Skip to main content
Log in

Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years there has been significant interest in reversible data hiding, and also in particular, reversible data hiding in encrypted images (RDH-EI). This means that additional data can be embedded into a previously encrypted image with no knowledge of the original image content. According to the held keys, legal receivers can get the embedded data or an image very similar to the original one, or, both the embedded data and an image exactly as the original one. In this paper, we propose and evaluate a RDH-EI framework. Firstly, we propose a multi-level encryption (MLE) scheme using both Josephus traversal based multi-granular encryption and a stream cipher. To reduce the quantity of side information required to embed into images together with additional data, we also present a block histogram modification (BHM) approach with self-hidden peak pixels to perform reversible data embedding and a location map marking scheme to perform histogram contraction and recovery. The experimental results demonstrate that, in comparison with other similar methods, the proposed framework achieves improvements in terms of the embedding payload, the decrypted image quality and the accuracy of image restoration.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Cao X, Du L, Wei X, Meng D, Guo X (2015) High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans On Cybernetics. doi:10.1109/TCYB.2015.2423678

    Google Scholar 

  2. Chen B, Shu H, Coatrieux G, Chen SX, Coatrieux JL (2015) Color image analysis by quaternion-type moments. Journal of Mathematical Imaging and Vision 51(1):124–144

    Article  MathSciNet  MATH  Google Scholar 

  3. Erkin Z, Piva A, Katzenbeisser S, Lagendijk RL, Shokrollahi J, Neven G, Barni M (2007) Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP J Inf Secur 2007:1–20

    Article  Google Scholar 

  4. Gao X, An L, Yuan Y, Tao D, Li X (2011) Lossless data embedding using generalized statistical quantity histogram. IEEE Transactions on Circuits and Systems for Video Technology 21(8):1061–1070

    Article  Google Scholar 

  5. Hong W, Chen TS (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Transactions on Information Forensics and Security 7(1):176–184

    Article  Google Scholar 

  6. Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Processing Letters 19(4):199–202

    Article  Google Scholar 

  7. Hong W, Chen TS, Chen J et al (2013) Reversible data embedment for encrypted cartoon images using unbalanced bit flipping. In: Advances in swarm intelligence. Springer, Berlin, pp. 208–214

    Chapter  Google Scholar 

  8. Hu Y, Lee HK, Li J (2009) DE-based reversible data hiding with improved overflow location map. IEEE Transactions on Circuits and Systems for Video Technology 19(2):250–260

    Article  Google Scholar 

  9. Li J, Li X, Yang B, Sun X (2015a) Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security 10(3):507–518

    Article  Google Scholar 

  10. Li X, Sun X, Liu Q (2015b) Image integrity authentication scheme based on fixed point theory [J]. IEEE Trans Image Process 24(2):632–645

    Article  MathSciNet  Google Scholar 

  11. Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21–27

    Article  Google Scholar 

  12. Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics and Security 8(3):553–562

    Article  Google Scholar 

  13. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3):354–362

    Article  Google Scholar 

  14. Ou, B., Li, X., and Zhang, W. (2015) PVO-based reversible data hiding for encrypted images. Signal and Information Processing (ChinaSIP), 2015 I.E. China Summit and International Conference on IEEE. 831–835

  15. Pandey R, Singh AK, Kumar B et al (2016) Iris based secure NROI multiple eye image watermarking for teleophthalmology[J]. Multimedia Tools and Applications:1–17. doi:10.1007/s11042-016-3536-6

  16. Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted JPEG Bitstream. IEEE Trans on Multimedia 16(5):1486–1491

    Article  Google Scholar 

  17. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164

    Article  Google Scholar 

  18. Schaefer G, Stich M (2004) UCID-an uncompressed color image database. Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia:472–480

  19. Shiu CW, Chen YC, Hong W (2015) Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process Image Commun 39:226–233

    Article  Google Scholar 

  20. Singh AK (2016a) Improved hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimedia Tools and Applications: An International Journal, Springer. doi:10.1007/s11042- 016-3514-z

