Advertisement

Wuhan University Journal of Natural Sciences

, Volume 24, Issue 5, pp 383–390 | Cite as

A Reversible Data Hiding with Quality Controllable Scheme for Encrypted-Compressed Image

  • Xinyan Li
  • Huajian MouEmail author
  • Bing Yan
  • Li Gao
Computer Science
  • 4 Downloads

Abstract

In order to achieve image encryption and data embedding simultaneously, a reversible data hiding (RDH) algorithm for encrypted-compressed image in wavelet domain is proposed. This scheme employs the quality controllable parameter. Moreover it has larger embedding capacity and smaller quality control parameters than other methods in literatures. Meanwhile, the cross chaotic map is employed to generate chaotic sequences, and the total keys of the algorithm is far large. Experimental results and comparisons show that the proposed scheme has large capacity, high security, and strong resistance to brute-force.

Key words

reversible data hiding in encrypted image cross chaotic map diffuse and scramble encryption-compression 

CLC number

TP 309 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Fridrich J. Image encryption based on chaotic maps [C]// IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation. Piscataway: IEEE, 1997: 1105–1110.Google Scholar
  2. [2]
    Karim A, Mustafa S, Wong K. Universal data embedding in encrypted domain [J]. Signal Processing, 2014, 94: 174–182.CrossRefGoogle Scholar
  3. [3]
    Ma K, Zhang W, Zhao X, et al. Reversible data hiding in encrypted images by reserving room before encryption [J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3): 553–562.CrossRefGoogle Scholar
  4. [4]
    Xiao D, Chen S. Separable data hiding in encrypted image based on compressive sensing [J]. Electronics Letters, 2014, 50(8): 598–600.CrossRefGoogle Scholar
  5. [5]
    Xiang S J, Lou X R. Reversible data hiding in encrypted image based on homomorphic public key cryptosystem [J]. Journal of Software, 2016, 27(6): 1592–1601.Google Scholar
  6. [6]
    Chen Y C, Shiu C W. Encrypted signal-based reversible data hiding with public key cryptosystem [J]. Journal of Visual Communication and Image Representation, 2014, 25(5): 1164–1170.CrossRefGoogle Scholar
  7. [7]
    Li M, Xiao D, Zhang Y S, et al. Reversible data hiding in encrypted images using cross division and additive homomorphism [J]. Signal Processing: Image Communication, 2015, 39: 234–248.Google Scholar
  8. [8]
    Qian Z X, Zhang X P, Wan S Z. Reversible data hiding in encrypted JPEG bitstream [J]. IEEE Transactions on Multimedia, 2014, 16(5): 1486–1491.CrossRefGoogle Scholar
  9. [9]
    Minemura K, Moayed Z, Wong K, et al. JPEG image scrambling without expansion in bitstream size [C]// IEEE International Conference on Image Processing. Piscataway: IEEE, 2012: 261–264.Google Scholar
  10. [10]
    Ji X Y, Bai S, Yan B. Reversible data hiding scheme for encrypted JPEG image based on DCT coefficient- value- ordering predictor [J]. Wireless Internet Technology, 2016, (8): 102–105.Google Scholar
  11. [11]
    Chang J C, Lu Y Z, Wu H L. A separable reversible data hiding scheme for encrypted JPEG bitstreams [J]. Signal Processing, 2017, 133: 135–143.CrossRefGoogle Scholar
  12. [12]
    Ong S Y, Wong K S. Scrambling-embedding for JPEG compressed image [J]. Signal Processing, 2015, 109: 38–53.CrossRefGoogle Scholar
  13. [13]
    Zhang X. Reversible data hiding in encrypted images [J]. IEEE Signal Process, 2011, 4(18): 255–258.CrossRefGoogle Scholar
  14. [14]
    Wu H T, Tang S H, Huang J W. A novel reversible data hiding method with image contrast enhancement [J]. Signal Processing Image Communication, 2018, 62: 64–73.CrossRefGoogle Scholar
  15. [15]
    Bansal C, Gupta P. A survey on histogram shifting techniques in reversible data hiding [C]// Advance Computing Conference. Piscataway: IEEE, 2014: 1008–1012.Google Scholar
  16. [16]
    Chen X, Zhong H, Qiu A. Reversible data hiding scheme in multiple encrypted images based on code division multiplexing [J]. Multimedia Tools and Applications, 2019, 6(78): 7499–7516.CrossRefGoogle Scholar
  17. [17]
    Shao W W, Yun Q S, W H. Dynamic improved pixel value ordering reversible data hiding [J]. Information Sciences, 2019, 489: 136–154.CrossRefGoogle Scholar

Copyright information

© Wuhan University and Springer-Verlag GmbH Germany 2019

Authors and Affiliations

  1. 1.School of Mathematics and StatisticsYangtze Normal UniversityChongqingChina
  2. 2.College of Computer EngineeringYangtze Normal UniversityChongqingChina
  3. 3.Unit75841 of PLAChangsha, HunanChina

Personalised recommendations