Skip to main content

Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7809))

Abstract

This work proposes a novel reversible data hiding scheme for encrypted images based on a pseudorandom sequence modulation mechanism. In the first phase, a content owner encrypts the original image for content protection. Then, a data-hider replaces a small proportion of data in LSB planes of encrypted image with the additional data and modifies the rest data in LSB planes according to the pseudorandom sequences modulated by the replaced and embedded data. With the encrypted image containing additional data, an additional-data user knowing the data-hiding key can extract the embedded additional data. And a content user with the encryption key may decrypt the encrypted image containing additional data to obtain the principal original content. If someone receives the decrypted image and has the data-hiding key, he can also successfully extract the additional data and perfectly recover the original image by exploiting the spatial correlation in natural image.

This work was supported by the Natural Science Foundation of China (61073190, 61103181 and 60832010), the Research Fund for the Doctoral Program of Higher Education of China (20113108110010), and the Alexander von Humboldt Foundation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative Encryption and Watermarking in Video Compression. IEEE Trans. on Circuits and Systems for Video Technology 17(6), 774–778 (2007)

    Article  Google Scholar 

  2. Cancellaro, M., Battisti, F., Carli, M., Boato, G., Natale, F.G.B., Neri, A.: A Commutative Digital Image Watermarking and Encryption Method in the Tree Structured Haar Transform Domain. Signal Processing: Image Communication 26(1), 1–12 (2011)

    MATH  Google Scholar 

  3. Memon, N., Wong, P.W.: A Buyer–Seller Watermarking Protocol. IEEE Trans. on Image Processing 10(4), 643–649 (2001)

    Article  MATH  Google Scholar 

  4. Kuribayashi, M., Tanaka, H.: Fingerprinting Protocol for Images Based on Additive Homomorphic Property. IEEE Trans. Image Processing 14(12), 2129–2139 (2005)

    Article  Google Scholar 

  5. Kundur, D., Karthik, K.: Video Fingerprinting and Encryption Principles for Digital Rights Management. Proceedings of the IEEE 92(6), 918–932 (2004)

    Article  Google Scholar 

  6. Puech, W., Chaumont, M., Strauss, O.: A Reversible Data Hiding Method for Encrypted Images. In: Proc. SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819 (2008)

    Google Scholar 

  7. Zhang, X.: Reversible Data Hiding in Encrypted Image. IEEE Signal Processing Letters 18(4), 255–258 (2011)

    Article  Google Scholar 

  8. Hong, W., Chen, T.-S., Wu, H.-Y.: An Improved Reversible Data Hiding in Encrypted Images Using Side Match. IEEE Signal Processing Letters 19(4), 199–202 (2012)

    Article  Google Scholar 

  9. Zhang, X.: Separable Reversible Data Hiding in Encrypted Image. IEEE Trans. Information Forensics & Security 7(2), 526–532 (2012)

    Google Scholar 

  10. Tian, J.: Reversible Data Embedding Using a Difference Expansion. IEEE Trans. on Circuits and Systems for Video Technology 13(8), 890–896 (2003)

    Article  Google Scholar 

  11. Ni, Z., Shi, Y.-Q., Ansari, N., Su, W.: Reversible Data Hiding. IEEE Trans. on Circuits and Systems for Video Technology 16(3), 354–362 (2006)

    Article  Google Scholar 

  12. Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless Generalized-LSB Data Embedding. IEEE Trans. on Image Processing 14(2), 253–266 (2005)

    Article  Google Scholar 

  13. Hong, W., Chen, T.-S., Chang, Y.-P., Shiu, C.-W.: A High Capacity Reversible Data Hiding Scheme Using Orthogonal Projection and Prediction Error Modification. Signal Processing 90, 2911–2922 (2010)

    Article  MATH  Google Scholar 

  14. Chang, C.-C., Lin, C.-C., Chen, Y.-H.: Reversible Data-Embedding Scheme Using Differences between Original and Predicted Pixel Values. IET Information Security 2(2), 35–46 (2008)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, X., Qin, C., Sun, G. (2013). Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40099-5_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40098-8

  • Online ISBN: 978-3-642-40099-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics