Abstract
This work proposes a novel reversible data hiding scheme for encrypted images based on a pseudorandom sequence modulation mechanism. In the first phase, a content owner encrypts the original image for content protection. Then, a data-hider replaces a small proportion of data in LSB planes of encrypted image with the additional data and modifies the rest data in LSB planes according to the pseudorandom sequences modulated by the replaced and embedded data. With the encrypted image containing additional data, an additional-data user knowing the data-hiding key can extract the embedded additional data. And a content user with the encryption key may decrypt the encrypted image containing additional data to obtain the principal original content. If someone receives the decrypted image and has the data-hiding key, he can also successfully extract the additional data and perfectly recover the original image by exploiting the spatial correlation in natural image.
This work was supported by the Natural Science Foundation of China (61073190, 61103181 and 60832010), the Research Fund for the Doctoral Program of Higher Education of China (20113108110010), and the Alexander von Humboldt Foundation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative Encryption and Watermarking in Video Compression. IEEE Trans. on Circuits and Systems for Video Technology 17(6), 774–778 (2007)
Cancellaro, M., Battisti, F., Carli, M., Boato, G., Natale, F.G.B., Neri, A.: A Commutative Digital Image Watermarking and Encryption Method in the Tree Structured Haar Transform Domain. Signal Processing: Image Communication 26(1), 1–12 (2011)
Memon, N., Wong, P.W.: A Buyer–Seller Watermarking Protocol. IEEE Trans. on Image Processing 10(4), 643–649 (2001)
Kuribayashi, M., Tanaka, H.: Fingerprinting Protocol for Images Based on Additive Homomorphic Property. IEEE Trans. Image Processing 14(12), 2129–2139 (2005)
Kundur, D., Karthik, K.: Video Fingerprinting and Encryption Principles for Digital Rights Management. Proceedings of the IEEE 92(6), 918–932 (2004)
Puech, W., Chaumont, M., Strauss, O.: A Reversible Data Hiding Method for Encrypted Images. In: Proc. SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819 (2008)
Zhang, X.: Reversible Data Hiding in Encrypted Image. IEEE Signal Processing Letters 18(4), 255–258 (2011)
Hong, W., Chen, T.-S., Wu, H.-Y.: An Improved Reversible Data Hiding in Encrypted Images Using Side Match. IEEE Signal Processing Letters 19(4), 199–202 (2012)
Zhang, X.: Separable Reversible Data Hiding in Encrypted Image. IEEE Trans. Information Forensics & Security 7(2), 526–532 (2012)
Tian, J.: Reversible Data Embedding Using a Difference Expansion. IEEE Trans. on Circuits and Systems for Video Technology 13(8), 890–896 (2003)
Ni, Z., Shi, Y.-Q., Ansari, N., Su, W.: Reversible Data Hiding. IEEE Trans. on Circuits and Systems for Video Technology 16(3), 354–362 (2006)
Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless Generalized-LSB Data Embedding. IEEE Trans. on Image Processing 14(2), 253–266 (2005)
Hong, W., Chen, T.-S., Chang, Y.-P., Shiu, C.-W.: A High Capacity Reversible Data Hiding Scheme Using Orthogonal Projection and Prediction Error Modification. Signal Processing 90, 2911–2922 (2010)
Chang, C.-C., Lin, C.-C., Chen, Y.-H.: Reversible Data-Embedding Scheme Using Differences between Original and Predicted Pixel Values. IET Information Security 2(2), 35–46 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, X., Qin, C., Sun, G. (2013). Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-40099-5_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40098-8
Online ISBN: 978-3-642-40099-5
eBook Packages: Computer ScienceComputer Science (R0)