Real-time reversible data hiding in encrypted images based on hybrid embedding mechanism

In this paper, we propose a novel real-time scheme of separable reversible data hiding in encrypted images, which consists of image encryption, data embedding, data extraction and image recovery. In image encryption phase, the content owner divides the original image into a number of non-overlapping blocks and encrypts blocks by stream cipher and permutation. During the data embedding phase, the data hider classifies encrypted blocks into smooth region and complex region according to the threshold and replaces the MSB layer of a part of pixels in blocks of smooth region with the secret data. Then, the LSB layers of other pixels are collected and compressed to generate a room for embedding the secret data again. When the receiver receives the marked image, he can divide the marked image into blocks and decrypt them by the encryption key to obtain a similar image with good quality. If the receiver only has the data hiding key, he can classify the blocks into smooth region and complex region according to the threshold and extract the embedded data by the data hiding key. If the receiver has both encryption key and data hiding key, he can extract the embedded data from the marked image and recover the original image perfectly. The proposed scheme can achieve satisfactory quality of decrypted image and high embedding rate. Experimental results demonstrate the effectiveness and computational efficiency of our scheme.

[1]  Zhenjun Tang,et al.  Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels' coordinates with minimum distortion , 2017, Signal Process..

[2]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[3]  Yao Zhao,et al.  Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[4]  Xinpeng Zhang,et al.  Perceptual image hashing via dual-cross pattern encoding and salient structure detection , 2018, Inf. Sci..

[5]  Chin-Chen Chang,et al.  Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery , 2018, IEEE MultiMedia.

[6]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted Images Based on Progressive Recovery , 2016, IEEE Signal Processing Letters.

[7]  Jun Yu,et al.  Capacity Limits of Pseudorandom Channels in Deception Problems , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Chin-Chen Chang,et al.  A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting , 2014, IEEE Transactions on Image Processing.

[9]  Zhenxing Qian,et al.  Efficient reversible data hiding in encrypted images , 2014, J. Vis. Commun. Image Represent..

[10]  Xinpeng Zhang,et al.  Effective reversible data hiding in encrypted image with privacy protection for image content , 2015, J. Vis. Commun. Image Represent..

[11]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[12]  Chin-Chen Chang,et al.  An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism , 2013, IEEE Transactions on Circuits and Systems for Video Technology.

[13]  Weiming Zhang,et al.  Efficient Reversible Data Hiding Based on Multiple Histograms Modification , 2015, IEEE Transactions on Information Forensics and Security.

[14]  Xin Liao,et al.  Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels , 2015, J. Vis. Commun. Image Represent..

[15]  Chin-Chen Chang,et al.  Reversible data hiding scheme based on exploiting modification direction with two steganographic images , 2014, Multimedia Tools and Applications.

[16]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted Images With Distributed Source Encoding , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[17]  Xinpeng Zhang,et al.  Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy , 2017, Signal Process..

[18]  Xingming Sun,et al.  A novel image hashing scheme with perceptual robustness using block truncation coding , 2016, Inf. Sci..

[19]  Xiaolong Li,et al.  A new lossy compression scheme for encrypted gray-scale images , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[20]  Weiming Zhang,et al.  Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes , 2016, Multimedia Tools and Applications.

[21]  Tung-Shou Chen,et al.  An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.

[22]  Chuan Qin,et al.  Guided filtering based color image reversible data hiding , 2017, J. Vis. Commun. Image Represent..

[23]  Xiangyang Luo,et al.  Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[24]  Wenjun Zeng,et al.  Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.

[25]  William Puech,et al.  High-capacity data hiding in encrypted images using MSB prediction , 2016, 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA).

[26]  Mauro Barni,et al.  On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.

[27]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[28]  Weiming Zhang,et al.  On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..

[29]  Bin Li,et al.  General Framework to Histogram-Shifting-Based Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.