ArticlePDF Available

An Improved Reversible Data Hiding in Encrypted Images Using Side Match

Authors:
  • Nanfang College of Sun Yat-Sen University

Abstract and Figures

This letter proposes an improved version of Zhang's reversible data hiding method in encrypted images. The original work partitions an encrypted image into blocks, and each block carries one bit by flipping three LSBs of a set of pre-defined pixels. The data extraction and image recovery can be achieved by examining the block smoothness. Zhang's work did not fully exploit the pixels in calculating the smoothness of each block and did not consider the pixel correlations in the border of neighboring blocks. These two issues could reduce the correctness of data extraction. This letter adopts a better scheme for measuring the smoothness of blocks, and uses the side-match scheme to further decrease the error rate of extracted-bits. The experimental results reveal that the proposed method offers better performance over Zhang's work. For example, when the block size is set to 8 $\times$ 8, the error rate of the Lena image of the proposed method is 0. 34%, which is significantly lower than 1.21% of Zhang's work.
Content may be subject to copyright.
IEEE SIGNAL PROCESSING LETTERS, VOL. 19, NO. 4, APRIL 2012 199
An Improved Reversible Data Hiding in
Encrypted Images Using Side Match
Wien Hong, Tung-Shou Chen, and Han-Yan Wu
Abstract—This letter proposes an improved version of Zhang’s
reversible data hiding method in encrypted images. The original
work partitions an encrypted image into blocks, and each block
carries one bit by ipping three LSBs of a set of pre-dened pixels.
The data extraction and image recovery can be achieved by ex-
amining the block smoothness. Zhang’s work did not fully exploit
the pixels in calculating the smoothness of each block and did not
consider the pixel correlations in the border of neighboring blocks.
These two issues could reduce the correctness of data extraction.
This letter adopts a better scheme for measuring the smoothness
of blocks, and uses the side-match scheme to further decrease
the error rate of extracted-bits. The experimental results reveal
that the proposed method offers better performance over Zhang’s
work. For example, when the block size is set to 8 8, the error
rate of the Lena image of the proposed method is 0. 34%, which is
signicantly lower than 1.21% of Zhang’s work.
Index Terms—Encrypted image, reversible data hiding,
side-match.
I. INTRODUCTION
REVERSIBLE data hiding in images is a technique that
embeds data in digital images by altering the pixel values
for secret communication, and the embedded image can be re-
covered to its original state after the extraction of the secret data.
Many reversible data hiding methods have been proposed re-
cently [1]–[5]. [1] embeds data bits by expanding the difference
of two consecutive pixels. [2] uses a lossless compression tech-
nique to create extra spaces for carry data bits. [3] shifts the bins
of image histograms to leave an empty bin for data embedment.
[4] adopts the difference expansion and histogram shifting for
data embedment. [5] embeds data by shifting the histogram of
prediction errors while considering the local activity of pixels
to further enhance the quality of stego image.
Traditionally, data hiding is used for secret communication.
In some applications, the embedded carriers are further en-
crypted to prevent the carrier from being analyzed to reveal
the presence of the embedment [6]–[8]. Other applications
Manuscript received December 19, 2011; revised January 30, 2012; accepted
February 02, 2012. Date of publication February 10, 2012; date of current ver-
sion February 16, 2012. The associate editor coordinating the review of this
manuscript and approving it for publication was Prof. Yong Man Ro.
W. Hong and H.-Y. Wu are with the Department of Information Man-
agement, Yu Da University, Miaoli, Taiwan (e-mail: wienhong@ydu.edu.tw;
hanyan.wu0414@gmail.com).
T.-S. Chen is with the Department of Computer Science and Information En-
gineering, National Taichung University of Science and Technology, Taichung,
Taiwan (e-mail: tschen@nutc.edu.tw).
Color versions of one or more of the gures in this paper are available online
at http://ieeexplore.ieee.org.
