An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer

Abstract Recently, reversible data hiding in encrypted image (RDHEI) has attracted extensive attention, which can be used in secure cloud computing and privacy protection effectively. In this paper, a RDHEI scheme based on redundancy transfer and sparse block encoding is proposed. Content owner first utilizes a specific encryption method, including bit plane disordering, block and pixel scrambling, to encrypt each original block, which not only can transfer the redundancy from MSB to LSB, but also can mask image contents securely. Through an improved sparse matrix encoding method for different types of binary blocks, data hider embeds additional data into the vacated room within LSB of encrypted image efficiently. Separable operations of data extraction, image decryption and image recovery can be conducted on the receiver side based on encryption key and data hiding key. Experimental results demonstrate that our scheme can achieve better rate-distortion performance than some of state-of-the-art schemes.

[1]  Weiming Zhang,et al.  Efficient Reversible Data Hiding Based on Multiple Histograms Modification , 2015, IEEE Transactions on Information Forensics and Security.

[2]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Saudi Arabia,et al.  Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority , 2014 .

[4]  Wei Zhang,et al.  Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection , 2018, Signal Process..

[5]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[6]  Adnan Abdul-Aziz Gutub,et al.  RGB Intensity Based Variable-Bits Image Steganography , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[7]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[8]  Yao Zhao,et al.  Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[9]  Xiaochun Cao,et al.  High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation , 2016, IEEE Transactions on Cybernetics.

[10]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[11]  Chin-Chen Chang,et al.  An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism , 2013, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Wei Su,et al.  Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[13]  Xinpeng Zhang,et al.  Perceptual image hashing via dual-cross pattern encoding and salient structure detection , 2018, Inf. Sci..

[14]  Jiwu Huang,et al.  New Framework for Reversible Data Hiding in Encrypted Domain , 2016, IEEE Transactions on Information Forensics and Security.

[15]  Bin Ma,et al.  Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.

[16]  Xinpeng Zhang,et al.  Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy , 2017, Signal Process..

[17]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator Technique for RGB Image Steganography , 2010 .

[18]  Bin Li,et al.  General Framework to Histogram-Shifting-Based Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[19]  Chi-Man Pun,et al.  Reversible data-hiding in encrypted images by redundant space transfer , 2018, Inf. Sci..

[20]  Xin Liao,et al.  Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels , 2015, J. Vis. Commun. Image Represent..

[21]  Xinpeng Zhang,et al.  Effective reversible data hiding in encrypted image with privacy protection for image content , 2015, J. Vis. Commun. Image Represent..

[22]  Weiming Zhang,et al.  Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.

[23]  Tung-Shou Chen,et al.  An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.

[24]  Adnan Abdul-Aziz Gutub,et al.  Triple-A: Secure RGB image steganography based on randomization , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.

[25]  Weiming Zhang,et al.  Reversibility improved data hiding in encrypted images , 2014, Signal Process..

[26]  Jessica J. Fridrich,et al.  Lossless data embedding for all image formats , 2002, IS&T/SPIE Electronic Imaging.

[27]  Yicong Zhou,et al.  Binary-block embedding for reversible data hiding in encrypted images , 2017, Signal Process..

[28]  Ali Al-Haj,et al.  Reversible data hiding in encrypted images , 2017, 2017 8th International Conference on Information Technology (ICIT).

[29]  Adnan Abdul-Aziz Gutub,et al.  Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography , 2018 .

[30]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[31]  Min-Shiang Hwang,et al.  A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching , 2018, Int. J. Netw. Secur..

[32]  Ming Yang,et al.  Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain , 2018, Int. J. Netw. Secur..

[33]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[34]  Adnan Abdul-Aziz Gutub,et al.  Counting-based secret sharing technique for multimedia applications , 2019, Multimedia Tools and Applications.

[35]  Chin-Chen Chang,et al.  A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting , 2014, IEEE Transactions on Image Processing.

[36]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.