Unified Data Hiding and Scrambling Method for JPEG Images

This paper proposes a novel method of unified data hiding and JPEG scrambling. This differs from the traditional image encryption algorithms in that, we propose to construct a privacy-preserved JPEG image during the data hiding procedure. That is while the scrambling operation masks the JPEG image content by the secret key, the additional messages is also represented by the sequence of the shuffled RLE (Run Length Encoding) pairs. Therefore, images uploaded to the cloud server unable to reveal the original content. Meanwhile, the owner can use the embedded messages for fragile watermarking, JPEG labeling and image management. The proposed method is reversible. After downloading a copy from the cloud, an authorized user can extract the hidden message and recover the original JPEG losslessly and simultaneously. Experimental results show that the proposed method provides a large embedding payload and has a good capability for preserving privacy.

[1]  KokSheik Wong,et al.  Progressive quality degradation in JPEG compressed image using DC block orientation with rewritable data embedding functionality , 2013, 2013 IEEE International Conference on Image Processing.

[2]  Kiyoshi Tanaka,et al.  Beyond format-compliant encryption for JPEG image , 2015, Signal Process. Image Commun..

[3]  Lujo Bauer,et al.  Toward strong, usable access control for shared distributed data , 2014, FAST.

[4]  Hang Zhou,et al.  Separable Reversible Data Hiding in Encrypted JPEG Bitstreams , 2018, IEEE Transactions on Dependable and Secure Computing.

[5]  Wenjun Zeng,et al.  Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.

[6]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..

[7]  Peijia Zheng,et al.  Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain , 2013, IEEE Transactions on Image Processing.

[8]  Raphael C.-W. Phan,et al.  Facial Expression Recognition in the Encrypted Domain Based on Local Fisher Discriminant Analysis , 2013, IEEE Transactions on Affective Computing.

[9]  Alessandro Piva,et al.  TTP-Free Asymmetric Fingerprinting Based on Client Side Embedding , 2014, IEEE Transactions on Information Forensics and Security.

[10]  Hsin-Lung Wu,et al.  A separable reversible data hiding scheme for encrypted JPEG bitstreams , 2017, Signal Process..

[11]  Weiwei Sun,et al.  Processing-Aware Privacy-Preserving Photo Sharing over Online Social Networks , 2016, ACM Multimedia.

[12]  Refik Molva,et al.  Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks , 2012, SNS '12.

[13]  Blase Ur,et al.  Tag, you can see it!: using tags for access control in photo sharing , 2012, CHI.

[14]  Ramesh Govindan,et al.  P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.

[15]  Kiyoshi Tanaka,et al.  JPEG image scrambling without expansion in bitstream size , 2012, 2012 19th IEEE International Conference on Image Processing.

[16]  Lakshminarayanan Subramanian,et al.  Cryptagram: photo privacy for online social media , 2013, COSN '13.