Digital Object Identier 10.1109/LSP.2012.2187334
could be for when the owner of the carrier might not want
the other person, including data hider, to know the content of
the carrier before data hiding is actually performed, such as
military images or condential medical images. In this case, the
content owner has to encrypt the content before passing to the
data hider for data embedment. The receiver side can extract
the embedded message and recover the original image. For ex-
ample, [9] and [10] encrypt the cover image before embedding
is actually performed. In [9], the cover image is encrypted by
applying bitwise exclusive-or (XOR) operator to every bit of
pixels using an encryption key. Let be an 8-bit cover image
of size ,and be the pixel value at .Wedenote
the 8-bit binary digits of as ,where
(1)
To encrypt the cover image, a random sequence of size
is generated using an encryption key:
(2)
Perform a bitwise XOR on the binary digits of and , we obtain
(3)
where is the XOR operation and . Convert
back to its decimal representation, we
obtain the encrypted image .
To embed data, [9] partitions the stego image into
nonoverlapping blocks of size , and each block is capable
of carry one bit. Let be the block at position of the
partitioned blocks. According to a data-hiding key, data hider
randomly and evenly classies pixels in each block into sets
and . If the bit to be embedded in this block is “0”, ip3LSBs
of pixels in set .Lettheipped results be ,where
(4)
On the contrary, if the bit to be embedded is “1,” ip 3 LSBs of
pixels in set and the ipped result is
(5)
In (4) and (5), denotes the bit-ipping result of .and
represent the -th LSB of pixels at position in
blocks and , respectively. Repeat this process until
all the data bits are embedded. The embedded and encrypted
image is dened as .
1070-9908/$31.00 © 2012 IEEE
Authorized licensed use limited to: National Chiao Tung Univ.. Downloaded on April 23,2020 at 07:12:06 UTC from IEEE Xplore. Restrictions apply.
200 IEEE SIGNAL PROCESSING LETTERS, VOL. 19, NO. 4, APRIL 2012
Fig. 1. Four test images. (a) Lena. (b) Baboon. (c) Sailboat. (d) Splash.
To extract the embedded data bits, the random sequence is
generated using the encryption key, and [9] calculates the XOR
of and the binary digits of to decrypt the image. The ve
MSBs of each pixel of the decrypted image will be identical
to those of the cover image. According to the data-hiding key,
pixels in sets and of each blocks are obtained. For block
,ip three LSBs of pixels in set and calculate the XOR
of the resultant bit stream and , we obtain a block .Sim-
ilarly, ip three LSBs of pixels of set and calculate the XOR
of the resultant bit stream and , we obtain a block .Ei-
ther or is identical to the original block ,
and the other one will be the block with three LSBs of
every pixels ipped. Because the pixels are de-correlated in the
ipped blocks, the original blocks often exhibit smoother than
those of ipped blocks. By comparing the smoothness of these
two blocks, the embedded bits can be extracted. [9] uses (6) to
calculate the smoothness of blocks and :
(6)
where denotes the pixel value at position ,is the
absolute value of . Let the calculated smoothness of and
be and , respectively. If ,abit
“0” is extracted, and is the original block. Otherwise, a
bit “1” is extracted, and is the original block.
In [9], the border pixels of blocks are not included in the
process of smooth calculation. Moreover, the correlations
between blocks are also ignored in data extraction. However,
these two facts could be exploited to enhance the correctness of
data extraction. This letter proposes a new smooth-evaluation
function that fully exploits the pixels in blocks for evaluating
the pixel uctuations in images. A side-match mechanism is
also introduced to evaluate the smoothness of those ambiguous
blocks, where the absolute difference between and
are smaller than a predened threshold. With these sophisti-
cated approaches, the correctness of data extraction will be
further increased.
II. PROPOSED METHOD
In [9], the evaluation of block smoothness is crucial for ob-
taining a correct data extraction. However, the four borders of
each block do not join the calculation of block smoothness. This
may decrease the rate of correctness of data extraction, espe-
cially when the block size is small. For example, for a block of
size 8 8, there are 64 pixels and around 43.75% of them (28
pixels) are located in the four borders. These border pixels are
not employed to calculate the block smoothness, and the per-
centage is increased as the block size decreased. Besides, [9]
Fig. 2. (a) Decrypted image using content owner’s key. (b) Blocks of incorrect
recovery of Zhang’s method. (c) Blocks of incorrect recovery of the proposed
method.
extracts the embedded bits by evaluating the smoothness of a
single block. However, ipping 3 LSBs of these complex blocks
will not cause a signicant increase in complexness. Based on
these observations, this letter proposes an improved version for
a better estimation of block smoothness. In the new smoothness
estimation, the summation of the absolute of two neighboring
pixels is employed. Moreover, the extraction and recovery are
performed starting from the most noticeable changes in smooth-
ness to the least ones. Besides, we also adopt the side-match
technique to evaluate the block smoothness by concatenating
the border of recovered blocks to the unrecovered blocks. The
data encryption and data embedding process is the same as [9].
