High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation

Reversible data hiding in encrypted images has attracted considerable attention from the communities of privacy security and protection. The success of the previous methods in this area has shown that a superior performance can be achieved by exploiting the redundancy within the image. Specifically, because the pixels in the local structures (like patches or regions) have a strong similarity, they can be heavily compressed, thus resulting in a large hiding room. In this paper, to better explore the correlation between neighbor pixels, we propose to consider the patch-level sparse representation when hiding the secret data. The widely used sparse coding technique has demonstrated that a patch can be linearly represented by some atoms in an over-complete dictionary. As the sparse coding is an approximation solution, the leading residual errors are encoded and self-embedded within the cover image. Furthermore, the learned dictionary is also embedded into the encrypted image. Thanks to the powerful representation of sparse coding, a large vacated room can be achieved, and thus the data hider can embed more secret messages in the encrypted image. Extensive experiments demonstrate that the proposed method significantly outperforms the state-of-the-art methods in terms of the embedding rate and the image quality.

[1]  Cordelia Schmid,et al.  Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search , 2008, ECCV.

[2]  Rui Du,et al.  Invertible authentication watermark for JPEG images , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[3]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[4]  Tung-Shou Chen,et al.  An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.

[5]  Zhenxing Qian,et al.  Efficient reversible data hiding in encrypted images , 2014, J. Vis. Commun. Image Represent..

[6]  Yu-Chen Hu,et al.  Reversible image hiding scheme using predictive coding and histogram shifting , 2009, Signal Process..

[7]  Chin-Feng Lee,et al.  Reversible data hiding scheme based on dual stegano-images using orientation combinations , 2011, Telecommunication Systems.

[8]  M. Elad,et al.  $rm K$-SVD: An Algorithm for Designing Overcomplete Dictionaries for Sparse Representation , 2006, IEEE Transactions on Signal Processing.

[9]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[10]  Konstantinos N. Plataniotis,et al.  An Analysis of Random Projection for Changeable and Privacy-Preserving Biometric Verification , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[11]  Heung-Kyu Lee,et al.  Difference Expansion Based Reversible Data Hiding Using Two Embedding Directions , 2008, IEEE Transactions on Multimedia.

[12]  Gwoboa Horng,et al.  (k, n)-Image Reversible Data Hiding , 2014, J. Inf. Hiding Multim. Signal Process..

[13]  Michael Elad,et al.  Analysis K-SVD: A Dictionary-Learning Algorithm for the Analysis Sparse Model , 2013, IEEE Transactions on Signal Processing.

[14]  A. Bruckstein,et al.  K-SVD : An Algorithm for Designing of Overcomplete Dictionaries for Sparse Representation , 2005 .

[15]  Bin Luo,et al.  Separable and Error-Free Reversible Data Hiding in Encrypted Image with High Payload , 2014, TheScientificWorldJournal.

[16]  Jeng-Shyang Pan,et al.  Parity-invariability-based reversible watermarking , 2009 .

[17]  Kumar Parasuraman,et al.  Reversible image watermarking using interpolation technique , 2014, 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE).

[18]  Gary J. Sullivan,et al.  Video Compression - From Concepts to the H.264/AVC Standard , 2005, Proceedings of the IEEE.

[19]  Din-Chang Tseng,et al.  Image subband coding using fuzzy inference and adaptive quantization , 2003, IEEE Trans. Syst. Man Cybern. Part B.

[20]  Weiming Zhang,et al.  Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.

[21]  Chin-Chen Chang,et al.  Reversible Data Hiding Based on Histogram Modification of Pixel Differences , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[22]  Jeho Nam,et al.  A Novel Difference Expansion Transform for Reversible Data Embedding , 2008, IEEE Transactions on Information Forensics and Security.

[23]  Luc Van Gool,et al.  The Pascal Visual Object Classes (VOC) Challenge , 2010, International Journal of Computer Vision.

[24]  Xuelong Li,et al.  Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[25]  Tieyong Zeng,et al.  Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.

[26]  Michael Elad,et al.  Compression of facial images using the K-SVD algorithm , 2008, J. Vis. Commun. Image Represent..

[27]  Chin-Chen Chang,et al.  Multilevel reversible data hiding based on histogram modification of difference images , 2008, Pattern Recognit..

[28]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[29]  Chien-Feng Huang,et al.  Improving Histogram-based Reversible Information Hiding by an Optimal Weight-based Prediction Scheme , 2013, J. Inf. Hiding Multim. Signal Process..

[30]  Frank Y. Shih,et al.  Genetic algorithm based methodology for breaking the steganalytic systems , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[31]  Weiming Zhang,et al.  Reversibility improved data hiding in encrypted images , 2014, Signal Process..

[32]  Edgar R. Weippl,et al.  Framework Based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.

[33]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[34]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[35]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[36]  Yao Zhao,et al.  Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[37]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[38]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[39]  Yao Zhao,et al.  Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs , 2008, IEEE Signal Processing Letters.

[40]  Dinu Coltuc,et al.  Improved Embedding for Prediction-Based Reversible Watermarking , 2011, IEEE Transactions on Information Forensics and Security.

[41]  David Zhang,et al.  Fast block-based image restoration employing the improved best neighborhood matching approach , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[42]  Alessandro Neri,et al.  A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..

[43]  Wenjun Zeng,et al.  Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.