Abstract
Data hiding is a noteworthy research topic in digital technology for years. It can be used for copyright protection, authentication, content-ownership verification, and sending patient information. Focusing on how to improve the security, capacity, visual quality and robustness, a separable robust data hiding in encrypted image based on Continuous Quadrant Tree (CQT) and 2Bin N-nary is proposed. In this work, the definition of CQT, constraints of the sub-tree roots, generation and traversal of CQT are proposed for the first time. To achieve security, matrix traversal, CQT and rotation encryption are combined. When select embedding interval, a histogram preprocessing algorithm based on pixel fluctuation is presented. This paper achieves separable decryption and extraction. Experimental results demonstrate that the capacity has been improved by 50–70% compared with the similar scheme. It not only achieves high security and high visual quality, but also is robust to various attacks.






























Similar content being viewed by others
References
NiZ P, ShiY Q, AnsariN SuW (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16:354–362
TsaiP HuYC, YehH L (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89:1129–1143
ZhangW M, HuX C, LiX L, YuN H (2013) Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans Image Process 22:2775–2785
DragoiI C, Coltuc D (2016) Adaptive pairing reversible watermarking. IEEE Trans Image Process 25:2420–2422
Li X, Zhang W, Gui X, Yang B (2017) Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forens. Secur 10:2016–2027
WangJ X, MaoN X, ChenX NQ, WangC T, ShiY Q (2019) Multiple histograms based reversible data hiding by using FCM clustering. Signal Process 159:193–203
WengS W, TanW QuB, PanJ S (2021) Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm. Inf Sci 549:13–33
LiM LiY (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190–196
XiongL Z, DongD P, XiaZ H, ChenX Y (2018) High-capacity reversible data hiding for encrypted multimedia data with somewhat homomorphic encryption. IEEE Access 6:60635–60644
Xiang S, Kim HJ, Huang J (2008) Invariant image watermarking based on statistical features in the low-frequency domain. IEEE Trans Circ Syst Video Technol 18:777–790
ChenD GB, PengH AL, FengJ J (2010) Histogram modification based robust image watermarking approach. Int J Multimedia Intell Secur 1:153–168
GaoX B, TaoD C, LiX L (2010) Local histogram based geometric invariant image watermarking. Signal Process 90:3256–3264
HeX S, ZhuT YB (2015) A geometrical attack resistant image watermarking algorithm based on histogram modification. Multidimension Syst Signal Process 26:291–306
Wang JJ, LiG Y, XiaG E, SunZ R (2020) A separable and reversible data hiding algorithm in encrypted domain based on image interpolation space. Acta Electron Sin 48:92–100
Wang S, Cui C, Niu XM (2017) A novel DIBR 3D image watermarking algorithm resist to geometrical attacks. Chin J Electron 26:1184–1193
Yue Z, Li ZC, Yang XY, You FC, Liu FP (2020) A histogram-based 2Bin M-ary image digital watermarking algorithm. Acta Electron Sin 48:531–537
Zong TR, Xiang Y, Natgunanathan I (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 25:717–729
Feng BW, Weng J, Lu W (2017) Improved algorithms for robust histogram shape-based image watermarking. International Workshop on Digital Watermarking. Springer, Berlin, pp 275–289
Pan HL, Lei YM, Jian C (2018) Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP J Image Video Process 1:142–152
Dua M, Kumar A, Garg A (2022) Multiple image encryption approach using non linear chaotic map and cosine transformation. Int J Inf Technol 14(3):1627–1641
Wadi SM, Zainal N (2013) Rapid encryption method based on AES algorithm for grey scale HD image encryption. Procedia Technol 11(3):51–56
Wu JJ, Liu ZJ, Wang JC (2021) A compact image encryption system based on Arnold transformation. Multimedia Tools Appl 80(6):2647–2661
Zhu G, Zhang X (2008) Mixed image element encryption algorithm based on an elliptic curve cryptosystem. J Electron Imaging 17(2):023007
Yuan X, Zhang LH, Chen J (2019) Multiple-image encryption scheme based on ghost imaging of Hadamard matrix and spatial multiplexing. Appl Phys B 125:174
Lv XP, Liao XF, Yang B (2018) Bit-level plane image encryption based on coupled map lattice with timevarying delay. Mod Phys Lett B 32(10):1850124
Gan ZH, Chai XL, Yuan K (2018) A novel image encryption algorithm based on LFT based S-boxes and chaos. Multimed Tools Appl 77(7):8759–8783
Wang X, Li Z (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng 115:107–118
Wang XY, Lin SJ, Li Y (2021) Bit-level image encryption algorithm based on BP neural network and gray code. Multimedia Tools Appl 80:11655–11670
Nandy N, Banerjee D, Pradhan C (2021) Color image encryption using DNA based cryptography. Int J Inf Technol 13:533–540
Hanis S, Amutha R (2019) A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95:421–432
The USC-SIPI image database [Online] (2016) http://sipi.usc.edu/database/ .
UCID-uncompressed colour image database [Online] (2016) http://homepages.lboro.ac.uk/cogs/datasets/UCID/ucid.html.
Kodak lossless true color image suite [Online] (2016) http://r0k.us/graphics/kodak/ .
Acknowledgements
This work was supported by the Scientific Research Program Funded by Liaoning Provincial Education Department (Grant No. WQ2020014), the Key Research Project of Dalian academy of social sciences (Grant Nos. 2020dlsky042, 2021dlsky027) and Liaoning Planning Office of Philosophy and Social Science (CN) (Grant No. L19BTQ001), the National Youth Science Foundation of China(Grant No. 61601214).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Hui, S., Baoyue, H., Meihan, C. et al. Separable robust data hiding in encrypted image based on continuous quadrant tree and 2Bin N-nary. Pattern Anal Applic 26, 123–161 (2023). https://doi.org/10.1007/s10044-022-01096-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10044-022-01096-x