Joint reversible data hiding and image encryption

Image encryption process is jointed with reversible data hiding in this paper, where the data to be hided are modulated by different secret keys selected for encryption. To extract the hided data from the cipher-text, the different tentative decrypted results are tested against typical random distribution in both spatial and frequency domain and the goodnessof- fit degrees are compared to extract one hided bit. The encryption based data hiding process is inherently reversible. Experiments demonstrate the proposed scheme's effectiveness on natural and textural images, both in gray-level and binary forms.

[1]  Nikolaos G. Bourbakis,et al.  Image and video encryption using SCAN patterns , 2004, Pattern Recognit..

[2]  X. Liao,et al.  An image encryption approach based on chaotic maps , 2005 .

[3]  Jessica J. Fridrich,et al.  Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.

[4]  M. M. Fouad,et al.  Application of data encryption standard to bitmap and JPEG images , 2003, Proceedings of the Twentieth National Radio Science Conference (NRSC'2003) (IEEE Cat. No.03EX665).

[5]  Neri Merhav On Joint Coding for Watermarking and Encryption , 2005, Information Hiding.

[6]  Christoph Busch,et al.  Approaching optimal value expansion for reversible watermarking , 2005, MM&Sec '05.

[7]  R. Plackett,et al.  Karl Pearson and the Chi-squared Test , 1983 .

[8]  Arno J. van Leest,et al.  Reversible image watermarking , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[9]  Tian Jun,et al.  Reversible Watermarking by Difference Expansion , 2002 .

[10]  Martin Steinebach,et al.  Audio watermarking and partial encryption , 2005, IS&T/SPIE Electronic Imaging.

[11]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[12]  Jeho Nam,et al.  A Novel Difference Expansion Transform for Reversible Data Embedding , 2008, IEEE Transactions on Information Forensics and Security.

[13]  Alessandro Neri,et al.  A joint digital watermarking and encryption method , 2008, Electronic Imaging.

[14]  Joseph W. Goodman,et al.  A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..

[15]  Ton Kalker,et al.  Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.

[16]  Paul M. Chau,et al.  Image encryption for secure Internet multimedia applications , 2000, 2000 Digest of Technical Papers. International Conference on Consumer Electronics. Nineteenth in the Series (Cat. No.00CH37102).

[17]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[18]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[19]  Shipeng Li,et al.  Encryption and authentication for scalable multimedia: current state of the art and challenges , 2004, SPIE Optics East.

[20]  Christoph Busch,et al.  Integer DCT-based reversible watermarking for images using companding technique , 2004, IS&T/SPIE Electronic Imaging.

[21]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..

[22]  Bharat K. Bhargava,et al.  On the Design of Perceptual MPEG-Video Encryption Algorithms , 2005, IEEE Transactions on Circuits and Systems for Video Technology.