Skip to main content
Log in

Reversible data hiding in encrypted JPEG image with changing the number of AC codes

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A reversible data hiding (RDH) in encrypted JPEG images (JPEG-RDH-EI) with an adaptive encryption key generated by minimum coded units histogram (MCUH) is proposed. However, the marked encrypted images are vulnerable to chosen-plaintext attack (CPA) since the MCUH is unchanged during the encryption and RDH process, which allows the encryption key can be reproduced by the marked encrypted image. To improve the security of marked encrypted images, this paper changes the MCUH in the RDH process by 0-1 conversion (refers to changing the value of coefficients from 0 to 1). To reduce the file growth, this paper explores the condition that the 0-1 conversion without file growth first. Then, a histogram shift scheme with embeddable zero coefficients is designed. The experimental results show that the proposed scheme can enhance the security of marked encrypted images by changing MCUH. In addition, the proposed algorithm has a smaller file growth and higher maximum embedding capacity than the existing histogram shift schemes since it embeds additional data in zero coefficients.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data Availability

The data generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

References

  1. Chang J-C, Hsin-Lung, Yi-Zhi (2017) A separable reversible data hiding scheme for encrypted jpeg bitstreams. Signal Process 133(2017):135–143

    Article  Google Scholar 

  2. Conzalo A, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos Appl Sci Eng 16(8):2129–2151. https://doi.org/10.1142/S0218127406015970

    Article  MathSciNet  MATH  Google Scholar 

  3. Du Y, Yin Z, Zhang X (2020) High capacity lossless data hiding in jpeg bitstream based on general vlc mapping. IEEE Transactions on Dependable and Secure Computing, pp 1–1. https://doi.org/10.1109/TDSC.2020.3013326

  4. He J, Chen J, Luo W, Tang S, Huang J (2019) A novel high-capacity reversible data hiding scheme for encrypted jpeg bitstreams. IEEE Trans Circuits Syst Video Technol 29(12):3501–3515. https://doi.org/10.1109/TCSVT.2018.2882850

    Article  Google Scholar 

  5. He J, Chen J, Tang S (2020) Reversible data hiding in jpeg images based on negative influence models. IEEE Trans Inf Forensics Secur 15:2121–2133. https://doi.org/10.1109/TIFS.2019.2958758

    Article  Google Scholar 

  6. He J, Huang S, Tang S, Huang J (2018) Jpeg image encryption with improved format compatibility and file size preservation. IEEE Trans Multimedia 20 (10):2645–2658. https://doi.org/10.1109/TMM.2018.2817065

    Article  Google Scholar 

  7. He J, Pan X, Wu H-t, Tang S (2020) Improved block ordering and frequency selection for reversible data hiding in jpeg images. Sig Process 175:1–9. https://doi.org/10.1016/j.sigpro.2020.107647

    Article  Google Scholar 

  8. Hou D, Wang H, Zhang W, Yu N (2018) Reversible data hiding in jpeg image based on dct frequency and block selection. Signal Process 148:41–47. https://doi.org/10.1016/j.sigpro.2018.02.002

    Article  Google Scholar 

  9. Independent JPEG Group. http://www.ijg.org/

  10. Jessica F, Miroslav G, Qing C, Vivek P (2004) Lossless data embedding with file size preservation. Proceeding Proceedings of the SPIE 5306:354–365

    Article  Google Scholar 

  11. Kerckhoffs A (1883) La cryptographie militaire. Journal des Sciences Militaires 9:5–38

    Google Scholar 

  12. Li P, Lo K-T (2018) A content-adaptive joint image compression and encryption scheme. IEEE Trans Multimedia 20(8):1960–1972. https://doi.org/10.1109/TMM.2017.2786860

    Article  Google Scholar 

  13. Lian S (2009) Multimedia Content Encryption: Techniques and Applications. Auerbach Publications, Boca Raton

    MATH  Google Scholar 

  14. Muchinguri T (1992) International telecommunication union-recommendation itu-t 81. In: Digital Compression and Coding of Continuous-tone Still Images

  15. Ong SY, Wong KS, Qi XJ, Tanaka KS (2015) Beyond format-compliant encryption for jpeg image. Signal Processing-Image Communication 31:47–60. https://doi.org/10.1016/j.image.2014.11.008

