Advertisement

Reversible Data Hiding Scheme in Encrypted-Image Based on Prediction and Compression Coding

  • Fan Chen
  • Yuan Yuan
  • Yuyu Chen
  • Hongjie HeEmail author
  • Lingfeng Qu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11378)

Abstract

For cloud storage management and security of images, more and more attention is paid to reversible data hiding in encrypted images (RDH-EI). This work proposes a RDH-EI method based on a novel compression coding that can vacate more space for data hiding. To improve the embedding capacity, several most significant bits (MSB) of an original image are firstly predicted in turn to generate the corresponding prediction bit-planes, and then the XOR operation and a shorter variable-length coding are designed to further decrease the coding length of the prediction bit-planes. The proposed scheme can achieve a larger embedding capacity and real reversibility and lossless decryption. Experimental results demonstrate that the performance of the proposed method outperforms other RDH-EI schemes, including embedding capacity, reversibility and the ability against the cipher-only attack.

Keywords

Reversible data hiding Image encryption Cloud storage Compression coding 

References

  1. 1.
    Puteaux, P., Puech, W.: An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forensics Secur. 13(7), 1670–1681 (2018)CrossRefGoogle Scholar
  2. 2.
    Jolfaei, A., Wu, X.W., Muthukkumarasamy, V.: On the security of permutation-only im-age encryption schemes. IEEE Trans. Inf. Forensics Secur. 11(2), 235–246 (2016)CrossRefGoogle Scholar
  3. 3.
    Shi, Y.Q., Li, X., Zhang, X., Wu, H.T., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 705–720 (2016)Google Scholar
  4. 4.
    Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)CrossRefGoogle Scholar
  5. 5.
    Zhou, J., Sun, W., Dong, L., et al.: Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans. Circuits Syst. Video Technol. 26(3), 441–452 (2016)CrossRefGoogle Scholar
  6. 6.
    Qian, Z., Zhang, X.: Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans. Circuits Syst. Video Technol. 26(4), 636–646 (2016)CrossRefGoogle Scholar
  7. 7.
    Ma, K., Zhang, W., Zhao, X., et al.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)CrossRefGoogle Scholar
  8. 8.
    Xu, D., Wang, R.: Separable and error-free reversible data hiding in encrypted images. Signal Proc. 123, 9–21 (2016)CrossRefGoogle Scholar
  9. 9.
    Cao, X., Du, L., Wei, X., et al.: High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern. 46(5), 1132–1143 (2016)CrossRefGoogle Scholar
  10. 10.
    Chen, Y., Yan, S., He, H., et al.: Secure reversible data hiding in encrypted images based on MSB-flip prediction. Patent No: 201810174576.8, 02 March 2018Google Scholar
  11. 11.
    Khelifi, F.: On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain. Signal Proc. 143, 336–345 (2018)CrossRefGoogle Scholar
  12. 12.
    Huang, F., Huang, J., Shi, Y.Q.: New framework for reversible data hiding in encrypted domain. IEEE Trans. Inf. Forensics Secur. 11(12), 2777–2789 (2016)CrossRefGoogle Scholar
  13. 13.
    Chen, F., He, H., Ma, T., et al.: Reversible data hiding in classification-scrambling encrypted-image based on iterative recovery. In: International Conference on Cloud Computing and Security, pp. 162–174 (2018)CrossRefGoogle Scholar
  14. 14.
    Yi, S., Zhou, Y.: Binary-block embedding for reversible data hiding in encrypted images. Signal Proc. 133, 40–51 (2017)CrossRefGoogle Scholar
  15. 15.
    Liu, Z.L., Pun, C.M.: Reversible data-hiding in encrypted images by redundant space transfer. Inf. Sci. 433–434, 188–203 (2018)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Fan Chen
    • 1
  • Yuan Yuan
    • 1
  • Yuyu Chen
    • 2
  • Hongjie He
    • 1
    Email author
  • Lingfeng Qu
    • 1
  1. 1.School of Information Science and TechnologySouthwest Jiaotong UniversityChengduChina
  2. 2.Mao Yisheng Honors CollegeSouthwest Jiaotong UniversityChengduChina

Personalised recommendations