High capacity reversible data hiding in encrypted images using SIBRW and GCC

Abstract In this paper, a reversible data hiding in encrypted images (RDHEI) method combining GCC (group classification encoding) and SIBRW containing sixteen image-based rearrangement ways is proposed to achieve high-capacity data embedding in encrypted images. Each way of SIBRW aims at bringing strongly-correlated bits of each higher bit-plane together by rearranging each higher bit-plane. For each higher bit-plane, the optimal way achieving the most concentrated aggregation performance is selected from SIBRW to rearrange this bit-plane, and then, GCC compresses the rearranged bit-plane in group-by-group manner. By making full use of strong-correlation between adjacent groups, GCC can compress not only consecutive several groups whose bits are valued 1 (or 0) but also a single group so that a large embedding space is provided. The encryption method including the bit-level XOR-encryption and scrambling operations enhances the security. The experimental results show that the proposed scheme can achieve large embedding capacity and high security.

[1]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[2]  Yao Zhao,et al.  Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs , 2008, IEEE Signal Processing Letters.

[3]  Yao Zhao,et al.  Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[4]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[5]  Chin-Chen Chang,et al.  High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement , 2019, J. Vis. Commun. Image Represent..

[6]  Weiming Zhang,et al.  Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.

[7]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[8]  Jeng-Shyang Pan,et al.  Reversible data hiding based on flexible block-partition and adaptive block-modification strategy , 2016, J. Vis. Commun. Image Represent..

[9]  Marc Chaumont,et al.  A reversible data hiding method for encrypted images , 2008, Electronic Imaging.

[10]  Gwoboa Horng,et al.  Encrypted signal-based reversible data hiding with public key cryptosystem , 2014, J. Vis. Commun. Image Represent..

[11]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[12]  Yicong Zhou,et al.  Binary-block embedding for reversible data hiding in encrypted images , 2017, Signal Process..

[13]  Tung-Shou Chen,et al.  An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.

[14]  Shaowei Weng,et al.  Dynamic improved pixel value ordering reversible data hiding , 2019, Inf. Sci..

[15]  Bin Ma,et al.  A Reversible Data Hiding Scheme Based on Code Division Multiplexing , 2016, IEEE Transactions on Information Forensics and Security.

[16]  Chi-Man Pun,et al.  Reversible data-hiding in encrypted images by redundant space transfer , 2018, Inf. Sci..

[17]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[18]  Shaowei Weng,et al.  Integer transform based reversible watermarking incorporating block selection , 2016, J. Vis. Commun. Image Represent..

[19]  Dengguo Feng,et al.  Study on Cloud Computing Security: Study on Cloud Computing Security , 2011 .

[20]  Yicong Zhou,et al.  Image encryption using binary bitplane , 2014, Signal Process..

[21]  Zhang Min,et al.  Study on Cloud Computing Security , 2011 .

[22]  Nien-Lin Hsueh,et al.  A lossless data hiding scheme based on three-pixel block differences , 2008, Pattern Recognit..

[23]  Jessica J. Fridrich,et al.  Lossless data embedding for all image formats , 2002, IS&T/SPIE Electronic Imaging.

[24]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[25]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[26]  Wei Su,et al.  Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[27]  Xinpeng Zhang,et al.  An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer , 2019, Inf. Sci..

[28]  Tieyong Zeng,et al.  Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.

[29]  Jean-Francois Delaigle,et al.  Invisibility and application functionalities in perceptual watermarking an overview , 2002, Proc. IEEE.

[30]  Shaowei Weng,et al.  Reversible data hiding based on an adaptive pixel-embedding strategy and two-layer embedding , 2016, Inf. Sci..

[31]  Jeng-Shyang Pan,et al.  Optimal PPVO-based reversible data hiding , 2017, J. Vis. Commun. Image Represent..

[32]  Weiming Zhang,et al.  Efficient Reversible Data Hiding Based on Multiple Histograms Modification , 2015, IEEE Transactions on Information Forensics and Security.

[33]  Di Xiao,et al.  Reversible data hiding in encrypted images using cross division and additive homomorphism , 2015, Signal Process. Image Commun..

[34]  Shijun Xiang,et al.  Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[35]  Xingyuan Wang,et al.  Image Description With Polar Harmonic Fourier Moments , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[36]  Wei Zhang,et al.  Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection , 2018, Signal Process..

[37]  Weiming Zhang,et al.  Reversibility improved data hiding in encrypted images , 2014, Signal Process..