Therefore, we address only the calculation of smoothness and
the process of image recovery.
A. Calculation of Block Smoothness
The smoothness of an image block can be evaluated by calcu-
lating the absolute difference of neighboring pixels. The larger
the summation of absolute differences, the more complex the
image blocks is. Therefore, we estimate the block smoothness
by calculating the summation of the vertical absolute differ-
ences and horizontal absolute differences of pixels in image
blocks using the following equation:
(7)
Authorized licensed use limited to: National Chiao Tung Univ.. Downloaded on April 23,2020 at 07:12:06 UTC from IEEE Xplore. Restrictions apply.
HONG et al.:ANIMPROVEDREVERSIBLEDATAHIDINGINENCRYPTEDIMAGESUSINGSIDEMATCH 201
Fig. 3. The error rate comparison. (a) Lena. (b) Baboon. (c) Sailboat. (d) Splash.
were represents the pixel values located at position of
a given image block of size . Equation (7) fully exploits
the absolute difference between two consecutive pixels in both
vertical and horizontal directions and thus, the smoothness of
blocks can be better estimated.
B. Data Extraction and Image Recovery Using Side Match
Let the cover image be and the encrypted image with mes-
sages embedded be . Firstly, a random sequence is generated
using the encryption key. The XOR of the 5 MSBs of and
are calculated to recover the ve MSBs of the cover image.
According to the data hiding key, the pixels in sets and
of block are obtained. Flip the three LSBs of pixels in
set , and calculate the XOR of the resultant bit string and
, we obtain . Similarly, ip the three LSBs of pixels in
set , and calculate the XOR of the resultant bit string and
, we obtained . Equation (7) is then applied to evaluate
the smoothness of and , and to obtain the evaluated
results and , respectively. The difference be-
tween and is obtained by the following equation
(8)
Alarger indicates that is more dissimilar to
, which implies that the block becomes more
complex after ipping three LSBs. Therefore, we calculate
for all blocks, and sort in descending order. The
data extraction and image recovery of blocks is then preformed
using the sorted order of .
Because border pixels between blocks are highly correlated,
the border pixels between two unipped blocks are smoother
than those ipped blocks. Therefore, we adopt the side match
technique to concatenate the borders of the recovered blocks
to the unrecovered blocks, and perform the smoothness evalu-
ation of the concatenated blocks. To do this, let be the
block to be recovered and , , ,and
be the neighboring blocks of . If none of the
neighboring blocks of are recovered, then the data ex-
traction and block recovery can be done using the sign of .
That is, if , a bit “0” is extracted and is the orig-
inal image block. Otherwise, a bit “1” is extracted and is
the original image block. If the any of the neighboring blocks of
is already recovered, then concatenates the border pixels
of the recovered blocks to and to obtain the con-
catenated blocks and , respectively. Let and
be the smoothness values of and using (7).
If , a bit “0” is extracted and is the original
block. Otherwise, a bit “1” is extracted and is the original
block.
III. EXPERIMENTAL RESULTS
We used four graylevel images of size 512 512, including
Lena, Baboon, Sailboat, and Splash as the test images, as shown
in Fig. 1. These images can be obtained from USC-SIPI image
database [11]. The experimental results are compared with [9].
