Reversible Data Hiding in Encrypted AMBTC Compressed Images

  • Xuejing Niu
  • Zhaoxia Yin
  • Xinpeng Zhang
  • Jin Tang
  • Bin Luo
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10082)

Abstract

Signal processing in encrypted domain has attracted high attention during the needs of content security and privacy protection. Reversible data hiding in encrypted images (RDH-EI) also becomes a hot topic. However, most of the published techniques are designed for uncompressed images rather than JPEG-, VQ- and BTC-compressed images. In this paper, for the first time, a RDH-EI method for AMBTC images is proposed. In this method, the higher mean and lower mean of a triple in AMBTC compressed image is encrypted by using stream cipher with the same random bits. Therefore, the spatial correlation of a nature image is preserved and redundant space can be exploited by using the histogram of prediction error. Experimental results demonstrate that the proposed method can embed considerable bits while leave little distortion.

Keywords

Signal processing in encrypted domain Privacy protection Block Truncation Coding Reversible Data Hiding in Encrypted Images 

References

  1. 1.
    Hong, W., Chen, T.S.: A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Inf. Forensics Secur. 7(1), 176–184 (2012)CrossRefGoogle Scholar
  2. 2.
    Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006)CrossRefGoogle Scholar
  3. 3.
    Hu, Y., Lee, H.K., Li, J.: DE-based reversible data hiding with improved overflow location map. IEEE Trans. Circ. Syst. Video Technol. 19(2), 250–260 (2009)CrossRefGoogle Scholar
  4. 4.
    Kim, H.J., Sachnev, V., Shi, Y.Q., Nam, J., Choo, H.G.: A novel difference expansion transform for reversible data embedding. IEEE Trans. Inf. Forensics Secur. 3(3), 456–465 (2008)CrossRefGoogle Scholar
  5. 5.
    Gao, X., An, L., Yuan, Y., Tao, D., Li, X.: Lossless data embedding using generalized statistical quantity histogram. IEEE Trans. Circ. Syst. Video Technol. 21(8), 1061–1070 (2011)CrossRefGoogle Scholar
  6. 6.
    Erkin, Z., Piva, A., Katzenbeisser, S., Lagendijk, R.L., Shokrollahi, J., Neven, G., Barni, M.: Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP J. Inf. Secur. 2007, 1–20 (2007)CrossRefGoogle Scholar
  7. 7.
    Puech, W., Chaumont, M., Strauss, O.: A reversible data hiding method for encrypted images. In: Proceedings of SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819. San Jose, CA, USA (2008)Google Scholar
  8. 8.
    Zhang, X.: Reversible data hiding in encrypted image. IEEE Sig. Process. Lett 18(4), 255–258 (2011)CrossRefGoogle Scholar
  9. 9.
    Hong, W., Chen, T.-S., Chen, J., Kao, Y.-H., Wu, H.-Y., Wu, M.-C.: Reversible data embedment for encrypted cartoon images using unbalanced bit flipping. In: Tan, Y., Shi, Y., Mo, H. (eds.) ICSI 2013. LNCS, vol. 7929, pp. 208–214. Springer, Heidelberg (2013). doi:10.1007/978-3-642-38715-9_25 CrossRefGoogle Scholar
  10. 10.
    Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Sig. Process. Lett. 19(4), 199–202 (2012)CrossRefGoogle Scholar
  11. 11.
    Liao, X., Shu, C.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Represent. 28, 21–27 (2015)CrossRefGoogle Scholar
  12. 12.
    Qin, C., Zhang, X.: Effective reversible data hiding in encrypted image with privacy protection for image content. J. Vis. Commun. Image Represent. 31, 154–164 (2015)CrossRefGoogle Scholar
  13. 13.
    Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Sig. Process. 94, 118–127 (2013)CrossRefGoogle Scholar
  14. 14.
    Qian, Z., Zhang, X., Wang, S.: Reversible data hiding in encrypted JPEG bitstream. IEEE Trans. Multimedia 16(5), 1486–1491 (2014)CrossRefGoogle Scholar
  15. 15.
    Lema, M.D., Mitchell, O.R.: Absolute moment block truncation coding and its application to color image. IEEE Trans. Commun. 32(10), 1148–1157 (1984)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Xuejing Niu
    • 1
  • Zhaoxia Yin
    • 2
    • 1
  • Xinpeng Zhang
    • 2
  • Jin Tang
    • 1
  • Bin Luo
    • 1
  1. 1.Key Laboratory of Intelligent Computing and Signal Processing, Ministry of EducationAnhui UniversityHefeiPeople’s Republic of China
  2. 2.School of Communication and Information EngineeringShanghai UniversityShanghaiPeople’s Republic of China

Personalised recommendations