    Article  Google Scholar 

  16. Ong S, Wong K, Tanaka K (2015) Scramblingcembedding for jpeg compressed image. Signal Process 109:38–53. https://doi.org/10.1016/j.sigpro.2014.10.028

    Article  Google Scholar 

  17. Qian Z, Xu H, Luo X, Zhang X (2019) New framework of reversible data hiding in encrypted jpeg bitstreams. IEEE Trans Circuits Syst Video Technol 29(2):351–362. https://doi.org/10.1109/TCSVT.2018.2797897

    Article  Google Scholar 

  18. Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted jpeg bitstream. IEEE Trans Multimedia 16 (5):1486–1491. https://doi.org/10.1109/TMM.2014.2316154

    Article  Google Scholar 

  19. Qian Z, Zhou H, Zhang X, Zhang W (2018) Separable reversible data hiding in encrypted jpeg bitstreams. IEEE Trans Dependable Secure Comput 15 (6):1055–1067. https://doi.org/10.1109/TDSC.2016.2634161

    Article  Google Scholar 

  20. Qin C, Hu J, Li F, Qian Z, Zhang X (2022) Jpeg image encryption with adaptive dc coefficient prediction and rs pair permutation. IEEE transaction on multimedia. https://doi.org/10.1109/TMM.2022.3148591

  21. Qiu Y, Qian Z, He H, Tian H, Zhang X (2021) Optimized lossless data hiding in jpeg bitstream and relay transfer-based extension. IEEE Trans Circuits Syst Video Technol 31(4):1380–1394. https://doi.org/10.1109/TCSVT.2020.3006494

    Article  Google Scholar 

  22. Shi Y-Q, Li X, Zhang X, Wu H-T, Ma B (2016) Reversible data hiding: advances in the past two decades. IEEE Access 4:3210–3237. https://doi.org/10.1109/ACCESS.2016.2573308

    Article  Google Scholar 

  23. Wang Y, He H, Chen F, shanjun Z (2020) Reversible data hiding in jpeg images based on distortion-extension cost. Journal of Computer Research and Developement 57(11):2271–2282

    Google Scholar 

  24. Wang K, Lu ZM, Hu YJ (2013) A high capacity lossless data hiding scheme for jpeg images. J Syst Softw 86(7):1965–1975

    Article  Google Scholar 

  25. Wedaj FT, Kim S, Kim HJ, Huang F (2017) Improved reversible data hiding in jpeg images based on new coefficient selection strategy. EURASIP Journal on Image and Video Processing 2017(63):1–11. https://doi.org/10.1186/s13640-017-0206-1

    Google Scholar 

  26. Xiao M, Li X, Ma B, Zhang X, Zhao Y (2021) Efficient reversible data hiding for jpeg images with multiple histograms modification. IEEE Trans Circuits Syst Video Technol 31(7):2535–2546. https://doi.org/10.1109/TCSVT.2020.3027391

    Article  Google Scholar 

  27. Xiaochao, Huang, Fangjun, Jiwu, Kim, Joong H (2016) Reversible data hiding in jpeg images. IEEE Trans Circuits Syst Video Technol 26(9):1610–1621

    Article  Google Scholar 

  28. Yuan Y, He H, Chen F (2022) On the security of encrypted jpeg image with adaptive key generated by invariant characteristic. In: International workshop on digital watermarking, vol 13180, pp 58–71. Springer

  29. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258. https://doi.org/10.1109/LSP.2011.2114651

    Article  MathSciNet  Google Scholar 

  30. Zheng M, Li Z, Chen T, Dong M, He H, Chen F (2018) Larger-capacity reversible data hiding in encrypted jpeg bitstream. Journal of Cyber Security 3(6):12

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China (NSFC) under Grant U1936113 and 61872303. In addition, many thanks to the editors and anonymous reviewers for their insightful comments and valuable suggestions, which helped a lot to improve the paper quality.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fan Chen.

Ethics declarations

Competing interests

All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yuan, Y., Hongjie, H., Chen, F. et al. Reversible data hiding in encrypted JPEG image with changing the number of AC codes. Multimed Tools Appl 82, 43649–43669 (2023). https://doi.org/10.1007/s11042-023-14614-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14614-8

Keywords

Navigation