Skip to main content

Advertisement

Log in

Separable robust data hiding in encrypted image based on continuous quadrant tree and 2Bin N-nary

  • Theoretical Advances
  • Published:
Pattern Analysis and Applications Aims and scope Submit manuscript

Abstract

Data hiding is a noteworthy research topic in digital technology for years. It can be used for copyright protection, authentication, content-ownership verification, and sending patient information. Focusing on how to improve the security, capacity, visual quality and robustness, a separable robust data hiding in encrypted image based on Continuous Quadrant Tree (CQT) and 2Bin N-nary is proposed. In this work, the definition of CQT, constraints of the sub-tree roots, generation and traversal of CQT are proposed for the first time. To achieve security, matrix traversal, CQT and rotation encryption are combined. When select embedding interval, a histogram preprocessing algorithm based on pixel fluctuation is presented. This paper achieves separable decryption and extraction. Experimental results demonstrate that the capacity has been improved by 50–70% compared with the similar scheme. It not only achieves high security and high visual quality, but also is robust to various attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29

Similar content being viewed by others

References

  1. NiZ P, ShiY Q, AnsariN SuW (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16:354–362

    Article  Google Scholar 

  2. TsaiP HuYC, YehH L (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89:1129–1143

    Article  Google Scholar 

  3. ZhangW M, HuX C, LiX L, YuN H (2013) Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans Image Process 22:2775–2785

    Article  Google Scholar 

  4. DragoiI C, Coltuc D (2016) Adaptive pairing reversible watermarking. IEEE Trans Image Process 25:2420–2422

    Article  MathSciNet  MATH  Google Scholar 

  5. Li X, Zhang W, Gui X, Yang B (2017) Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forens. Secur 10:2016–2027

    Google Scholar 

  6. WangJ X, MaoN X, ChenX NQ, WangC T, ShiY Q (2019) Multiple histograms based reversible data hiding by using FCM clustering. Signal Process 159:193–203

    Article  Google Scholar 

  7. WengS W, TanW QuB, PanJ S (2021) Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm. Inf Sci 549:13–33

    Article  MathSciNet  Google Scholar 

  8. LiM LiY (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190–196

    Article  Google Scholar 

  9. XiongL Z, DongD P, XiaZ H, ChenX Y (2018) High-capacity reversible data hiding for encrypted multimedia data with somewhat homomorphic encryption. IEEE Access 6:60635–60644

    Article  Google Scholar 

  10. Xiang S, Kim HJ, Huang J (2008) Invariant image watermarking based on statistical features in the low-frequency domain. IEEE Trans Circ Syst Video Technol 18:777–790

    Article  Google Scholar 

  11. ChenD GB, PengH AL, FengJ J (2010) Histogram modification based robust image watermarking approach. Int J Multimedia Intell Secur 1:153–168

    Google Scholar 

  12. GaoX B, TaoD C, LiX L (2010) Local histogram based geometric invariant image watermarking. Signal Process 90:3256–3264

    Article  Google Scholar 

  13. HeX S, ZhuT YB (2015) A geometrical attack resistant image watermarking algorithm based on histogram modification. Multidimension Syst Signal Process 26:291–306

    Article  MathSciNet  Google Scholar 

  14. Wang JJ, LiG Y, XiaG E, SunZ R (2020) A separable and reversible data hiding algorithm in encrypted domain based on image interpolation space. Acta Electron Sin 48:92–100

    Google Scholar 

  15. Wang S, Cui C, Niu XM (2017) A novel DIBR 3D image watermarking algorithm resist to geometrical attacks. Chin J Electron 26:1184–1193

    Article  Google Scholar 

  16. Yue Z, Li ZC, Yang XY, You FC, Liu FP (2020) A histogram-based 2Bin M-ary image digital watermarking algorithm. Acta Electron Sin 48:531–537

    Google Scholar 

  17. Zong TR, Xiang Y, Natgunanathan I (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 25:717–729

    Article  Google Scholar 

  18. Feng BW, Weng J, Lu W (2017) Improved algorithms for robust histogram shape-based image watermarking. International Workshop on Digital Watermarking. Springer, Berlin, pp 275–289

    Google Scholar 

  19. Pan HL, Lei YM, Jian C (2018) Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP J Image Video Process 1:142–152

    Article  Google Scholar 

  20. Dua M, Kumar A, Garg A (2022) Multiple image encryption approach using non linear chaotic map and cosine transformation. Int J Inf Technol 14(3):1627–1641

    Google Scholar 

  21. Wadi SM, Zainal N (2013) Rapid encryption method based on AES algorithm for grey scale HD image encryption. Procedia Technol 11(3):51–56

    Article  Google Scholar 

  22. Wu JJ, Liu ZJ, Wang JC (2021) A compact image encryption system based on Arnold transformation. Multimedia Tools Appl 80(6):2647–2661

    Article  Google Scholar 

  23. Zhu G, Zhang X (2008) Mixed image element encryption algorithm based on an elliptic curve cryptosystem. J Electron Imaging 17(2):023007

    Article  Google Scholar 

  24. Yuan X, Zhang LH, Chen J (2019) Multiple-image encryption scheme based on ghost imaging of Hadamard matrix and spatial multiplexing. Appl Phys B 125:174

    Article  Google Scholar 

  25. Lv XP, Liao XF, Yang B (2018) Bit-level plane image encryption based on coupled map lattice with timevarying delay. Mod Phys Lett B 32(10):1850124

    Article  Google Scholar 

  26. Gan ZH, Chai XL, Yuan K (2018) A novel image encryption algorithm based on LFT based S-boxes and chaos. Multimed Tools Appl 77(7):8759–8783

    Article  Google Scholar 

  27. Wang X, Li Z (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng 115:107–118

    Article  Google Scholar 

  28. Wang XY, Lin SJ, Li Y (2021) Bit-level image encryption algorithm based on BP neural network and gray code. Multimedia Tools Appl 80:11655–11670

    Article  Google Scholar 

  29. Nandy N, Banerjee D, Pradhan C (2021) Color image encryption using DNA based cryptography. Int J Inf Technol 13:533–540

    Google Scholar 

  30. Hanis S, Amutha R (2019) A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95:421–432

    Article  Google Scholar 

  31. The USC-SIPI image database [Online] (2016) http://sipi.usc.edu/database/ .

  32. UCID-uncompressed colour image database [Online] (2016) http://homepages.lboro.ac.uk/cogs/datasets/UCID/ucid.html.

  33. Kodak lossless true color image suite [Online] (2016) http://r0k.us/graphics/kodak/ .

Download references

Acknowledgements

This work was supported by the Scientific Research Program Funded by Liaoning Provincial Education Department (Grant No. WQ2020014), the Key Research Project of Dalian academy of social sciences (Grant Nos. 2020dlsky042, 2021dlsky027) and Liaoning Planning Office of Philosophy and Social Science (CN) (Grant No. L19BTQ001), the National Youth Science Foundation of China(Grant No. 61601214).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shi Hui.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hui, S., Baoyue, H., Meihan, C. et al. Separable robust data hiding in encrypted image based on continuous quadrant tree and 2Bin N-nary. Pattern Anal Applic 26, 123–161 (2023). https://doi.org/10.1007/s10044-022-01096-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10044-022-01096-x

Keywords