Complete Separable Reversible Data Hiding in Encrypted Image

  • Yin Zhaoxia
  • Wang Huabin
  • Zhao Haifeng
  • Luo Bin
  • Zhang Xinpeng
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9483)


Reversible data hiding in encrypted image (RDHEI) is an emerging technology since it has good potential for practical applications such as encrypted image authentication, content owner identification and privacy protection. But there is one key problem of many existing published works, that the embedded data only can be extracted either before or after image decryption. In this paper, a complete separable reversible data hiding scheme in encrypted images is proposed. Additional data can be embedded into a cipher image which is encrypted by RC4 and can be extracted error-free both from the cipher domain and the plaintext domain. Moreover, the proposed method is simpler to calculate, while offering better performance. The results demonstrate that larger payload, better image quality, and error-free data extraction as well as image recovery are achieved.


Reversible data hiding in encrypted images (RDHEI) Privacy protection Histogram modification 



This research work is supported by National Natural Science Foundation of China under Grant Nos. 61502009 and 61472235, Anhui Provincial Natural Science Foundation under Grant No. 1508085SQF216, the 48th Scientific Research Staring Foundation for the Returned Overseas Chinese Scholars, Ministry of Education of China under Grant No. 1685 and the Foundation of Center of Information Support and Assurance Technology for Anhui University under Grant No. ADXXBZ201411. The authors appreciate Dr. Andrew Abel from the University of Stirling for proofreading.


  1. 1.
    Hong, W., Chen, T.S.: A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Inf. Forensics Secur. 7(1), 176–184 (2012). doi: 10.1109/tifs.2011.2155062 CrossRefGoogle Scholar
  2. 2.
    Tian, H., Liu, J., Li, S.: Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimedia Syst. 20(2), 143–154 (2014). doi: 10.1007/s00530-013-0302-8 MathSciNetCrossRefGoogle Scholar
  3. 3.
    Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless generalized–LSB data embedding. IEEE Trans. Image Process. 14(2), 253–256 (2005). doi: 10.1109/TIP.2004.840686 CrossRefGoogle Scholar
  4. 4.
    Peng, F., Li, X., Yang, B.: Adaptive reversible data hiding scheme based on integer transform. Sig. Process. 92(1), 54–62 (2012). doi: 10.1016/j.sigpro.2011.06.006 CrossRefGoogle Scholar
  5. 5.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Technol. 13(8), 890–896 (2003). doi: 10.1109/tcsvt.2003.815962 CrossRefGoogle Scholar
  6. 6.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16(3), 354–362 (2006). doi: 10.1109/tcsvt.2006.869964 CrossRefGoogle Scholar
  7. 7.
    Tai, W.L., Yeh, C.M., Chang, C.C.: Reversible data hiding based on histogram modification of pixel differences. IEEE Trans. Circ. Syst. Video Technol. 19(6), 906–910 (2009). doi: 10.1109/tcsvt.2009.2017409 CrossRefGoogle Scholar
  8. 8.
    Tsai, P., Hu, Y.C., Yeh, H.L.: Reversible image hiding scheme using predictive coding and histogram shifting. Sig. Process. 89(6), 1129–1143 (2009). doi: 10.1016/j.sigpro.2008.12.017 zbMATHCrossRefGoogle Scholar
  9. 9.
    Zhang, X., Wang, S., Qian, Z., Feng, G.: Reversible fragile watermarking for locating tempered blocks in JPEG images. Sig. Process. 90(12), 3026–3036 (2010). doi: 10.1016/j.sigpro.2010.04.027 zbMATHCrossRefGoogle Scholar
  10. 10.
    Qian, Z., Zhang, X.: Lossless data hiding in JPEG bitstream. J. Syst. Softw. 85(2), 309–313 (2012). doi: 10.1016/j.jss.2011.08.015 MathSciNetCrossRefGoogle Scholar
  11. 11.
    Erkin, Z., Piva, A., Katzenbeisser, S., Lagendijk, R.L., Shokrollahi, J., Neven, G., Barni, M.: Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP J. Inf. Secur. 2007, 1–20 (2007). doi: 10.1155/2007/78943 CrossRefGoogle Scholar
  12. 12.
    Schmitz, R., Li, S., Grecos, C., Zhang, X.: Towards robust invariant commutative watermarking-encryption based on image histograms. Int. J. Multimedia Data Eng. Manage. 5(4), 36–52 (2014). doi: 10.4018/ijmdem.2014100103 CrossRefGoogle Scholar
  13. 13.
    Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013). doi: 10.1109/tifs.2013.2248725 CrossRefGoogle Scholar
  14. 14.
    Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Sig. Process. 94, 118–127 (2014). doi: 10.1016/j.sigpro.2013.06.023 CrossRefGoogle Scholar
  15. 15.
    Zhang, X.: Reversible data hiding in encrypted image. IEEE Sig. Process. Lett. 18(4), 255–258 (2011). doi: 10.1109/lsp.2011.2114651 CrossRefGoogle Scholar
  16. 16.
    Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Sig. Process. Lett. 19(4), 199–202 (2012). doi: 10.1109/lsp.2012.2187334 CrossRefGoogle Scholar
  17. 17.
    Liao, X., Shu, C.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Represent. 28, 21–27 (2015). doi: 10.1016/j.jvcir.2014.12.007 CrossRefGoogle Scholar
  18. 18.
    Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012). doi: 10.1109/tifs.2011.2176120 CrossRefGoogle Scholar
  19. 19.
    Wu, X., Sun, W.: High-capacity reversible data hiding in encrypted images by prediction error. Sig. Process. 104, 387–400 (2014). doi: 10.1016/j.sigpro.2014.04.032 CrossRefGoogle Scholar
  20. 20.
    Yin, Z., Luo, B., Hong, W.: Separable and error-free reversible data hiding in encrypted image with high payload. Sci. World J. 2014, 1–8 (2014). doi: 10.1155/2014/604876 Google Scholar
  21. 21.
    Ferguson, N., Schneier, B.: Practical Cryptography. Wiley, New York (2003)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Yin Zhaoxia
    • 1
    • 2
  • Wang Huabin
    • 1
  • Zhao Haifeng
    • 1
  • Luo Bin
    • 1
  • Zhang Xinpeng
    • 2
  1. 1.Key Laboratory of Intelligent Computing and Signal Processing, Ministry of EducationAnhui UniversityHefeiPeople’s Republic of China
  2. 2.School of Communication and Information EngineeringShanghai UniversityShanghaiPeople’s Republic of China

Personalised recommendations