Integrated algorithm for block-permutation-based encryption with reversible data hiding

This paper proposes a Block-Permutation-Based Encryption (BPBE) method with Reversible Data Hiding (RDH). In the proposed algorithm, Histogram Shifting (HS) is used for RDH, and the BPBE method is utilized for encryption. The BPBE method performs four processes for encryption, namely, block scrambling, block rotation/inversion, negative-positive transformation, and the color component shuffling. The proposed algorithm is implemented on the concatenated image from a large database. Therefore, the number of the divided blocks can be increased, and the color scrambling of the encrypted image is increased. Consequently, the resistance against Jigsaw Puzzle Solvers (JPSs) could be improved. This algorithm consists of different hierarchical steps for the data embedding and the encryption. Therefore, the proposed algorithm can be suitable for the hierarchical access control system, where the permission is granted according to the various access rights.

[1]  Ayellet Tal,et al.  Solving multiple square jigsaw puzzles with missing pieces , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[2]  Minerva M. Yeung,et al.  Invisible watermarking for image verification , 1998, J. Electronic Imaging.

[3]  Xiaolong Li,et al.  A new lossy compression scheme for encrypted gray-scale images , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[4]  M. Pravalika,et al.  REVERSIBLE IMAGE DATA HIDING WITH CONTRAST ENHANCEMENT , 2016 .

[5]  Stefan Katzenbeisser,et al.  Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..

[6]  Hitoshi Kiya,et al.  Block-Permutation-Based Encryption Scheme with Enhanced Color Scrambling , 2017, SCIA.

[7]  Yun Q. Shi,et al.  Reversible Data Hiding , 2003, IWDW.

[8]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[9]  Nathan S. Netanyahu,et al.  An automatic solver for very large jigsaw puzzles using genetic algorithms , 2016, Genetic Programming and Evolvable Machines.

[10]  Margaret M. Fleck,et al.  Jigsaw puzzle solver using shape and color , 1998, ICSP '98. 1998 Fourth International Conference on Signal Processing (Cat. No.98TH8344).

[11]  Zhicheng Ni,et al.  Distortionless data hiding based on integer wavelet transform , 2002 .

[12]  Hitoshi Kiya,et al.  An Encryption-then-Compression system for JPEG 2000 standard , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[13]  Hitoshi Kiya,et al.  An Encryption-then-Compression System for JPEG/Motion JPEG Standard , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[14]  A.Z. Tirkel,et al.  Image watermarking-a spread spectrum application , 1996, Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications.

[15]  Andrew C. Gallagher Jigsaw puzzles with pieces of unknown orientation , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.

[16]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[17]  David B. Cooper,et al.  Solving Square Jigsaw Puzzles with Loop Constraints , 2014, ECCV.

[18]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[19]  Hitoshi Kiya,et al.  An Encryption-then-Compression System for Lossless Image Compression Standards , 2017, IEICE Trans. Inf. Syst..

[20]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[21]  Wenjun Zeng,et al.  Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.

[22]  Yuan Yan Tang,et al.  Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation , 2014, IEEE Transactions on Information Forensics and Security.