To demonstrate the performance of the proposed method, we
take Lena image as an example. Fig. 2(a) shows the decrypted
Lena image with 5 MSBs recovered (suppose the block size is 8
8). Figs. 2(b) and (c) show the recovery results using [9] and
the proposed method, respectively, where the incorrect recov-
ered blocks are marked by white. Note that most of the incorrect
recovered blocks are sparsely distributed over the complex re-
gions of the Lena image. Comparing Figs. 2(b) and (c), we see
that the proposed method recovers the image blocks more accu-
rate than that of [9]. Although the experiments were based on
Lena image, experiments on other test images also showed the
Authorized licensed use limited to: National Chiao Tung Univ.. Downloaded on April 23,2020 at 07:12:06 UTC from IEEE Xplore. Restrictions apply.
202 IEEE SIGNAL PROCESSING LETTERS, VOL. 19, NO. 4, APRIL 2012
similar results, which indicates that the proposed method offers
a better performance for data extraction and image recovery.
Fig. 3 plots the block size versus extraction error rate of the
proposed method and [9]. The error rates are calculated by di-
viding the number of total blocks by the number of incorrectly
recovered blocks. Fig. 3 reveals that the proposed method of-
fers lower error rates than that of [9]. For example, for the Lena
image at block size 8 8, the error rate of the proposed method
is 0.34% whereas the error rate of [9] is 1.21%, which is approx-
imately four times less than that of [9]. For the complex image,
such as Baboon, the error rate of [9] at block size 8 8is1.6
times higher than that of the proposed method. Note that, for the
Splash image, the error rate of the proposed method is 0 at block
size 8 8, however, [9] has to choose a block size of 16 16
to achieve a zero error rate.
IV. CONCLUSIONS
This letter proposes improved data extraction and image re-
covery strategies based on Zhang’s work. We used a new algo-
rithm to better estimate the smoothness of image blocks. The ex-
traction and recovery of blocks are performed according to the
descending order of the absolute smoothness difference between
two candidate blocks. The side match technique is employed to
further reduce the error rate. The experimental results show that
the propose method effectively improves Zhang’s method, es-
pecially when the block size is small.
REFERENCES
[1] J. Tian, “Reversible data embedding using a difference expansion,”
IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896,
2003.
[2] M.U.Celik,G.Sharma,A.M.Tekalp,andE.Saber,“Losslessgen-
eralized-LSB data embedding,” IEEE Trans. Image Process.,vol.14,
no. 2, pp. 253–266, 2005.
[3] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE
Trans. Circuits Syst. Video Technol., vol. 16, no. 8, pp. 354–362, 2006.
[4] D. M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for
reversible watermarking,” IEEE Trans. Image Process.,vol.16,no.3,
pp. 721–730, 2007.
[5] W. Hong and T. S. Chen, “Reversible data embedding for high quality
images using interpolation and reference pixel distribution mecha-
nism,” J. Vis. Commun. Image Represent., vol. 22, no. 2, pp. 131–140,
2011.
[6] D. Kundur and K. Karthik, “Videongerp rinting and encryption princi-
ples for digital rights management,” Proc. IEEE, vol. 92, pp. 918–932,
2004.
[7] S. Lian, Z. Liu, Z. Ren, and H. Wang, “Commutative encryption and
watermarking in video compression,” IEEE Trans. Circuits Syst. Video
Technol., vol. 17, no. 6, pp. 774–778, 2007.
[8] M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. Natale, and
A. Neri, “A commutative digital image watermarking and encryption
method in the tree structured haar transform domain,” Signal Process.:
Image Commun., vol. 26, no. 1, pp. 1–12, 2011.
[9] X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal
Process. Lett., vol. 18, no. 4, pp. 255–258, 2011.
[10] X. Zhang, “Separable reversible data hiding in encry pted image,” IEEE
Trans. Inf. Forensics Security, 10.1109/TIFS.2011.2176120.
[11] Image database [Online]. Available: http://sipi.use.edu/database/
Authorized licensed use limited to: National Chiao Tung Univ.. Downloaded on April 23,2020 at 07:12:06 UTC from IEEE Xplore. Restrictions apply.
... The initial image, which is built on a VRAE framework, was immediately encrypted using conventional image encryption algorithms such stream cipher and the advanced encryption standard (AES) in the early Data Concealment approaches [20], [21], [22], [23], [24], and [25]. The encrypted image in [20] is split up into many chunks. ...
... The original image is simultaneously recovered and secret bits are extracted at the receiver side by using the fluctuation function after the marked image has been directly decrypted. Since then, some advancements in data extraction accuracy have been realized [21], [22]. Since then, some advancements in data extraction accuracy have been realized [21], [22]. ...
... Since then, some advancements in data extraction accuracy have been realized [21], [22]. Since then, some advancements in data extraction accuracy have been realized [21], [22]. Data extraction is not possible in [20], [21], and [22] when the encryption key is not provided. ...
Article
Data security techniques, notably concealment of information in encrypted images, play a pivotal role in safeguarding digital assets. Nonetheless, many methods in this domain face challenges in effectively balancing security and embedding capacity. To tackle this issue, we propose a novel approach integrating hybrid coding and Chinese remainder theorem-based secret sharing (CRTSS). Our method employs hybrid coding for concealing data within images, ensuring a robust embedding capacity. Initially, an iterative encryption process encrypts blocks while preserving their spatial correlation. CRTSS is then utilized to distribute these encrypted blocks across multiple shares, ensuring robust security. Leveraging the high geographical correlation within each share, data embedding is performed using the hybrid coding technique, effectively increasing capacity. The proposed method allows for the restoration of the original image without loss, even if some shares are corrupted or missing, as long as enough uncorrupted shares are available. Experimental results indicate superior embedding capacity compared to state-of-the-art techniques, including those relying on secret sharing. We present four variations of the proposed model, comprising two coupled and two separable cases, leading to a high-capacity concealment approach. The efficacy of our approach is demonstrated through experimental validation.
... Sensitive images, for example, forensic images, medical images, astronomical images, etc., have far less redundancy compared to normal images [2]. Similarly, private information falls into the category of sensitive or critical datasets because it holds high-intensity information, like medical diagnosis or forensic analysis [3]. ...
... This work focuses primarily on the additional data-hiding process into encrypted images [17]. The additional data hiding serves not only as a privacy-preserving technique but also helps provide an additional level of security to the sensitive cover image [3]. In this section, some RDH schemes are reviewed and later compared with the proposed method. ...
... In 2012, Hong [3] improved Zhang's proposal [2] by introducing the concept of side-matching. While the image encryption and data hiding processes remain unchanged, Hong's method enhances data extraction and image recovery. ...
... However, as far creating the room inside the image is concerned, there are majorly two categories namely, Vacating room after encryption (VRAE) and Reserved room before encryption (RRBE). The VRAE techniques [7][8][9][10][11][12][13][14] usually create a room for embedding the secret information after the image encryption. In other words, VRAE does not demand the image owner to pre-process his/her original image for creating space for data immersion. ...
... To comprehensively evaluate the performance of the proposed LCD-RDHEI method against some of the notable and recently developed existing methods such as the works of Fu et al.[32], Gao et al.[31], Liu et al.[30], Qin et al.[29], Li et al.[28], Gao et al.[27], Wang et al.[26], Xiao et al.[25], Yin et al.[23], Shiu et al.[22], Puteaux et al.[11], Cao et al.[9], Zang et al.[8] and Ma et al. ...
Article
Full-text available
In the last decade, data hiding in encrypted image has got a lot of attention within the security and privacy researcher’s communities. This attention has led to the development of various reversible data hiding techniques for encrypted images (RDHEI) which enables separable lossless recovery of cover media and extraction of the secret message, at the receiving end. In this paper, a link chain driven (LCD) RDHEI algorithm for providing high embedding capacity, is proposed. The LCD-RDHEI exploits neighbourhood similarity of image pixels and clubs them in variable size link chains. The pixels in each link chain are estimated either by their average or using two quantization values based on the size of link chains. This helps in reserving a big room inside the image which can be used to fill in the secret information. Additionally, the pixels which are not part of any of the link chains are also utilized for embedding the secret information by adaptive multi MSB prediction and Huffman Coding method. Experimental results show that the LCD-RDHEI provides significantly greater embedding capacity than the existing and related modern data hiding method for encrypted images.
... The accuracy of extraction and recovery depends on the value of s, and only s is not less than 32, all embedded bits can be extracted correctly and the original image can be recovered successfully. Later, Hong et al. [14] and Qin et al. [29] improved the calculation way of block smoothness degree for a more precise extraction and recovery process. Zang [50] and Wu et al. [41] use the same encryption as the three methods above, but the data embedding algorithm is different. ...