    Google Scholar 

  21. Singh AK (2016b) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images [J]. Multimedia Tools and Applications:1–18. doi:10.1007/s11042-016-3514-z

  22. Singh AK, Dave M, Mohan A (2014a) Wavelet based image watermarking: futuristic concepts in information security [J]. Proceedings of the National Academy of Sciences, India Section A: Physical Sciences 84(3):345–359

    Article  Google Scholar 

  23. Singh AK, Dave M, Mohan A (2014b) Hybrid technique for robust and imperceptible image watermarking in DWT–DCT–SVD domain[J]. National Academy Science Letters 37(4):351–358

    Article  Google Scholar 

  24. Singh AK, Dave M, Mohan A (2015a) Robust and secure multiple watermarking in wavelet domain [J]. Journal of Medical Imaging and Health Informatics 5(2):406–414

    Article  Google Scholar 

  25. Singh AK, Kumar B, Dave M et al (2015b) Multiple watermarking on medical images using selective discrete wavelet transform coefficients [J]. Journal of Medical Imaging and Health Informatics 5(3):607–614

    Article  Google Scholar 

  26. Singh AK, Kumar B, Dave M et al (2015c) Robust and imperceptible dual watermarking for telemedicine applications[J]. Wirel Pers Commun 80(4):1415–1433

    Article  Google Scholar 

  27. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology 13(8):890–896

    Article  Google Scholar 

  28. Wang J, Lian S, Shi YQ (2015a) Hybrid multiplicative multi-watermarking in DWT domain [J]. Multidim Syst Sign Process 1-20. doi:10.1007/s11045-015-0363-2

  29. Wang J, Lian S, Wang J (2015b) Hybrid additive multi-watermarking and decoding[J]. Multimedia Systems 21(4):345–361

    Article  Google Scholar 

  30. Wu X, Sun W (2014) High-capacity reversible data hiding in encrypted images by prediction error. Signal Process 104:387–400

    Article  Google Scholar 

  31. Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Security and Communication Networks 7(8):1283–1291

    Article  Google Scholar 

  32. Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016a) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools and Applications 75(4):1947–1962

    Article  Google Scholar 

  33. Xia Z, Wang X, Sun X, Wang Q (2016b) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27(2):340–352

    Article  Google Scholar 

  34. Xiang D, Xiong Y (2005) Digital image scrambling based on josephus traversing. Computer Engineering and Applications 41(10):44–46

    Google Scholar 

  35. Yin ZX, Luo B, Hong W (2014) Separable and error-free reversible data hiding in encrypted image with high payload. Sci World J. doi:10.1155/2014/604876

  36. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Processing Letters 18(4):255–258

    Article  Google Scholar 

  37. Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Transactions on Information Forensics and Security 7(2):826–832

    Article  Google Scholar 

  38. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Article  Google Scholar 

  39. Zhang W, Ma K, Yu N (2013) Reversibility improved data hiding in encrypted images. Signal Process 94:118–127

    Article  Google Scholar 

Download references

Acknowledgment

This research work is supported by National Science Foundation of China (61502009, 61525203, 61472235), China Postdoctoral Science Foundation (2016 M591650), “Shu Guang” project supported by Shanghai Municipal Education Commission and Shanghai Education Development Foundation, Natural Science Foundation of Anhui Province (CN) (1508085SQF216), Key Program for Excellent Young Talents in Colleges and Universities of Anhui Province (gxyqZD2016011), and the “Sino-UK” Higher Education Research Partnership for PhD studies” joint-project (2013-2015) funded by the British Council China and the China Scholarship Council (CSC).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinpeng Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yin, Z., Abel, A., Tang, J. et al. Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multimed Tools Appl 76, 3899–3920 (2017). https://doi.org/10.1007/s11042-016-4049-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4049-z

Keywords

Navigation