Abstract
This paper proposes a novel method of unified data hiding and JPEG scrambling. This differs from the traditional image encryption algorithms in that, we propose to construct a privacy-preserved JPEG image during the data hiding procedure. That is while the scrambling operation masks the JPEG image content by the secret key, the additional messages is also represented by the sequence of the shuffled RLE (Run Length Encoding) pairs. Therefore, images uploaded to the cloud server unable to reveal the original content. Meanwhile, the owner can use the embedded messages for fragile watermarking, JPEG labeling and image management. The proposed method is reversible. After downloading a copy from the cloud, an authorized user can extract the hidden message and recover the original JPEG losslessly and simultaneously. Experimental results show that the proposed method provides a large embedding payload and has a good capability for preserving privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Liu, W., Zeng, W., Dong, L., Yao, Q.: Efficient compression of encrypted grayscale images. IEEE Trans. Image Process. 19(4), 1097–1102 (2010)
Zheng, P., Huang, J.: Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain. IEEE Trans. Image Process. 22(6), 2455–2468 (2013)
Rahulamathavan, Y., Phan, R., Chambers, J., Parish, D.: Facial expression recognition in the encrypted domain based on local fisher discriminant analysis. IEEE Trans. Affect. Comput. 4(1), 83–92 (2013)
Bianchi, T., Piva, A.: TTP-free asymmetric fingerprinting based on client side embedding. IEEE Trans. Inf. Forensics Secur. 9(10), 1557–1568 (2014)
Fu, Z., Sun, X., Liu, Q., et al.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2015)
Ong, S.Y., Wong, K.S., Qi, X., et al.: Beyond format-compliant encryption for JPEG image. Sig. Process. Image Commun. 31, 47–60 (2015)
Qian, Z., Zhou, H., Zhang, X., et al.: Separable reversible data hiding in encrypted JPEG bitstreams. IEEE Trans. Dependable Secure Comput. (2016). https://doi.org/10.1109/TDSC.2016.2634161
Chang, J.C., Lu, Y.Z., Wu, H.L.: A separable reversible data hiding scheme for encrypted JPEG bitstreams. Sig. Process. 133, 135–143 (2017)
Cutillo, L.A., Molva, R., Onen, M.: Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks. In: Proceedings SNS 2012, p. 6. ACM (2012)
Klemperer, P., et al.: Tag, you can see it! Using tags for access control in photo sharing. In: Proceedings CHI 2012, pp. 377–386. ACM (2012)
Mazurek, M.L., et al.: Toward strong, usable access control for shared distributed data. In: Proceedings FAST 2014, pp. 89–103. USENIX Association (2014)
Ra, M.R., Govindan, R., Ortega, A.: P3: toward privacy-preserving photo sharing. In: Proceedings NSDI 2013, pp. 515–528. USENIX Association (2013)
Tierney, M., Spiro, I., Bregler, C., Subramanian, L.: Cryptagram: photo privacy for online social media. In: Proceedings COSN 2013, pp. 75–88. ACM (2013)
Sun, W., Zhou, J., Lyu, R., et al.: Processing-aware privacy-preserving photo sharing over online social networks. In: ACM on Multimedia Conference, pp. 581–585. ACM (2016)
Schaefer, G., Stich, M.: UCID—an uncompressed colour image database. In: Proceedings SPIE: Storage and Retrieval Methods and Applications for Multimedia, vol. 5307, pp. 472–480 (2004)
Ong, S.Y., Minemura, K., Wong, K.S.: Progressive quality degradation in JPEG compressed image using DC block orientation with rewritable data embedding functionality. In: IEEE International Conference on Image Processing, pp. 4574–4578. IEEE (2013)
Minemura, K., Moayed, Z., Wong, K., Qi, X., Tanaka, K.: JPEG image scrambling without expansion in bitstream size. In: IEEE International Conference on Image Processing, pp. 261–264. IEEE (2012)
International Telecommunication Union: CCITT Recommendation T.81, - Information technology-digital compression and coding of continuous-tone still—requirements and guidelines (1992)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Yin, Z., Xiang, Y., Qian, Z., Zhang, X. (2018). Unified Data Hiding and Scrambling Method for JPEG Images. In: Hong, R., Cheng, WH., Yamasaki, T., Wang, M., Ngo, CW. (eds) Advances in Multimedia Information Processing – PCM 2018. PCM 2018. Lecture Notes in Computer Science(), vol 11166. Springer, Cham. https://doi.org/10.1007/978-3-030-00764-5_34
Download citation
DOI: https://doi.org/10.1007/978-3-030-00764-5_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00763-8
Online ISBN: 978-3-030-00764-5
eBook Packages: Computer ScienceComputer Science (R0)