... It should be noted that after the conversion (14), most e i, j errors are stored in a space of fewer than 8 bits. Therefore, the error image E contains a lot of zero-valued bits. ...
Article
Full-text available
Reversible data hiding in encrypted images (RDH–EI) has increasingly attracted the attention of many researchers because it can protect the content of both images and data. Although some RDH–EI methods with high embedding capacity exist, improving this capacity using more accurate predictors and better compression remains a potential research direction. This paper proposes an optimal linear predictor with a six-pixel context, better than mean edge detection (M E D) and other predictors used in related methods to generate a prediction error image from an original image. Next, the bit planes of the error image are compressed using the arithmetical algorithm to create an image recovery bit sequence with a length of less than the size in bits of the image, so a vacated bit sequence is obtained. The recovery bit sequence is encrypted using a stream cipher, and the secret data bits are encrypted and inserted into the vacated bit sequence. As a result, we get an intermediate bit sequence, which is finally converted into an embedded and encrypted image. Using an optimal linear predictor and arithmetical algorithm increased the embedding capacity of the proposed method. After pre-processing, encryption, and data hiding, the image is significantly modified, so the degree of security of the proposed method is very high. Experimental results show that the proposed method has a superior embedding capacity than related methods. Additionally, data extraction and image restoration can be performed separately.
... Based on different encryption orders, RDHEI schemes are categorized into two groups: (1) vacate the redundant space after encryption (VRAE) [14][15][16][17][18][19][20][21][22][23], and (2) reserve the redundant space before encryption (RRBE) [24][25][26][27][28][29][30][31]. In VRAE, redundant space is created within an encrypted image to conceal confidential data. ...
... However, this scheme encountered errors during the extraction and decryption. Hong et al. [15] implemented a side matching to reduce the error rate of Zhang's scheme. Liu et al. [17] proposed an RDHEI scheme based on sparse matrix compression, utilizing Arnold permutation to sparsely encode image blocks and transfer redundant room from the cover image to encrypted image. ...
Article
Full-text available
As cloud storage and multimedia communication continue to evolve, the preservation of image privacy is becoming increasingly important. Reversible data hiding in encrypted images (RDHEI) is an effective method for enhancing the protection of personal privacy. To improve the embedding capacity, this paper introduces a novel scheme for RDHEI using block-based bit-plane reallocation. First, an effective optimized prediction method is utilized to predict the value of each pixel, followed by the calculation of prediction errors (PEs). Then, block-based bit-planes of PEs are extracted, and ten different bit-plane types are categorized to facilitate bit-plane reallocation, thereby freeing up redundant space. Finally, an adaptive encryption procedure is employed to encrypt the reallocated bit-plane, excluding the flag-bits. Experimental results demonstrate that the proposed scheme achieves average embedding rates (ER) of 3.584 bpp, 3.501 bpp, and 2.985 bpp on the three experimental datasets, all of which are higher than those of other state-of-the-art RDHEI schemes while ensuring both reversibility and security.
... However, data extraction and image recovery will result in errors since the fluctuation does not work when the block size is small. To reduce the errors, Hong et al. [24] designed a side match mechanism to measure the fluctuation. In [25], the locations of different pixels in each block are considered to elaborate a more efficient fluctuation so that the error rate is reduced. ...
Article
Full-text available
Reversible data hiding in encrypted images (RDHEI) is an effective technology of protecting private data. In this paper, a high-capacity RDHEI method with asymmetric coding and bit-plane block compression is proposed. Our major contributions are twofold. (1) We propose an asymmetric coding technique for processing prediction error (PE) blocks before encryption. The proposed asymmetric coding technique does not generate the sign bit-plane and facilitates massive 0s converging on the high bit-planes. This is beneficial to reserve the embedding room. (2) We present a bit-plane block compression technique for improving the embedding capacity. This technique divides the PE codes in a block into two parts which are both compressed and thus contribute a large embedding room. Experimental results demonstrate that the average embedding rates of the proposed method are 4.156, 4.063 and 3.450 bpp on the BOSSBase, BOWS-2 and UCID datasets, respectively. Comparisons show that our average embedding rates on the three datasets are all bigger than those of some state-of-the-art methods.
