Reversible Data Hiding in Encrypted Images Based on Image Partition and Spatial Correlation

  • Chang SongEmail author
  • Yifeng Zhang
  • Guojun Lu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11378)


Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images because of its better protection of privacy compared with traditional RDH methods directly operated in original images. In several RDH algorithms, prediction-error expansion (PEE) is proved to be superior to other methods in terms of embedding capacity and distortion of marked image and multiple histograms modification (MHM) can realize adaptive selection of expansion bins which depends on image content in the modification of a sequence of histograms. Therefore, in this paper, we propose an efficient RDH method in encrypted images by combining PEE and MHM, and design corresponding mode of image partition. We first divide the image into three parts: W (for embedding secret data), B (for embedding the least significant bit(LSB) of W) and G (for generating prediction-error histograms). Then, we apply PEE and MHM to embed the LSB of W to reserve space for secret data. Next, we encrypt the image and change the LSB of W to realize the embedding of secret data. In the process of extraction, the reversibility of image and secret data can be guaranteed. The utilization of correlation between neighbor pixels and embedded order decided by the smoothness of pixel in part W contribute to the performance of our method. Compared to the existing algorithms, experimental results show that the proposed method can reduce distortion to the image at given embedding capacity especially at low embedding capacity.


Reversible data hiding Encrypted images Prediction-error expansion Multiple histograms modification 



This work was supported in part by the Natural Science Foundation of Jiangsu Province under Grant BK20151102, in part by the Ministry of Education Key Laboratory of Machine Perception, Peking University under Grant K-2016-03, in part by the Open Project Program of the Ministry of Education Key Laboratory of Underwater Acoustic Signal Processing, Southeast University under Grant UASP1502, and in part by the Natural Science Foundation of China under Grant 61673108.


  1. 1.
    Fridrich, J., Goljan, M., Du, R.: Lossless data embedding for all image formats. In: Ei SPIE Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 572–583 (2002)Google Scholar
  2. 2.
    Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 14(2), 253–266 (2005)CrossRefGoogle Scholar
  3. 3.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)CrossRefGoogle Scholar
  4. 4.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)CrossRefGoogle Scholar
  5. 5.
    Thodi, D.M., Rodriguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16(3), 721–730 (2007)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7), 989–999 (2009)CrossRefGoogle Scholar
  7. 7.
    Tsai, P., Hu, Y.C., Yeh, H.L.: Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process. 89, 1129–1143 (2009)CrossRefGoogle Scholar
  8. 8.
    Li, X., Zhang, W., Gui, X.: Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 10(9), 2016–2027 (2015)CrossRefGoogle Scholar
  9. 9.
    Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255–258 (2011)CrossRefGoogle Scholar
  10. 10.
    Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)CrossRefGoogle Scholar
  11. 11.
    Li, M., Xiao, D., Kulsoom, A.: Improved reversible data hiding for encrypted images using full embedding strategy. Electron. Lett. 51(9), 690–691 (2015)CrossRefGoogle Scholar
  12. 12.
    Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)CrossRefGoogle Scholar
  13. 13.
    Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving space before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)CrossRefGoogle Scholar
  14. 14.
    Luo, L.: Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Secur. 5(1), 187–193 (2010)CrossRefGoogle Scholar
  15. 15.
    Miscelaneous Gray Level Images. Accessed 13 Mar 2014

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of Information Science and EngineeringSoutheast UniversityNanjingPeople’s Republic of China
  2. 2.Nanjing Institute of Communications TechnologiesNanjingPeople’s Republic of China
  3. 3.State Key Laboratory for Novel Software TechnologyNanjing UniversityNanjingPeople’s Republic of China
  4. 4.Faculty of Science and TechnologyFederation University AustraliaMelbourneAustralia

Personalised recommendations