Abstract
In this paper, a reversible data hiding in encrypted image (RDH-EI) algorithm based on integer wavelet transform (IWT) and chaotic system was proposed. The image decrypted and the extracted data by the algorithm were both lossless. In this scheme, IWT transform was used to decompose the carrier image into wavelet components, and the chaotic system was used to generate position sequence, encryption sequence and scrambling sequence, which were used for data hiding and image encryption. The secret data was hidden in the diagonal component according to the position sequence, and the approximate component was encrypted according to the encryption sequence and the scrambling sequence, and then the final encrypted image was obtained. A solution was proposed to solve the problem of pixel loss in the reconstruction process after the wavelet component is encrypted. The key used to decrypt the image and extract the secret information was divided into two parts for different levels of security considerations. The method of encrypting image after data hiding made the solution more secure and with higher maximum payload. Simulation results showed that, compared with some existing schemes, this scheme could obtain better performance, which including higher embedding rate, visual quality of decrypted and extracted images, and anti-attack performance.
Similar content being viewed by others
References
Abdulla AA, Jassim SA, Sellahewa H (2013) Secure steganography technique based on bitplane indexes. In: 2013 IEEE international symposium on multimedia, 9-11 Dec. 287–291. https://doi.org/10.1109/ISM.2013.55
Akgul A, Moroz IM, Durdu A (2019) A novel data hiding method by using a chaotic system without equilibrium points. Modern Phys Lett B 33(29):1950357. https://doi.org/10.1142/s0217984919503573
Alan Anwar A, Harin S, Sabah AJ (2014) Steganography based on pixel intensity value decomposition. In: Proc.SPIE, 2014. https://doi.org/10.1117/12.2050518
Alan Anwer A, Sabah AJ, Harin S (2013) Efficient high-capacity steganography technique. In: Proc.SPIE. https://doi.org/10.1117/12.2018994
Alshoura WH, Zainol Z, Teh JS, Alawida M (2020) A new chaotic image watermarking scheme based on SVD and IWT. IEEE Access 8:43391–43406. https://doi.org/10.1109/ACCESS.2020.2978186
Bhatnagar G, Wu QMJ (2012) Chaos-based security solution for fingerprint data during communication and transmission. IEEE Trans Instrum Meas 61(4):876–887. https://doi.org/10.1109/TIM.2011.2179330
Daubechies I, Sweldens W (1998) Factoring wavelet transforms into lifting steps. J Fourier Anal Appl 4(3):247–269. https://doi.org/10.1007/BF02476026
Dhall S, Sharma R, Gupta S (2020) A multi-level steganography mechanism using quantum chaos encryption. Multimed Tools Appl 79(3–4):1987–2012. https://doi.org/10.1007/s11042-019-08223-7
Fu X, Liu B, Xie Y, Li W, Liu Y (2018) Image encryption-then-transmission using DNA encryption algorithm and the double chaos. IEEE Photonics J 10(3):1–15. https://doi.org/10.1109/JPHOT.2018.2827165
Guo Y, Jing S, Zhou Y, Xu X, Wei L (2020) An image encryption algorithm based on logistic-Fibonacci Cascade Chaos and 3D bit scrambling. IEEE Access. 8:9896–9912. https://doi.org/10.1109/ACCESS.2019.2963717
Hong W, Chen T, Wu H (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19(4):199–202. https://doi.org/10.1109/LSP.2012.2187334
Jung S, Ha LT, Ko S (2011) A new histogram modification based reversible data hiding algorithm considering the human visual system. IEEE Signal Proces Lett 18(2):95–98. https://doi.org/10.1109/LSP.2010.2095498
Li F, Mao Q, Chang C-C (2017) Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method. Multimed Tools Appl 77. https://doi.org/10.1007/s11042-017-4388-4
Ma GY, Wang JJ (2019) Efficient reversible data hiding in encrypted images based on multi-stage integer wavelet transform. Signal Process-Image Commun 75:55–63. https://doi.org/10.1016/j.image.2019.03.013
