Abstract
Recently, Zhang [1] proposed a reversible data hiding algorithm for encrypted image, which can reversibly embed data into encrypted image without knowing the original image content. However, in data extraction of this algorithm, the error-rate is large especially for high capacity case. In this paper, to remedy the above problem, an improved method is presented. By our improvement, the error-rate is significantly decreased and the visual quality of the decrypted marked image is enhanced as well.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zhang, X.: Reversible Data Hiding in Encrypted Image. IEEE Signal Process. Lett. 18(4), 255–258 (2011)
Memon, N., Wong, P.W.: A Buyer-seller Watermarking Protocol. IEEE Trans. Image Process. 10(4), 643–649 (2001)
Lei, C.L., Yu, P.L., Tsai, P.L., Chan, M.H.: An Efficient and Anonymous Buyer-seller Watermarking Protocol. IEEE Trans. Image Process. 13(12), 1618–1626 (2004)
Zhao, B., Kou, W., Li, H., Dang, L., Zhang, J.: Effective Watermarking Scheme in The Encrypted Domain for Buyer-seller Watermarking Protocol. Information Sciences 180(23), 4672–4684 (2010)
Zhao, B., Delp, E.J.: Secret Sharing in The Encrypted Domain. In: Proc. IEEE ICC (2011)
Bianchi, T., Piva, A., Barni, M.: On The Implementation of The Discrete Fourier Transform in The Encrypted Domain. IEEE Trans. Inf. Forens. Security 4(4), 86–97 (2009)
Bianchi, T., Veugen, T., Piva, A., Barni, M.: Processing in The Encrypted Domain Using a Composite Signal Representation: Pros and Cons. In: Proc. IEEE WIFS, pp. 176–180 (2009)
Zheng, P., Huang, J.: Implementation of The Discrete Wavelet Transform and Multiresolution Analysis in The Encrypted Domain. In: Proc. of the 19th ACM International Conference on Multimedia, pp. 413–422 (2011)
Lu, W., Swaminathan, A., Varna, A.L., Wu, M.: Enabling Search Over Encrypted Multimedia Databases. In: Media Forensics and Security. SPIE, vol. 7254, p. 725418 (2009)
Schonberg, D., Draper, S.C., Yeo, C., Ramchandran, K.: Toward Compression of Encrypted Images and Video Sequences. IEEE Trans. Inf. Forens. Security 3(4), 749–762 (2008)
Liu, W., Zeng, W., Dong, L., Yao, Q.: Efficient Compression of Encrypted Grayscale Images. IEEE Trans. Image Process. 19(4), 1097–1102 (2010)
Hsu, C.Y., Lu, C.S., Pei, S.C.: Homomorphic Encryption-based Secure SIFT for Privacy-preserving Feature Extraction. In: Media Watermarking, Security, and Forensics III. SPIE, vol. 7880, p. 788005 (2011)
Puech, W., Chaumont, M., Strauss, O.: A Reversible Data Hiding Method for Encrypted Images. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. SPIE, vol. 6819, p. 68191E (2008)
Zhang, X.: Separable Reversible Datahiding in Encrypted Image. IEEE Trans. Inf. Forens. Security 7(2), 826–832 (2012)
Hong, W., Chen, T.S., Wu, H.Y.: An Improved Reversible Data Hiding in Encrypted Images Using Side Match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yu, J., Zhu, G., Li, X., Yang, J. (2013). An Improved Algorithm for Reversible Data Hiding in Encrypted Image. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_32
Download citation
DOI: https://doi.org/10.1007/978-3-642-40099-5_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40098-8
Online ISBN: 978-3-642-40099-5
eBook Packages: Computer ScienceComputer Science (R0)