Skip to main content
Log in

Reversible data hiding in encrypted images based on IWT and chaotic system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a reversible data hiding in encrypted image (RDH-EI) algorithm based on integer wavelet transform (IWT) and chaotic system was proposed. The image decrypted and the extracted data by the algorithm were both lossless. In this scheme, IWT transform was used to decompose the carrier image into wavelet components, and the chaotic system was used to generate position sequence, encryption sequence and scrambling sequence, which were used for data hiding and image encryption. The secret data was hidden in the diagonal component according to the position sequence, and the approximate component was encrypted according to the encryption sequence and the scrambling sequence, and then the final encrypted image was obtained. A solution was proposed to solve the problem of pixel loss in the reconstruction process after the wavelet component is encrypted. The key used to decrypt the image and extract the secret information was divided into two parts for different levels of security considerations. The method of encrypting image after data hiding made the solution more secure and with higher maximum payload. Simulation results showed that, compared with some existing schemes, this scheme could obtain better performance, which including higher embedding rate, visual quality of decrypted and extracted images, and anti-attack performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Abdulla AA, Jassim SA, Sellahewa H (2013) Secure steganography technique based on bitplane indexes. In: 2013 IEEE international symposium on multimedia, 9-11 Dec. 287–291. https://doi.org/10.1109/ISM.2013.55

  2. Akgul A, Moroz IM, Durdu A (2019) A novel data hiding method by using a chaotic system without equilibrium points. Modern Phys Lett B 33(29):1950357. https://doi.org/10.1142/s0217984919503573

    Article  MathSciNet  Google Scholar 

  3. Alan Anwar A, Harin S, Sabah AJ (2014) Steganography based on pixel intensity value decomposition. In: Proc.SPIE, 2014. https://doi.org/10.1117/12.2050518

  4. Alan Anwer A, Sabah AJ, Harin S (2013) Efficient high-capacity steganography technique. In: Proc.SPIE. https://doi.org/10.1117/12.2018994

  5. Alshoura WH, Zainol Z, Teh JS, Alawida M (2020) A new chaotic image watermarking scheme based on SVD and IWT. IEEE Access 8:43391–43406. https://doi.org/10.1109/ACCESS.2020.2978186

    Article  Google Scholar 

  6. Bhatnagar G, Wu QMJ (2012) Chaos-based security solution for fingerprint data during communication and transmission. IEEE Trans Instrum Meas 61(4):876–887. https://doi.org/10.1109/TIM.2011.2179330

    Article  Google Scholar 

  7. Daubechies I, Sweldens W (1998) Factoring wavelet transforms into lifting steps. J Fourier Anal Appl 4(3):247–269. https://doi.org/10.1007/BF02476026

    Article  MathSciNet  MATH  Google Scholar 

  8. Dhall S, Sharma R, Gupta S (2020) A multi-level steganography mechanism using quantum chaos encryption. Multimed Tools Appl 79(3–4):1987–2012. https://doi.org/10.1007/s11042-019-08223-7

    Article  Google Scholar 

  9. Fu X, Liu B, Xie Y, Li W, Liu Y (2018) Image encryption-then-transmission using DNA encryption algorithm and the double chaos. IEEE Photonics J 10(3):1–15. https://doi.org/10.1109/JPHOT.2018.2827165

    Article  Google Scholar 

  10. Guo Y, Jing S, Zhou Y, Xu X, Wei L (2020) An image encryption algorithm based on logistic-Fibonacci Cascade Chaos and 3D bit scrambling. IEEE Access. 8:9896–9912. https://doi.org/10.1109/ACCESS.2019.2963717

    Article  Google Scholar 

  11. Hong W, Chen T, Wu H (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19(4):199–202. https://doi.org/10.1109/LSP.2012.2187334

    Article  Google Scholar 

  12. Jung S, Ha LT, Ko S (2011) A new histogram modification based reversible data hiding algorithm considering the human visual system. IEEE Signal Proces Lett 18(2):95–98. https://doi.org/10.1109/LSP.2010.2095498

    Article  Google Scholar 

  13. Li F, Mao Q, Chang C-C (2017) Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method. Multimed Tools Appl 77. https://doi.org/10.1007/s11042-017-4388-4

  14. Ma GY, Wang JJ (2019) Efficient reversible data hiding in encrypted images based on multi-stage integer wavelet transform. Signal Process-Image Commun 75:55–63. https://doi.org/10.1016/j.image.2019.03.013

    Article  Google Scholar 

  15. Ma B, Wang X, Li Q, Li B, Li J, Wang C, Shi Y (2019) Adaptive error prediction method based on multiple linear regression for reversible data hiding. J Real-Time Image Proc 16(4):821–834. https://doi.org/10.1007/s11554-019-00891-w

    Article  Google Scholar 

  16. Mamatha G, Shaik Ahmad (2018) A reversible data hiding based on integer wavelet transforms and prediction error expansion. Paper presented at the 2018 International Conference on Computational Science and Computational Intelligence (CSCI)

  17. Meng L, Liu L, Tian G, Wang X (2021) An adaptive reversible watermarking in IWT domain. Multimed Tools Appl 80(1):711–735. https://doi.org/10.1007/s11042-020-09686-9

    Article  Google Scholar 

  18. Ponuma R, Amutha R, Aparna S, Gopal G (2019) Visually meaningful image encryption using data hiding and chaotic compressive sensing. Multimed Tools Appl 78(18):25707–25729. https://doi.org/10.1007/s11042-019-07808-6

    Article  Google Scholar 

  19. Puteaux P, Puech W (2018) An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans Inf Forensics Secur 13(7):1670–1681. https://doi.org/10.1109/TIFS.2018.2799381

    Article  Google Scholar 

  20. Qin C, He Z, Luo X, Dong J (2018) Reversible data hiding in encrypted image with separable capability and high embedding capacity. Inf Sci 465:285–304. https://doi.org/10.1016/j.ins.2018.07.021

    Article  Google Scholar 

  21. Qiu Y, Qian Z, Zeng H, Lin X, Zhang X (2020) Reversible data hiding in encrypted images using adaptive reversible integer transformation. Signal Process 167. https://doi.org/10.1016/j.sigpro.2019.107288

  22. Qiu Y, Ying Q, Lin X, Zhang Y, Qian Z (2020) Reversible data hiding in encrypted images with dual data embedding. IEEE Access. 8:23209–23220. https://doi.org/10.1109/ACCESS.2020.2969252

    Article  Google Scholar 

  23. Shi Y, Li X, Zhang X, Wu H, Ma B (2016) Reversible data hiding: advances in the past two decades. IEEE Access. 4:3210–3237. https://doi.org/10.1109/ACCESS.2016.2573308

    Article  Google Scholar 

  24. Shiu CW, Chen YC, Hong W (2015) Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process-Image Commun 39:226–233. https://doi.org/10.1016/j.image.2015.09.014

    Article  Google Scholar 

  25. Subburam S, Selvakumar S, Geetha S (2018) High performance reversible data hiding scheme through multilevel histogram modification in lifting integer wavelet transform. Multimed Tools Appl 77(6):7071–7095. https://doi.org/10.1007/s11042-017-4622-0

    Article  Google Scholar 

  26. The USC-SIPI Image Database [Online]. Available:http://sipi.usc.edu/database/

  27. Wang S-Y, Li C-Y, Kuo W-C (2013) Reversible data hiding based on two-dimensional prediction errors. IET Image Process 7(9):805–816. https://doi.org/10.1049/iet-ipr.2012.0521

    Article  Google Scholar 

  28. Wen W, Wei K, Zhang Y, Fang Y, Li M (2019) Colour light field image encryption based on DNA sequences and chaotic systems. Nonlinear Dyn 99(2):1587–1600. https://doi.org/10.1007/s11071-019-05378-8

    Article  Google Scholar 

  29. Xiang SJ, Luo XR (2018) Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group. IEEE Trans Circuits Syst Video Technol 28(11):3099–3110. https://doi.org/10.1109/tcsvt.2017.2742023

    Article  MathSciNet  Google Scholar 

  30. Yang C-H, Weng C-Y, Lin Y-K, Liu K-L (2017) High-fidelity lossless data hiding based on predictors selection. Multimed Tools Appl 76(22):23699–23720. https://doi.org/10.1007/s11042-016-4133-4

    Article  Google Scholar 

  31. Yi S, Zhou YC (2017) Binary-block embedding for reversible data hiding in encrypted images. Signal Process 133:40–51. https://doi.org/10.1016/j.sigpro.2016.10.017

    Article  Google Scholar 

  32. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258. https://doi.org/10.1109/LSP.2011.2114651

    Article  Google Scholar 

  33. Zhang L, Wei D (2020) Image watermarking based on matrix decomposition and gyrator transform in invariant integer wavelet domain. Signal Process 169:107421. https://doi.org/10.1016/j.sigpro.2019.107421

    Article  Google Scholar 

Download references

Acknowledgments

This research is supported in part by National Natural Science Foundation of China under Grant 61702305.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lianshan Liu.

Ethics declarations

Conflict of interest

All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Meng, L., Liu, L., Wang, X. et al. Reversible data hiding in encrypted images based on IWT and chaotic system. Multimed Tools Appl 81, 16833–16861 (2022). https://doi.org/10.1007/s11042-022-12415-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12415-z

Keywords

Navigation