... The receiver realizes the information extraction and image reconstruction by comparing the block wave function value. In order to reduce the Bit Error Rate(BER) of the information extraction and image reconstruction, Hong et al. designed a new block wave function and proposed edge matching technology [10]. Liao et al. used different block wave functions on different texture blocks to further reduce the BER [11]. ...
... Wien Hong et .al in [3] "An improved reversible data hiding in encrypted images using side match" proposes a system where image is encrypted by using XOR operator to each bit with a key. The encrypted image is grouped as chunks and each chunk embed one bit. ...
Conference Paper
Full-text available
There are various techniques to transfer secret data from a source to destination. Data hiding is one of the effective means of communication. Data hiding is a technique of hide data into some media such as image, video, audio etc. This method is steganography. By this technique, the security of secret data increases and the authorized receiver can perfectly extract the data. Encryption is another way for secure transmission. Encryption is a technique of convert data into unreadable cipher text format. There exists many methods that combines encryption and data hiding. Some techniques causes distortion to image while embedding and some other technique can embed small amount of data. The different methods for data hiding are described in this paper.
Article
Full-text available
The reversible data hiding scheme in the encrypted domain is a potential solution to the concerns regarding user privacy in cloud applications. The 3D mesh model is an emerging file format and is widely used in engineering modeling, special effects, and video games. However, studies on reversible data hiding in encrypted 3D mesh models are still in the preliminary stage. In this paper, two novel techniques, multi-group partition (MGP) and closest pair prediction (CPP), are proposed to improve performance. The MGP technique adaptively classifies vertices into reference and embeddable vertices, while the CPP technique efficiently predicts embeddable vertices and generates shorter recovery information to vacate more redundancy for additional data embedding. Experimental results indicate that the proposed scheme significantly improves the embedding rate compared to state-of-the-art schemes and can be used in real-time applications.
Article
Full-text available
A novel reversible data hiding algorithm, which can recover the original image without any distortion from the marked image after the hidden data have been extracted, is presented in this paper. This algorithm utilizes the zero or the minimum points of the histogram of an image and slightly modifies the pixel grayscale values to embed data into the image. It can embed more data than many of the existing reversible data hiding algorithms. It is proved analytically and shown experimentally that the peak signal-to-noise ratio (PSNR) of the marked image generated by this method versus the original image is guaranteed to be above 48 dB. This lower bound of PSNR is much higher than that of all reversible data hiding techniques reported in the literature. The computational complexity of our proposed technique is low and the execution time is short. The algorithm has been successfully applied to a wide range of images, including commonly used images, medical images, texture images, aerial images and all of the 1096 images in CorelDraw database. Experimental results and performance comparison with other reversible data hiding schemes are presented to demonstrate the validity of the proposed algorithm.
Article
Full-text available
We present a novel lossless (reversible) data-embedding technique, which enables the exact recovery of the original host signal upon extraction of the embedded information. A generalization of the well-known least significant bit (LSB) modification is proposed as the data-embedding method, which introduces additional operating points on the capacity-distortion curve. Lossless recovery of the original is achieved by compressing portions of the signal that are susceptible to embedding distortion and transmitting these compressed descriptions as a part of the embedded payload. A prediction-based conditional entropy coder which utilizes unaltered portions of the host signal as side-information improves the compression efficiency and, thus, the lossless data-embedding capacity.
Article
With the popularity of outsourcing data to the cloud, it is vital to protect the privacy of data and enable the cloud server to easily manage the data at the same time. Under such demands, reversible data hiding in encrypted images (RDH-EI) attracts more and more researchers' attention. In this paper, we propose a novel framework for RDH-EI based on reversible image transformation (RIT). Different from all previous encryption-based frameworks, in which the ciphertexts may attract the notation of the curious cloud, RIT-based framework allows the user to transform the content of original image into the content of another target image with the same size. The transformed image, that looks like the target image, is used as the "encrypted image," and is outsourced to the cloud. Therefore, the cloud server can easily embed data into the "encrypted image" by any RDH methods for plaintext images. And thus a client-free scheme for RDH-EI can be realized, that is, the data-embedding process executed by the cloud server is irrelevant with the processes of both encryption and decryption. Two RDH methods, including traditional RDH scheme and unified embedding and scrambling scheme, are adopted to embed watermark in the encrypted image, which can satisfy different needs on image quality and large embedding capacity, respectively.
