Controllable high-capacity separable data hiding in encrypted images by compressive sensing and data pretreatment

In this paper, a separable data hiding algorithm in encrypted images with controllable and high-capacity is proposed. Firstly, the original image is decomposed into important coefficients and unimportant coefficients by discrete wavelet transform (DWT). Secondly, DWT is applied again on unimportant coefficients matrixes and then the obtained coefficients matrixes are compressed using compressive sensing (CS) to empty space for data hiding. All the important coefficients are encrypted using the traditional stream cipher by the content owner. Thirdly, the data hider hides the pretreated data information in the free space. Finally, the encrypted image containing additional data is scrambled to improve the security. The receiver can separably extract the hiding data or/and decrypt the image depending on the keys he owns. Compared with the previous work, there are various advantages in the proposed algorithm, such as the separability between image recovery and data extraction, the controllable and high-capacity for data hiding. Experimental results verify the superiority of the proposed algorithm.

[1]  Yu Zheng,et al.  Urban Water Quality Prediction Based on Multi-Task Multi-View Learning , 2016, IJCAI.

[2]  Hsiang-Cheh Huang,et al.  Robust Image Watermarking Based on Compressed Sensing Techniques , 2014, J. Inf. Hiding Multim. Signal Process..

[3]  Zhen Guo,et al.  A Robust Watermarking Algorithm for Medical Images in the Encrypted Domain , 2016, ICSH.

[4]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[5]  Luming Zhang,et al.  Action2Activity: Recognizing Complex Activities from Sensor Data , 2015, IJCAI.

[6]  Luming Zhang,et al.  Fortune Teller: Predicting Your Career Path , 2016, AAAI.

[7]  Shi-Jinn Horng,et al.  Anti-forensic steganography using multi-bit MER with flexible bit location , 2015, Int. J. Ad Hoc Ubiquitous Comput..

[8]  Vinay Kumar Srivastava,et al.  A fast watermarking algorithm with enhanced security using compressive sensing and principle components and its performance analysis against a set of standard attacks , 2017, Multimedia Tools and Applications.

[9]  Sen Bai,et al.  High-capacity separable data hiding in encrypted image based on compressive sensing , 2016, Multimedia Tools and Applications.

[10]  Li Liu,et al.  Recognizing Complex Activities by a Probabilistic Interval-Based Model , 2016, AAAI.

[11]  Asha Rani,et al.  An image copyright protection scheme by encrypting secret data with the host image , 2014, Multimedia Tools and Applications.

[12]  R.G. Baraniuk,et al.  Compressive Sensing [Lecture Notes] , 2007, IEEE Signal Processing Magazine.

[13]  Mohan S. Kankanhalli,et al.  Compressed-encrypted domain JPEG2000 image watermarking , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[14]  Nouf A. Al-Otaibi,et al.  2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers , 2014 .

[15]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator Technique for RGB Image Steganography , 2010 .

[16]  Hongbin Zha,et al.  Tracking Generic Human Motion via Fusion of Low- and High-Dimensional Approaches , 2013, IEEE Trans. Syst. Man Cybern. Syst..

[17]  Jing Xu,et al.  Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition , 2010, 2010 International Conference on Information and Communication Technology Convergence (ICTC).

[18]  Wei Li,et al.  Data Hiding Based on Subsampling and Compressive Sensing , 2013, 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[19]  Andrew Beng Jin Teoh,et al.  Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition , 2014, Neurocomputing.

[20]  Saudi Arabia,et al.  Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority , 2014 .

[21]  A. Gutub,et al.  Vibrant Color Image Steganography using Channel Differences and Secret Data Distribution , 2010 .

[22]  Di Xiao,et al.  Separable data hiding in encrypted image based on compressive sensing , 2014 .

[23]  K. P. Soman,et al.  A robust watermarking method based on Compressed Sensing and Arnold scrambling , 2012, 2012 International Conference on Machine Vision and Image Processing (MVIP).

[24]  David S. Rosenblum,et al.  From action to activity: Sensor-based activity recognition , 2016, Neurocomputing.

[25]  Trac D. Tran,et al.  Fast and Efficient Compressive Sensing Using Structurally Random Matrices , 2011, IEEE Transactions on Signal Processing.

[26]  Li Liang Digital image watermark algorithm based on compressive sensing , 2012 .

[27]  Tung-Shou Chen,et al.  An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.

[28]  Emmanuel J. Candès,et al.  Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? , 2004, IEEE Transactions on Information Theory.

[29]  Ching-Nung Yang,et al.  Lossless data hiding for absolute moment block truncation coding using histogram modification , 2016, Journal of Real-Time Image Processing.

[30]  Farhan Khan,et al.  Message Concealment Techniques using Image based Steganography , 2007 .

[31]  Mário A. T. Figueiredo,et al.  Gradient Projection for Sparse Reconstruction: Application to Compressed Sensing and Other Inverse Problems , 2007, IEEE Journal of Selected Topics in Signal Processing.

[32]  Marc Chaumont,et al.  A reversible data hiding method for encrypted images , 2008, Electronic Imaging.

[33]  E.J. Candes,et al.  An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.

[34]  Muhammad Khurram Khan,et al.  Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain , 2010 .

[35]  Emmanuel J. Candès,et al.  Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.

[36]  Muhammad Irshad Nazeer,et al.  An Efficient Data Hiding Technique in Frequency domain by using Fresnelet Basis , 2012 .