Abstract
In order to achieve image encryption and data embedding simultaneously, a reversible data hiding (RDH) algorithm for encrypted-compressed image in wavelet domain is proposed. This scheme employs the quality controllable parameter. Moreover it has larger embedding capacity and smaller quality control parameters than other methods in literatures. Meanwhile, the cross chaotic map is employed to generate chaotic sequences, and the total keys of the algorithm is far large. Experimental results and comparisons show that the proposed scheme has large capacity, high security, and strong resistance to brute-force.
Similar content being viewed by others
References
Fridrich J. Image encryption based on chaotic maps [C]// IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation. Piscataway: IEEE, 1997: 1105–1110.
Karim A, Mustafa S, Wong K. Universal data embedding in encrypted domain [J]. Signal Processing, 2014, 94: 174–182.
Ma K, Zhang W, Zhao X, et al. Reversible data hiding in encrypted images by reserving room before encryption [J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3): 553–562.
Xiao D, Chen S. Separable data hiding in encrypted image based on compressive sensing [J]. Electronics Letters, 2014, 50(8): 598–600.
Xiang S J, Lou X R. Reversible data hiding in encrypted image based on homomorphic public key cryptosystem [J]. Journal of Software, 2016, 27(6): 1592–1601.
Chen Y C, Shiu C W. Encrypted signal-based reversible data hiding with public key cryptosystem [J]. Journal of Visual Communication and Image Representation, 2014, 25(5): 1164–1170.
Li M, Xiao D, Zhang Y S, et al. Reversible data hiding in encrypted images using cross division and additive homomorphism [J]. Signal Processing: Image Communication, 2015, 39: 234–248.
Qian Z X, Zhang X P, Wan S Z. Reversible data hiding in encrypted JPEG bitstream [J]. IEEE Transactions on Multimedia, 2014, 16(5): 1486–1491.
Minemura K, Moayed Z, Wong K, et al. JPEG image scrambling without expansion in bitstream size [C]// IEEE International Conference on Image Processing. Piscataway: IEEE, 2012: 261–264.
Ji X Y, Bai S, Yan B. Reversible data hiding scheme for encrypted JPEG image based on DCT coefficient- value- ordering predictor [J]. Wireless Internet Technology, 2016, (8): 102–105.
Chang J C, Lu Y Z, Wu H L. A separable reversible data hiding scheme for encrypted JPEG bitstreams [J]. Signal Processing, 2017, 133: 135–143.
Ong S Y, Wong K S. Scrambling-embedding for JPEG compressed image [J]. Signal Processing, 2015, 109: 38–53.
Zhang X. Reversible data hiding in encrypted images [J]. IEEE Signal Process, 2011, 4(18): 255–258.
Wu H T, Tang S H, Huang J W. A novel reversible data hiding method with image contrast enhancement [J]. Signal Processing Image Communication, 2018, 62: 64–73.
Bansal C, Gupta P. A survey on histogram shifting techniques in reversible data hiding [C]// Advance Computing Conference. Piscataway: IEEE, 2014: 1008–1012.
Chen X, Zhong H, Qiu A. Reversible data hiding scheme in multiple encrypted images based on code division multiplexing [J]. Multimedia Tools and Applications, 2019, 6(78): 7499–7516.
Shao W W, Yun Q S, W H. Dynamic improved pixel value ordering reversible data hiding [J]. Information Sciences, 2019, 489: 136–154.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the Chongqing Research Program of Basic Research and Frontier Technology (cstc2017jcyjBX0008), the Graduate Student Research and Innovation Foundation of Chongqing (CYB17026), and the Basic Applied Research Program of Qinghai Province (2019-ZJ-7099)
Biography: LI Xinyan, female, Lecturer, research direction: compressive sensing and image encryption.
Rights and permissions
About this article
Cite this article
Li, X., Mou, H., Yan, B. et al. A Reversible Data Hiding with Quality Controllable Scheme for Encrypted-Compressed Image. Wuhan Univ. J. Nat. Sci. 24, 383–390 (2019). https://doi.org/10.1007/s11859-019-1410-x
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-019-1410-x
Key words
- reversible data hiding in encrypted image
- cross chaotic map
- diffuse and scramble
- encryption-compression