Skip to main content
Log in

Reversible data hiding in encrypted AMBTC images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Signal processing in the encrypted domain has attracted a lot of attention due to the requirement for content security and privacy protection. Reversible data hiding in encrypted images (RDH-EI) is also a hot topic. However, the majority of the published techniques are designed for uncompressed images rather than JPEG-, VQ- and BTC-compressed images. In this paper, for the first time, a RDH-EI method for AMBTC images is proposed. In the proposed method, the higher mean and lower mean of a triple in an AMBTC-compressed image are encrypted by using stream cipher at first. Then, additional data can be embedded into the redundant space by using prediction error histogram modification technique. Experimental results and analysis demonstrate that, with the marked cipher-image, legal receivers are able to extract embedded data exactly by using a data hiding key, decrypt it to recover an image very similar to the original one by using an image encryption key, or extract additional data and recover the original image error free with both keys. The proposed method is applicable to real-time transmission due to the simple implementation of the algorithm and low computational complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Cao X, Du L, Wei X, Meng D, Guo X (2015) High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans on Cybernetics. doi:10.1109/TCYB.2015.2423678

  2. Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward Efficient multi-keyword fuzzy Search over encrypted Outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur 11(12):2706–2716

    Article  Google Scholar 

  3. Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized Search over encrypted Outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546–2559

    Article  Google Scholar 

  4. Fu Z, Huang F, Sun X, Vasilakos AV, Yang CN Enabling semantic Search based on conceptual graphs over encrypted Outsourced data. IEEE Trans Serv Comput. doi:10.1109/TSC.2016.2622697

  5. Fu Z, Sun X, Ji S, Xie G (2016) Towards Efficient content-aware Search over encrypted Outsourced data in cloud. Proceedings of the 35th Annual IEEE International Conference on Computer Communications (IEEE INFOCOM). doi:10.1109/INFOCOM.2016.7524606

  6. Hong W, Chen TS (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Trans Inf Forensics Secur 7(1):176–184

    Article  Google Scholar 

  7. Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19(4):199–202

    Article  Google Scholar 

  8. Huang F, Huang J, Shi YQ (2016) New framework for reversible data hiding in encrypted domain. IEEE Trans Inf Forensics Secur 11(12):2777–2789

    Article  Google Scholar 

  9. Lema MD, Mitchell OR (1984) Absolute moment block Truncation coding and its application to color image. IEEE Trans Commun 32(10):1148–1157

    Article  Google Scholar 

  10. Li J, Li X, Yang B, Sun X (2015) Segmentation-based image Copy-move forgery detection Scheme. IEEE Trans Inf Forensics Secur 10(3):507–518

    Article  Google Scholar 

  11. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362

    Article  Google Scholar 

  12. Ou B, Li X, Zhang W (2015) PVO-based reversible data hiding for encrypted images. IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP). 831–835

  13. Puech W, Chaumont M, Strauss O (2008) A reversible data hiding method for encrypted images. Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Proc. SPIE. 6819

  14. Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted JPEG Bitstream. IEEE Trans Multimedia 16(5):1486–1491

    Article  Google Scholar 

  15. Qian Z, Zhang X, Ren Y, Feng J (2016) Block cipher based Separable reversible data hiding in encrypted images. Multimedia Tools and Applications 75(21):13749–13763

    Article  Google Scholar 

  16. Qian Z, Zhou H, Zhang X, Zhang W (2016) Separable reversible data hiding in encrypted JPEG bitstreams. IEEE Transactions on Dependable and Secure Computing

  17. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164

    Article  Google Scholar 

  18. Qin C, Chang CC, Lin CC (2015) An adaptive reversible Steganographic Scheme based on the just noticeable distortion. Multimedia Tools and Applications. 74(6):1983–1995

    Article  Google Scholar 

  19. Qin C, Chang CC, Hsu TJ (2015) Reversible data hiding Scheme based on exploiting modification direction with two Steganographic images. Multimedia Tools and Applications. 74(15):5861–5872

    Article  Google Scholar 

  20. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896

    Article  Google Scholar 

  21. Wang Z, Zhang X, Yin Z (2016) Hybrid distortion function for JPEG steganography. J Electron Imaging 25(5):050501

    Article  Google Scholar 

  22. Wang J, Li T, Shi YQ, Lian S, Ye J Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimedia Tools and Applications. doi:10.1007/s11042-016-4153-0

  23. Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Security and Communication Networks 7(8):1283–1291

    Article  Google Scholar 

  24. Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and Copy-deterrence content-based image retrieval Scheme in cloud Computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608

    Article  Google Scholar 

  25. Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools and Applications. 75(4):1947–1962

    Article  Google Scholar 

  26. Xu D, Wang R Separable and error-free reversible data hiding in encrypted images. Signal Process. doi:10.1016/j.sigpro.2015.12.012

  27. Yin Z, Abel A, Zhang X, Luo B (2016) Reversible Data Hiding in Encrypted Image Based on Block Histogram Shifting. In 2016 I.E. International Conference on Acoustics, Speech and Signal Processing (ICASSP). 2129–2133

  28. Zhang X (2010) Efficient data hiding with plus-minus one or two. IEEE Signal Process Lett 17(7):635–638

    Article  Google Scholar 

  29. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lette 18(4):255–258

    Article  Google Scholar 

  30. Zhang X (2013) Commutative reversible data hiding and encryption. Security and Communication Networks. 6:1396–1403

    Article  Google Scholar 

  31. Zhang W, Ma K, Yu N (2013) Reversibility improved data hiding in encrypted images. Signal Process 94:118–127

    Article  Google Scholar 

  32. Zhang X, Long J, Wang Z, Cheng H Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Trans Circuits Syst Video Technol. doi:10.1109/TCSVT. 2015.2433194

  33. Zhou Z, Wang Y, Wu QMJ, Yang CN, Sun X (2017) Effective and Efficient global context verification for image Copy detection. IEEE Trans Inf Forensics Secur 12(1):48–63

    Article  Google Scholar 

Download references

Acknowledgements

This research work is partly supported by the National Natural Science Foundation of China (61502009, 61525203, 61472235, U1636206), China Postdoctoral Science Foundation (2016 M591650), “Shu Guang” project supported by Shanghai Municipal Education Commission and Shanghai Education Development Foundation, Anhui Provincial Natural Science Foundation (1508085SQF216), Key Program for Excellent Young Talents in Colleges and Universities of Anhui Province (gxyqZD2016011) and Undergraduates Training Foundation of Anhui University (J10118511269).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bin Luo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yin, Z., Niu, X., Zhang, X. et al. Reversible data hiding in encrypted AMBTC images. Multimed Tools Appl 77, 18067–18083 (2018). https://doi.org/10.1007/s11042-017-4957-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4957-6

Keywords

Navigation