Abstract
Signal processing in the encrypted domain has attracted a lot of attention due to the requirement for content security and privacy protection. Reversible data hiding in encrypted images (RDH-EI) is also a hot topic. However, the majority of the published techniques are designed for uncompressed images rather than JPEG-, VQ- and BTC-compressed images. In this paper, for the first time, a RDH-EI method for AMBTC images is proposed. In the proposed method, the higher mean and lower mean of a triple in an AMBTC-compressed image are encrypted by using stream cipher at first. Then, additional data can be embedded into the redundant space by using prediction error histogram modification technique. Experimental results and analysis demonstrate that, with the marked cipher-image, legal receivers are able to extract embedded data exactly by using a data hiding key, decrypt it to recover an image very similar to the original one by using an image encryption key, or extract additional data and recover the original image error free with both keys. The proposed method is applicable to real-time transmission due to the simple implementation of the algorithm and low computational complexity.
Similar content being viewed by others
References
Cao X, Du L, Wei X, Meng D, Guo X (2015) High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans on Cybernetics. doi:10.1109/TCYB.2015.2423678
Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward Efficient multi-keyword fuzzy Search over encrypted Outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur 11(12):2706–2716
Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized Search over encrypted Outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546–2559
Fu Z, Huang F, Sun X, Vasilakos AV, Yang CN Enabling semantic Search based on conceptual graphs over encrypted Outsourced data. IEEE Trans Serv Comput. doi:10.1109/TSC.2016.2622697
Fu Z, Sun X, Ji S, Xie G (2016) Towards Efficient content-aware Search over encrypted Outsourced data in cloud. Proceedings of the 35th Annual IEEE International Conference on Computer Communications (IEEE INFOCOM). doi:10.1109/INFOCOM.2016.7524606
Hong W, Chen TS (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Trans Inf Forensics Secur 7(1):176–184
Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19(4):199–202
Huang F, Huang J, Shi YQ (2016) New framework for reversible data hiding in encrypted domain. IEEE Trans Inf Forensics Secur 11(12):2777–2789
Lema MD, Mitchell OR (1984) Absolute moment block Truncation coding and its application to color image. IEEE Trans Commun 32(10):1148–1157
Li J, Li X, Yang B, Sun X (2015) Segmentation-based image Copy-move forgery detection Scheme. IEEE Trans Inf Forensics Secur 10(3):507–518
Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362
Ou B, Li X, Zhang W (2015) PVO-based reversible data hiding for encrypted images. IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP). 831–835
Puech W, Chaumont M, Strauss O (2008) A reversible data hiding method for encrypted images. Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Proc. SPIE. 6819
Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted JPEG Bitstream. IEEE Trans Multimedia 16(5):1486–1491
Qian Z, Zhang X, Ren Y, Feng J (2016) Block cipher based Separable reversible data hiding in encrypted images. Multimedia Tools and Applications 75(21):13749–13763
Qian Z, Zhou H, Zhang X, Zhang W (2016) Separable reversible data hiding in encrypted JPEG bitstreams. IEEE Transactions on Dependable and Secure Computing
Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164
Qin C, Chang CC, Lin CC (2015) An adaptive reversible Steganographic Scheme based on the just noticeable distortion. Multimedia Tools and Applications. 74(6):1983–1995
Qin C, Chang CC, Hsu TJ (2015) Reversible data hiding Scheme based on exploiting modification direction with two Steganographic images. Multimedia Tools and Applications. 74(15):5861–5872
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896
Wang Z, Zhang X, Yin Z (2016) Hybrid distortion function for JPEG steganography. J Electron Imaging 25(5):050501
Wang J, Li T, Shi YQ, Lian S, Ye J Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimedia Tools and Applications. doi:10.1007/s11042-016-4153-0
Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Security and Communication Networks 7(8):1283–1291
Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and Copy-deterrence content-based image retrieval Scheme in cloud Computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608
Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools and Applications. 75(4):1947–1962
Xu D, Wang R Separable and error-free reversible data hiding in encrypted images. Signal Process. doi:10.1016/j.sigpro.2015.12.012
Yin Z, Abel A, Zhang X, Luo B (2016) Reversible Data Hiding in Encrypted Image Based on Block Histogram Shifting. In 2016 I.E. International Conference on Acoustics, Speech and Signal Processing (ICASSP). 2129–2133
Zhang X (2010) Efficient data hiding with plus-minus one or two. IEEE Signal Process Lett 17(7):635–638
Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lette 18(4):255–258
Zhang X (2013) Commutative reversible data hiding and encryption. Security and Communication Networks. 6:1396–1403
Zhang W, Ma K, Yu N (2013) Reversibility improved data hiding in encrypted images. Signal Process 94:118–127
Zhang X, Long J, Wang Z, Cheng H Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Trans Circuits Syst Video Technol. doi:10.1109/TCSVT. 2015.2433194
Zhou Z, Wang Y, Wu QMJ, Yang CN, Sun X (2017) Effective and Efficient global context verification for image Copy detection. IEEE Trans Inf Forensics Secur 12(1):48–63
Acknowledgements
This research work is partly supported by the National Natural Science Foundation of China (61502009, 61525203, 61472235, U1636206), China Postdoctoral Science Foundation (2016 M591650), “Shu Guang” project supported by Shanghai Municipal Education Commission and Shanghai Education Development Foundation, Anhui Provincial Natural Science Foundation (1508085SQF216), Key Program for Excellent Young Talents in Colleges and Universities of Anhui Province (gxyqZD2016011) and Undergraduates Training Foundation of Anhui University (J10118511269).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yin, Z., Niu, X., Zhang, X. et al. Reversible data hiding in encrypted AMBTC images. Multimed Tools Appl 77, 18067–18083 (2018). https://doi.org/10.1007/s11042-017-4957-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4957-6