Ma B, Wang X, Li Q, Li B, Li J, Wang C, Shi Y (2019) Adaptive error prediction method based on multiple linear regression for reversible data hiding. J Real-Time Image Proc 16(4):821–834. https://doi.org/10.1007/s11554-019-00891-w
Mamatha G, Shaik Ahmad (2018) A reversible data hiding based on integer wavelet transforms and prediction error expansion. Paper presented at the 2018 International Conference on Computational Science and Computational Intelligence (CSCI)
Meng L, Liu L, Tian G, Wang X (2021) An adaptive reversible watermarking in IWT domain. Multimed Tools Appl 80(1):711–735. https://doi.org/10.1007/s11042-020-09686-9
Ponuma R, Amutha R, Aparna S, Gopal G (2019) Visually meaningful image encryption using data hiding and chaotic compressive sensing. Multimed Tools Appl 78(18):25707–25729. https://doi.org/10.1007/s11042-019-07808-6
Puteaux P, Puech W (2018) An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans Inf Forensics Secur 13(7):1670–1681. https://doi.org/10.1109/TIFS.2018.2799381
Qin C, He Z, Luo X, Dong J (2018) Reversible data hiding in encrypted image with separable capability and high embedding capacity. Inf Sci 465:285–304. https://doi.org/10.1016/j.ins.2018.07.021
Qiu Y, Qian Z, Zeng H, Lin X, Zhang X (2020) Reversible data hiding in encrypted images using adaptive reversible integer transformation. Signal Process 167. https://doi.org/10.1016/j.sigpro.2019.107288
Qiu Y, Ying Q, Lin X, Zhang Y, Qian Z (2020) Reversible data hiding in encrypted images with dual data embedding. IEEE Access. 8:23209–23220. https://doi.org/10.1109/ACCESS.2020.2969252
Shi Y, Li X, Zhang X, Wu H, Ma B (2016) Reversible data hiding: advances in the past two decades. IEEE Access. 4:3210–3237. https://doi.org/10.1109/ACCESS.2016.2573308
Shiu CW, Chen YC, Hong W (2015) Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process-Image Commun 39:226–233. https://doi.org/10.1016/j.image.2015.09.014
Subburam S, Selvakumar S, Geetha S (2018) High performance reversible data hiding scheme through multilevel histogram modification in lifting integer wavelet transform. Multimed Tools Appl 77(6):7071–7095. https://doi.org/10.1007/s11042-017-4622-0
The USC-SIPI Image Database [Online]. Available:http://sipi.usc.edu/database/
Wang S-Y, Li C-Y, Kuo W-C (2013) Reversible data hiding based on two-dimensional prediction errors. IET Image Process 7(9):805–816. https://doi.org/10.1049/iet-ipr.2012.0521
Wen W, Wei K, Zhang Y, Fang Y, Li M (2019) Colour light field image encryption based on DNA sequences and chaotic systems. Nonlinear Dyn 99(2):1587–1600. https://doi.org/10.1007/s11071-019-05378-8
Xiang SJ, Luo XR (2018) Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group. IEEE Trans Circuits Syst Video Technol 28(11):3099–3110. https://doi.org/10.1109/tcsvt.2017.2742023
Yang C-H, Weng C-Y, Lin Y-K, Liu K-L (2017) High-fidelity lossless data hiding based on predictors selection. Multimed Tools Appl 76(22):23699–23720. https://doi.org/10.1007/s11042-016-4133-4
Yi S, Zhou YC (2017) Binary-block embedding for reversible data hiding in encrypted images. Signal Process 133:40–51. https://doi.org/10.1016/j.sigpro.2016.10.017
Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258. https://doi.org/10.1109/LSP.2011.2114651
Zhang L, Wei D (2020) Image watermarking based on matrix decomposition and gyrator transform in invariant integer wavelet domain. Signal Process 169:107421. https://doi.org/10.1016/j.sigpro.2019.107421
Acknowledgments
This research is supported in part by National Natural Science Foundation of China under Grant 61702305.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Meng, L., Liu, L., Wang, X. et al. Reversible data hiding in encrypted images based on IWT and chaotic system. Multimed Tools Appl 81, 16833–16861 (2022). https://doi.org/10.1007/s11042-022-12415-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-12415-z