Block cipher based separable reversible data hiding in encrypted images

While most reversible data hiding in encrypted images (RDH-EI) are based on stream cipher, this paper aims to present an alternative method feasible for block-enciphered images. Before uploading data to a remote server, the content owner encrypts the original image with a block cipher algorithm using an encryption key. Then, the server embeds additional bits into the encrypted image with an embedding key to generate the marked encrypted image. On the recipient side, the additional bits can be extracted if the receiver has the embedding key. In case the receiver has only the encryption key, the marked encrypted image can be directly deciphered to a plaintext image with good quality. When both the embedding and encryption keys are available for the receiver, he can recover the original image without any errors. Compared with the existing block cipher based RDH-EI method, drawbacks of the encryption and the recovery are avoided, and good embedding payloads are achieved.

[1]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[2]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[3]  Wenjun Zeng,et al.  Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.

[4]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[5]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.

[6]  Ali Al-Haj,et al.  Reversible data hiding in encrypted images , 2017, 2017 8th International Conference on Information Technology (ICIT).

[7]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Marc Chaumont,et al.  A reversible data hiding method for encrypted images , 2008, Electronic Imaging.

[9]  Wei Sun,et al.  High-capacity reversible data hiding in encrypted images by prediction error , 2014, Signal Process..

[10]  Alessandro Piva,et al.  An efficient buyer-seller watermarking protocol based on composite signal representation , 2009, MM&Sec '09.

[11]  F. Willems,et al.  Capacity bounds and constructions for reversible data-hiding , 2002, 2002 14th International Conference on Digital Signal Processing Proceedings. DSP 2002 (Cat. No.02TH8628).

[12]  Xiao Zeng,et al.  Reversible Image Watermarking Using Interpolation Technique , 2010, IEEE Transactions on Information Forensics and Security.

[13]  Zhang Xinpeng,et al.  Separable Reversible Data hiding in Encrypted Images by n-nary Histogram Modification , 2013, ICMT 2013.

[14]  King Ngi Ngan,et al.  A Co-Saliency Model of Image Pairs , 2011, IEEE Transactions on Image Processing.

[15]  Weiming Zhang,et al.  Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.

[16]  Weiming Zhang,et al.  Reversibility improved data hiding in encrypted images , 2014, Signal Process..

[17]  Jessica J. Fridrich,et al.  Lossless data embedding for all image formats , 2002, IS&T/SPIE Electronic Imaging.

[18]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[19]  Chaple Gopal,et al.  Reversible Data Hiding in Encrypted Images , 2014 .

[20]  Stefan Katzenbeisser,et al.  Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..

[21]  Tieyong Zeng,et al.  Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.

[22]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[23]  Tung-Shou Chen,et al.  An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.

[24]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[25]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..