Advertisement

A Reversible Data Hiding Scheme in Encrypted Image with LSB Compression and MSB Replacement

  • Wei Zhang
  • Qing Zhou
  • Zhenjun Tang
  • Heng Yao
  • Chuan QinEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 895)

Abstract

A new scheme of reversible data hiding in encrypted images is proposed in this paper. Content owner first encrypts divided blocks by the specific stream cipher and permutation. During data embedding, data hider embeds secret data into the compressed least significant bits (LSB) and the most significant bits (MSB) of a part of pixels in the smooth region. After the receiver receives the marked, encrypted image, he or she can obtain a directly decrypted image with encryption key. With data-hiding key, the receiver can extract the embedded data from the compressed LSB sequences and MSB layers. If the receiver has both encryption key and data-hiding key, he or she not only can extract the embedded data from the marked, encrypted image, but also can recover original image correctly. Experimental results show our scheme achieves better rate-distortion performance than some reported schemes.

Keywords

Image encryption Reversible data hiding Data extraction Image recovery 

Notes

Acknowledgments

This work was supported by National Natural Science Foundation of China (61702332, 61562007, 61672354), Natural Science Foundation of Guangxi (2017GXNSFAA198222), and Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security (MIMS15-03).

References

  1. 1.
    Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding — a survey. Proc. IEEE 87(7), 1062–1078 (1999)Google Scholar
  2. 2.
    Qin, C., Chang, C.C., Chiu, Y.P.: A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans. Image Process. 23(3), 969–978 (2014)Google Scholar
  3. 3.
    Qin, C., Chang, C.C., Huang, Y.H., Liao, L.T.: An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7), 1109–1118 (2013)Google Scholar
  4. 4.
    Zhang, X.P.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255–258 (2011)Google Scholar
  5. 5.
    Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)Google Scholar
  6. 6.
    Liao, X., Shu, C.W.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Represent. 28, 21–27 (2015)Google Scholar
  7. 7.
    Puteaux, P., Trinel, D., Puech, W.: High-capacity data hiding in encrypted images using MSB prediction. In: Proceedings of 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA), Oulu, Finland, pp. 1–6, December 2016Google Scholar
  8. 8.
    Zhang, X.P., Qian, Z.X., Feng, G.R., Ren, Y.L.: Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image Represent. 25(2), 322–328 (2014)Google Scholar
  9. 9.
    Qian, Z.X., Zhang, X.P.: Reversible data hiding in encrypted image by distributed encoding. IEEE Trans. Circuits Syst. Video Technol. 26(4), 636–646 (2016)Google Scholar
  10. 10.
    Zhang, X.P.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 526–532 (2012)Google Scholar
  11. 11.
    Qian, Z.X., Zhang, X.P., Feng, G.R.: Reversible data hiding in encrypted images based on progressive recovery. IEEE Signal Process. Lett. 23(11), 1672–1676 (2016)Google Scholar
  12. 12.
    Qin, C., Zhang, X.P.: Effective reversible data hiding in encrypted image with privacy protection for image content. J. Vis. Commun. Image Represent. 31, 154–164 (2015)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Wei Zhang
    • 1
    • 2
  • Qing Zhou
    • 2
  • Zhenjun Tang
    • 1
  • Heng Yao
    • 2
  • Chuan Qin
    • 1
    • 2
    Email author
  1. 1.Guangxi Key Lab of Multi-source Information Mining and SecurityGuangxi Normal UniversityGuilinChina
  2. 2.School of Optical-Electrical and Computer EngineeringUniversity of Shanghai for Science and TechnologyShanghaiChina

Personalised recommendations