Skip to main content

Unified Data Hiding and Scrambling Method for JPEG Images

  • Conference paper
  • First Online:
Advances in Multimedia Information Processing – PCM 2018 (PCM 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11166))

Included in the following conference series:

Abstract

This paper proposes a novel method of unified data hiding and JPEG scrambling. This differs from the traditional image encryption algorithms in that, we propose to construct a privacy-preserved JPEG image during the data hiding procedure. That is while the scrambling operation masks the JPEG image content by the secret key, the additional messages is also represented by the sequence of the shuffled RLE (Run Length Encoding) pairs. Therefore, images uploaded to the cloud server unable to reveal the original content. Meanwhile, the owner can use the embedded messages for fragile watermarking, JPEG labeling and image management. The proposed method is reversible. After downloading a copy from the cloud, an authorized user can extract the hidden message and recover the original JPEG losslessly and simultaneously. Experimental results show that the proposed method provides a large embedding payload and has a good capability for preserving privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, W., Zeng, W., Dong, L., Yao, Q.: Efficient compression of encrypted grayscale images. IEEE Trans. Image Process. 19(4), 1097–1102 (2010)

    Article  MathSciNet  Google Scholar 

  2. Zheng, P., Huang, J.: Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain. IEEE Trans. Image Process. 22(6), 2455–2468 (2013)

    Article  MathSciNet  Google Scholar 

  3. Rahulamathavan, Y., Phan, R., Chambers, J., Parish, D.: Facial expression recognition in the encrypted domain based on local fisher discriminant analysis. IEEE Trans. Affect. Comput. 4(1), 83–92 (2013)

    Article  Google Scholar 

  4. Bianchi, T., Piva, A.: TTP-free asymmetric fingerprinting based on client side embedding. IEEE Trans. Inf. Forensics Secur. 9(10), 1557–1568 (2014)

    Article  Google Scholar 

  5. Fu, Z., Sun, X., Liu, Q., et al.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2015)

    Article  Google Scholar 

  6. Ong, S.Y., Wong, K.S., Qi, X., et al.: Beyond format-compliant encryption for JPEG image. Sig. Process. Image Commun. 31, 47–60 (2015)

    Article  Google Scholar 

  7. Qian, Z., Zhou, H., Zhang, X., et al.: Separable reversible data hiding in encrypted JPEG bitstreams. IEEE Trans. Dependable Secure Comput. (2016). https://doi.org/10.1109/TDSC.2016.2634161

    Article  Google Scholar 

  8. Chang, J.C., Lu, Y.Z., Wu, H.L.: A separable reversible data hiding scheme for encrypted JPEG bitstreams. Sig. Process. 133, 135–143 (2017)

    Article  Google Scholar 

  9. Cutillo, L.A., Molva, R., Onen, M.: Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks. In: Proceedings SNS 2012, p. 6. ACM (2012)

    Google Scholar 

  10. Klemperer, P., et al.: Tag, you can see it! Using tags for access control in photo sharing. In: Proceedings CHI 2012, pp. 377–386. ACM (2012)

    Google Scholar 

  11. Mazurek, M.L., et al.: Toward strong, usable access control for shared distributed data. In: Proceedings FAST 2014, pp. 89–103. USENIX Association (2014)

    Google Scholar 

  12. Ra, M.R., Govindan, R., Ortega, A.: P3: toward privacy-preserving photo sharing. In: Proceedings NSDI 2013, pp. 515–528. USENIX Association (2013)

    Google Scholar 

  13. Tierney, M., Spiro, I., Bregler, C., Subramanian, L.: Cryptagram: photo privacy for online social media. In: Proceedings COSN 2013, pp. 75–88. ACM (2013)

    Google Scholar 

  14. Sun, W., Zhou, J., Lyu, R., et al.: Processing-aware privacy-preserving photo sharing over online social networks. In: ACM on Multimedia Conference, pp. 581–585. ACM (2016)

    Google Scholar 

  15. Schaefer, G., Stich, M.: UCID—an uncompressed colour image database. In: Proceedings SPIE: Storage and Retrieval Methods and Applications for Multimedia, vol. 5307, pp. 472–480 (2004)

    Google Scholar 

  16. Ong, S.Y., Minemura, K., Wong, K.S.: Progressive quality degradation in JPEG compressed image using DC block orientation with rewritable data embedding functionality. In: IEEE International Conference on Image Processing, pp. 4574–4578. IEEE (2013)

    Google Scholar 

  17. Minemura, K., Moayed, Z., Wong, K., Qi, X., Tanaka, K.: JPEG image scrambling without expansion in bitstream size. In: IEEE International Conference on Image Processing, pp. 261–264. IEEE (2012)

    Google Scholar 

  18. International Telecommunication Union: CCITT Recommendation T.81, - Information technology-digital compression and coding of continuous-tone still—requirements and guidelines (1992)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinpeng Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yin, Z., Xiang, Y., Qian, Z., Zhang, X. (2018). Unified Data Hiding and Scrambling Method for JPEG Images. In: Hong, R., Cheng, WH., Yamasaki, T., Wang, M., Ngo, CW. (eds) Advances in Multimedia Information Processing – PCM 2018. PCM 2018. Lecture Notes in Computer Science(), vol 11166. Springer, Cham. https://doi.org/10.1007/978-3-030-00764-5_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00764-5_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00763-8

  • Online ISBN: 978-3-030-00764-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics