu D, Wang J, Kim J (2016) Evidential quality preserving of electronic record in cloud storage. J Internet Technol 17(6):1125–1132Google Scholar
- 21.Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst Video Technol 19(7):989–999Google Scholar
- 28.Xuan G, Tong X, Teng J, Zhang X, Shi YQ (2013) Optimal histogram pair and prediction-error based image reversible data hiding. In: The International Workshop on Digital Forensics and Watermarking. Springer, Berlin, Heidelberg, pp 368–383Google Scholar
- 31.Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):526–532Google Scholar