Article
This work proposes a novel scheme for separable reversible data hiding in encrypted images. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data. With an encrypted image containing additional data, if a receiver has the data-hiding key, he can extract the additional data though he does not know the image content. If the receiver has the encryption key, he can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data-hiding key and the encryption key, he can extract the additional data and recover the original content without any error by exploiting the spatial correlation in natural image when the amount of additional data is not too large.
Article
A novel reversible data hiding algorithm, which can recover the original image without any distortion from the marked image after the hidden data have been extracted, is presented in this paper. This algorithm utilizes the zero or the minimum points of the histogram of an image and slightly modifies the pixel grayscale values to embed data into the image. It can embed more data than many of the existing reversible data hiding algorithms. It is proved analytically and shown experimentally that the peak signal-to-noise ratio (PSNR) of the marked image generated by this method versus the original image is guaranteed to be above 48 dB. This lower bound of PSNR is much higher than that of all reversible data hiding techniques reported in the literature. The computational complexity of our proposed technique is low and the execution time is short. The algorithm has been successfully applied to a wide range of images, including commonly used images, medical images, texture images, aerial images and all of the 1096 images in CorelDraw database. Experimental results and performance comparison with other reversible data hiding schemes are presented to demonstrate the validity of the proposed algorithm.
Article
This work proposes a novel reversible data hiding scheme for encrypted image. After encrypting the entire data of an uncompressed image by a stream cipher, the additional data can be embedded into the image by modifying a small proportion of encrypted data. With an encrypted image containing additional data, one may firstly decrypt it using the encryption key, and the decrypted version is similar to the original image. According to the data-hiding key, with the aid of spatial correlation in natural image, the embedded data can be successfully extracted and the original image can be perfectly recovered.
Article
In this paper a commutative watermarking and ciphering scheme for digital images is presented. The commutative property of the proposed method allows to cipher a watermarked image without interfering with the embedded signal or to watermark an encrypted image still allowing a perfect deciphering. Both operations are performed on a parametric transform domain: the Tree Structured Haar transform. The key dependence of the adopted transform domain increases the security of the overall system. In fact, without the knowledge of the generating key it is not possible to extract any useful information from the ciphered-watermarked image. Experimental results show the effectiveness of the proposed scheme.
Article
This paper proposes a reversible data hiding method based on image interpolation and the detection of smooth and complex regions in the cover images. A binary image that represents the locations of reference pixels is constructed according the local image activity. In complex regions, more reference pixels are chosen and, thus, fewer pixels are used for embedding, which reduces the image degradation. On the other hand, in smooth regions, less reference pixels are chosen, which increases the embedding capacity without introducing significant distortion. Pixels are interpolated according to the constructed binary image, and the interpolation errors are then used to embed data through histogram shifting. The pixel values in the cover image are modified one grayscale unit at most to ensure that a high quality stego image can be produced. The experimental results show that the proposed method provides better image quality and embedding capacity compared with prior works.
Article
Reversible watermarking enables the embedding of useful information in a host signal without any loss of host information. Tian's difference-expansion technique is a high-capacity, reversible method for data embedding. However, the method suffers from undesirable distortion at low embedding capacities and lack of capacity control due to the need for embedding a location map. We propose a histogram shifting technique as an alternative to embedding the location map. The proposed technique improves the distortion performance at low embedding capacities and mitigates the capacity control problem. We also propose a reversible data-embedding technique called prediction-error expansion. This new technique better exploits the correlation inherent in the neighborhood of a pixel than the difference-expansion scheme. Prediction-error expansion and histogram shifting combine to form an effective method for data embedding. The experimental results for many standard test images show that prediction-error expansion doubles the maximum embedding capacity when compared to difference expansion. There is also a significant improvement in the quality of the watermarked image, especially at moderate embedding capacities