Binary-block embedding for reversible data hiding in encrypted images

This paper first introduces a binary-block embedding (BBE) method to embed secret data in a binary image. Using BBE, we propose an algorithm for reversible data hiding in encrypted images (BBE-RDHEI). It uses BBE to embed binary bits in lower bit-planes of the original image into its higher bit-planes such that the lower bit-planes can be reserved for hiding secret data in subsequent processes. BBE-RDHEI employs a bit-level scrambling process after secret data embedding to spread embedded secret data to the entire marked encrypted image so that it can prevent secret data from loss. A security key design mechanism is proposed to enhance the security level of BBE-RDHEI. The processes of BBE-RDHEI are fully reversible. The secret data and original image can be reconstructed independently and separately. Experiments and comparisons show that BBE-RDHEI has an embedding rate nearly twice larger than the state-of-the-art algorithms, generates the marked decrypted images with high quality, and is able to withstand the brute-force, differential, noise and data loss attacks. Improved embedding capacity.Separable method and can fully recover the original image and secret data.High visual quality in the marked decrypted images.It is able to withstand the brute-force, differential, noise and data loss attacks.

[1]  Tung-Shou Chen,et al.  An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.

[2]  Kumar Parasuraman,et al.  Reversible image watermarking using interpolation technique , 2014, 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE).

[3]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[4]  Zhang Xinpeng,et al.  Separable Reversible Data hiding in Encrypted Images by n-nary Histogram Modification , 2013, ICMT 2013.

[5]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.

[6]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[7]  Jeho Nam,et al.  A Novel Difference Expansion Transform for Reversible Data Embedding , 2008, IEEE Transactions on Information Forensics and Security.

[8]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[9]  Marc Chaumont,et al.  A reversible data hiding method for encrypted images , 2008, Electronic Imaging.

[10]  Wei Sun,et al.  High-capacity reversible data hiding in encrypted images by prediction error , 2014, Signal Process..

[11]  Bin Li,et al.  General Framework to Histogram-Shifting-Based Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[12]  Mauro Barni,et al.  A general framework for robust watermarking security , 2003, Signal Process..

[13]  Zhenxing Qian,et al.  Efficient reversible data hiding in encrypted images , 2014, J. Vis. Commun. Image Represent..

[14]  N. Otsu A threshold selection method from gray level histograms , 1979 .

[15]  Xinpeng Zhang,et al.  Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[16]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[17]  Yu-Chen Hu,et al.  Reversible image hiding scheme using predictive coding and histogram shifting , 2009, Signal Process..

[18]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[19]  Yicong Zhou,et al.  Image encryption using binary bitplane , 2014, Signal Process..

[20]  Fei Peng,et al.  Adaptive reversible data hiding scheme based on integer transform , 2012, Signal Process..

[21]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[22]  Gwoboa Horng,et al.  Encrypted signal-based reversible data hiding with public key cryptosystem , 2014, J. Vis. Commun. Image Represent..

[23]  Yun Q. Shi,et al.  Reversible Data Hiding , 2003, IWDW.

[24]  Dinu Coltuc,et al.  Very Fast Watermarking by Reversible Contrast Mapping , 2007, IEEE Signal Processing Letters.

[25]  Tung-Shou Chen,et al.  Reversible data hiding for high quality images using modification of prediction errors , 2009, J. Syst. Softw..

[26]  Xiaolong Li,et al.  Efficient Generalized Integer Transform for Reversible Watermarking , 2010, IEEE Signal Processing Letters.

[27]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[28]  Yicong Zhou,et al.  A new 1D chaotic system for image encryption , 2014, Signal Process..

[29]  Weiming Zhang,et al.  Reversibility improved data hiding in encrypted images , 2014, Signal Process..

[30]  Weiming Zhang,et al.  Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.

[31]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .