Abstract
In this paper, a separable data hiding algorithm in encrypted images with controllable and high-capacity is proposed. Firstly, the original image is decomposed into important coefficients and unimportant coefficients by discrete wavelet transform (DWT). Secondly, DWT is applied again on unimportant coefficients matrixes and then the obtained coefficients matrixes are compressed using compressive sensing (CS) to empty space for data hiding. All the important coefficients are encrypted using the traditional stream cipher by the content owner. Thirdly, the data hider hides the pretreated data information in the free space. Finally, the encrypted image containing additional data is scrambled to improve the security. The receiver can separably extract the hiding data or/and decrypt the image depending on the keys he owns. Compared with the previous work, there are various advantages in the proposed algorithm, such as the separability between image recovery and data extraction, the controllable and high-capacity for data hiding. Experimental results verify the superiority of the proposed algorithm.














Similar content being viewed by others
References
Al-Otaibi NA, Gutub AA (2014) Flexible stego-system for hiding text in images of personal computers based on user security priority. In: Proceedings of 2014 International Conference on Advanced Engineering Technologies, pp 250–256
Al-Otaibi NA, Gutub AA-A (2014) 2-leyer security system for hiding sensitive text data on personal computers. In: Proceeding of the 3rd international conference on advancements in information technology (ICAIT), pp 73–79
Alotaibi N, Gutub A, Khan E (2015) Stego-system for hiding text in images of personal computers. The 12th Learning and Technology Conference: Wearable Tech/Wearable Learning, pp 12–13
Baraniuk RG (2007) Compressive Sensing [Lecture Notes]. IEEE Signal Process Mag 4(24):118–121
Candes EJ, Tao T (2006) Near-optimal signal recovery from random projections: Universal encoding strategies. IEEE Trans Inf Theory 52(12):5406–5425
Candès EJ, Wakin MB (2008) An introduction to compressive sampling. IEEE Signal Process Mag 25(2):21–30
Candès EJ, Romberg J, Tao T (2006) Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Trans Inf Theory 52(2):489–509
Chen GF, Guo SX, Yang LI, Liang LI (2012) Digital image watermark algorithm based on compressive sensing. Modern Electronics Technique 35(13):98–101
Chen RJ, Horng SJ, Huang PH (2015) Anti–forensic steganography using multi–bit MER with flexible bit location. Int J Ad Hoc Ubiquitous Comput. 18(1–2):54–66
Cui J, Liu Y, Xu Y, Zhao H, Zha H (2013) Tracking generic human motion via fusion of low-and high-dimensional approaches. IEEE transactions on systems, man, and cybernetics: systems 43(4):996–1002
Do TT, Gan L, Nguyen NH, Tran TD (2011) Fast and efficient compressive sensing using structurally random matrices. IEEE Trans Signal Process 60(1):139–154
Dong J, Li J, Guo Z (2016) A Robust Watermarking Algorithm for Medical Images in the Encrypted Domain. International Conference on Smart Health, pp 217–229
Figueiredo MAT, Nowak RD, Wright SJ (2007) Gradient projection for sparse reconstruction: application to compressed sensing and other inverse problems. IEEE J Sel Top Sign Proces 1(4):586–597
Gutub AA-A (2010) Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence. 2(1):56–64
Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19(4):199–202
Huang HC, Chang FC (2014) Robust image watermarking based on compressed sensing techniques. Journal of Information Hiding and Multimedia Signal Processing 5(2):275–285
Khan F, Gutub AA-A (2007) Message concealment techniques using image based steganography. In: Proceeding of 4th IEEE GCC conference and exhibition, gulf international convention centre, Manamah, Bahrain, 11–14 November, pp 1–6
Kim C, Shin D, Leng L, Yang CN (2016) Lossless data hiding for absolute moment block truncation coding using histogram modification. Journal of Real-Time Image Processing. https://doi.org/10.1007/s11554-016-0641-8
Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. International Journal of Physical Sciences 5(17):2543–2554
Leng L, Zhang J, Xu J, Khan MK, Alghathbar K (2010) Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition. International Conference on Information and Communication Technology Convergence 2010:467–471
Leng L, Teoh ABJ, Li M, Khan MK (2014) Analysis of correlation of 2dpalmhash code and orientation range suitable for transposition. Neurocomputing 131(9):377–387
Li W, Pan JS, Yan L, Yang CS (2013) Data hiding based on subsampling and compressive sensing. Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp 9191–9205
Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2015) Action2Activity: Recognizing Complex Activities from Sensor Data. In: Proceedings of the International Joint Conference on Artificial Intelligence, pp 1617–1623
Liu L, Cheng L, Liu Y, Jia Y, Rosenblum DS (2016) Recognizing complex activities by a probabilistic interval-based model. Thirtieth AAAI Conference on Artificial Intelligence, pp 1266–1272
Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: Sensor-based activity recognition. Neurocomputing 181:108–115
Liu Y, Zhang L, Nie L, Yan, Y, Rosenblum DS (2016) Fortune Teller: Predicting Your Career Path. Thirtieth AAAI Conference on Artificial Intelligence, pp 201–207
Liu Y, Zheng Y, Liang Y, Liu S, Rosenblum DS (2016) Urban water quality prediction based on multi-task multi-view learning. In: Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, pp 2576–2582
Nazeer M., Kim DG (2012) An efficient data hiding technique in frequency domain by using fresnelet basis. In: Proceedings of the World Congress on Engineering, pp 1156–1161
Nowak RD, Wright SJ (2007) Gradient projection for sparse reconstruction: Application to compressed sensing and other inverse problems. IEEE J Sel Top Sign Proces 1(4):586–597
Parvez MT, Gutub AA-A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait Journal of Science and Engineering (KJSE) 38(1B):127–142
Puech W, Chaumont M, Strauss O (2008) A reversible data hiding method for encrypted images. In: Electronic Imaging, International Society for Optics and Photonics, pp 68191E-68191E
Rani A, Raman B (2016) An image copyright protection scheme by encrypting secret data with the host image. Multimedia Tools and Applications 75(2):1027–1042
Subramanyam AV, Emmanuel S, Kankanhalli MS (2010) Compressed-encrypted domain JPEG2000 image watermarking. IEEE International Conference on Multimedia and Expo, pp 1315–1320
Thakkar FN, Srivastava VK (2017) A fast watermarking algorithm with enhanced security using compressive sensing and principle components and its performance analysis against a set of standard attacks. Multimedia Tools and Applications 76(14):15191–15219
Veena VK, Lal GJ, Prabhu SV, Kumar SS, Soman KP (2012) A robust watermarking method based on Compressed Sensing and Arnold scrambling. In Machine Vision and Image Processing (MVIP), pp 105–108
Xiao D, Chen S (2014) Separable data hiding in encrypted image based on compressive sensing. Electron Lett 50(8):598–600
Xiao D, Cai H, Wang Y, Bai S (2016) High-capacity separable data hiding in encrypted image based on compressive sensing. Multimedia Tools and Applications 75(21):13779–13789
Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258
Acknowledgements
The work was funded by the National Natural Science Foundation of China (Grant Nos. 61572089, 61472464, 61633005), the Natural Science Foundation of Chongqing Science and Technology Commission (Grant Nos. cstc2017jcyjBX0008, cstc2014jcyjA40030, cstc2015jcyjA40039), the Project Supported by Graduate Student Research and Innovation Foundation of Chongqing (Grant No. CYB17026) and the Fundamental Research Funds for the Central Universities (Grant Nos., 106112017CDJQJ188830, 106112017CDJXY180005).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Xiao, D., Zhao, J., Wang, M. et al. Controllable high-capacity separable data hiding in encrypted images by compressive sensing and data pretreatment. Multimed Tools Appl 77, 23949–23968 (2018). https://doi.org/10.1007/s11042-018-5726-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-5726-x