Skip to main content

A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Image

  • Conference paper
  • First Online:
  • 1346 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11634))

Abstract

VQ-compressed images have been widely used as an important branch of multimedia, however, there are few reversible data hiding schemes based on VQ-compressed image in encrypted domain. In this paper, a reversible data hiding scheme based on encrypted VQ-compressed image is proposed. On the content owner side, codebook is supposed to be reorganized firstly, and codewords in codebook are then grouped into codeword pair after reorganization. After this process, index table and the new codebook are encrypted separately, using modulo operation to encrypt index table and stream cipher to encrypt codebook. Additional data will be embedded in specific position of index table by modifying their index value. As to the receiver, encrypted index table with addition data and encrypted codebook are decrypted by the encryption key. The additional data can be extracted and image can be recovered effectively according to spatial correlation in natural image.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Vleeschouwer, C.D., Delaigle, J.F., Macq, B.: Invisibility and application functionalities in perceptual watermarking: an overview. Proc. IEEE 90(1), 64–77 (2002)

    Article  Google Scholar 

  2. Duan, X., Song, H., Qin, C., Khan, M.: Coverless steganography for digital images based on a generative model. Comput. Mater. Continua 55(3), 483–493 (2018)

    Google Scholar 

  3. Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)

    Article  Google Scholar 

  4. Ni, Z., Shi, Y., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)

    Article  Google Scholar 

  5. Thodi, M., Rodriguez, J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16(3), 721–730 (2007)

    Article  MathSciNet  Google Scholar 

  6. Li, X., Zhang, W., Gui, X., Yang, B.: Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 10(9), 2016–2027 (2015)

    Article  Google Scholar 

  7. Wang, Y., Shen, J., Hwang, M.: A novel dual image-based high payload reversible hiding technique using LSB matching. Int. J. Netw. Secur. 20(4), 801–804 (2018)

    Google Scholar 

  8. Nasrabadi, N., King, R.: Image coding using vector quantization: a review. IEEE Trans. Commun. 36(8), 957–971 (1988)

    Article  Google Scholar 

  9. Chang, C., Chen, G., Lin, M.: Information hiding based on search-order coding for VQ indices. Pattern Recogn. Lett. 25(11), 1253–1261 (2004)

    Article  Google Scholar 

  10. Lin, C., Chen, S., Hsueh, N.: Adaptive embedding techniques for VQ-compressed images. Inf. Sci. 179(3), 140–149 (2009)

    Article  Google Scholar 

  11. Shie, S., Jiang, J.: Reversible and high-payload image steganographic scheme based on side-match vector quantization. Sig. Process. 92(9), 2332–2338 (2012)

    Article  Google Scholar 

  12. Qin, C., Chang, C., Chen, Y.: Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Sig. Process. 99(9), 2687–2695 (2013)

    Article  Google Scholar 

  13. Kieu, T., Ramroach, S.: A reversible steganographic scheme for VQ indices based on joint neighboring coding. Expert Syst. Appl. 42(2), 713–722 (2015)

    Article  Google Scholar 

  14. Lee, J., Chiou, Y., Guo, J.: Lossless data hiding for VQ indices based on neighboring correlation. Inf. Sci. 221(2), 419–438 (2013)

    Article  Google Scholar 

  15. Puech, W., Chaumont, M., Strauss, O.: A reversible data hiding method for encrypted images. Proc. SPIE 6819, 1–9 (2008)

    Google Scholar 

  16. Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255–258 (2011)

    Article  Google Scholar 

  17. Chen, Y., Yin, B., He, H., Yan, S., Chen, F., Tai, H.: Reversible data hiding in classification-scrambling encrypted-image based on iterative recovery. Comput. Mater. Continua 56(2), 299–312 (2018)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (61672354, 61702332), the Open Project Program of the National Laboratory of Pattern Recognition (201600003), the Open Project Program of Shenzhen Key Laboratory of Media Security, and Hujiang Foundation of China (C14001, C14002).

The authors would like to thank the anonymous reviewers for their valuable suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chuan Qin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fu, Y., Peng, D., Yao, H., Qin, C. (2019). A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Image. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11634. Springer, Cham. https://doi.org/10.1007/978-3-030-24271-8_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24271-8_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24270-1

  • Online ISBN: 978-3-030-24271-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics