Skip to main content
Log in

Controllable high-capacity separable data hiding in encrypted images by compressive sensing and data pretreatment

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a separable data hiding algorithm in encrypted images with controllable and high-capacity is proposed. Firstly, the original image is decomposed into important coefficients and unimportant coefficients by discrete wavelet transform (DWT). Secondly, DWT is applied again on unimportant coefficients matrixes and then the obtained coefficients matrixes are compressed using compressive sensing (CS) to empty space for data hiding. All the important coefficients are encrypted using the traditional stream cipher by the content owner. Thirdly, the data hider hides the pretreated data information in the free space. Finally, the encrypted image containing additional data is scrambled to improve the security. The receiver can separably extract the hiding data or/and decrypt the image depending on the keys he owns. Compared with the previous work, there are various advantages in the proposed algorithm, such as the separability between image recovery and data extraction, the controllable and high-capacity for data hiding. Experimental results verify the superiority of the proposed algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Al-Otaibi NA, Gutub AA (2014) Flexible stego-system for hiding text in images of personal computers based on user security priority. In: Proceedings of 2014 International Conference on Advanced Engineering Technologies, pp 250–256

  2. Al-Otaibi NA, Gutub AA-A (2014) 2-leyer security system for hiding sensitive text data on personal computers. In: Proceeding of the 3rd international conference on advancements in information technology (ICAIT), pp 73–79

  3. Alotaibi N, Gutub A, Khan E (2015) Stego-system for hiding text in images of personal computers. The 12th Learning and Technology Conference: Wearable Tech/Wearable Learning, pp 12–13

  4. Baraniuk RG (2007) Compressive Sensing [Lecture Notes]. IEEE Signal Process Mag 4(24):118–121

    Article  Google Scholar 

  5. Candes EJ, Tao T (2006) Near-optimal signal recovery from random projections: Universal encoding strategies. IEEE Trans Inf Theory 52(12):5406–5425

    Article  MathSciNet  MATH  Google Scholar 

  6. Candès EJ, Wakin MB (2008) An introduction to compressive sampling. IEEE Signal Process Mag 25(2):21–30

    Article  Google Scholar 

  7. Candès EJ, Romberg J, Tao T (2006) Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Trans Inf Theory 52(2):489–509

    Article  MathSciNet  MATH  Google Scholar 

  8. Chen GF, Guo SX, Yang LI, Liang LI (2012) Digital image watermark algorithm based on compressive sensing. Modern Electronics Technique 35(13):98–101

    Google Scholar 

  9. Chen RJ, Horng SJ, Huang PH (2015) Anti–forensic steganography using multi–bit MER with flexible bit location. Int J Ad Hoc Ubiquitous Comput. 18(1–2):54–66

    Article  Google Scholar 

  10. Cui J, Liu Y, Xu Y, Zhao H, Zha H (2013) Tracking generic human motion via fusion of low-and high-dimensional approaches. IEEE transactions on systems, man, and cybernetics: systems 43(4):996–1002

    Article  Google Scholar 

  11. Do TT, Gan L, Nguyen NH, Tran TD (2011) Fast and efficient compressive sensing using structurally random matrices. IEEE Trans Signal Process 60(1):139–154

    Article  MathSciNet  MATH  Google Scholar 

  12. Dong J, Li J, Guo Z (2016) A Robust Watermarking Algorithm for Medical Images in the Encrypted Domain. International Conference on Smart Health, pp 217–229

  13. Figueiredo MAT, Nowak RD, Wright SJ (2007) Gradient projection for sparse reconstruction: application to compressed sensing and other inverse problems. IEEE J Sel Top Sign Proces 1(4):586–597

    Article  Google Scholar 

  14. Gutub AA-A (2010) Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence. 2(1):56–64

  15. Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19(4):199–202

    Article  Google Scholar 

  16. Huang HC, Chang FC (2014) Robust image watermarking based on compressed sensing techniques. Journal of Information Hiding and Multimedia Signal Processing 5(2):275–285

    Google Scholar 

  17. Khan F, Gutub AA-A (2007) Message concealment techniques using image based steganography. In: Proceeding of 4th IEEE GCC conference and exhibition, gulf international convention centre, Manamah, Bahrain, 11–14 November, pp 1–6

  18. Kim C, Shin D, Leng L, Yang CN (2016) Lossless data hiding for absolute moment block truncation coding using histogram modification. Journal of Real-Time Image Processing. https://doi.org/10.1007/s11554-016-0641-8

  19. Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. International Journal of Physical Sciences 5(17):2543–2554

    Google Scholar 

  20. Leng L, Zhang J, Xu J, Khan MK, Alghathbar K (2010) Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition. International Conference on Information and Communication Technology Convergence 2010:467–471

    Google Scholar 

  21. Leng L, Teoh ABJ, Li M, Khan MK (2014) Analysis of correlation of 2dpalmhash code and orientation range suitable for transposition. Neurocomputing 131(9):377–387

    Article  Google Scholar 

  22. Li W, Pan JS, Yan L, Yang CS (2013) Data hiding based on subsampling and compressive sensing. Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp 9191–9205

  23. Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2015) Action2Activity: Recognizing Complex Activities from Sensor Data. In: Proceedings of the International Joint Conference on Artificial Intelligence, pp 1617–1623

  24. Liu L, Cheng L, Liu Y, Jia Y, Rosenblum DS (2016) Recognizing complex activities by a probabilistic interval-based model. Thirtieth AAAI Conference on Artificial Intelligence, pp 1266–1272

  25. Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: Sensor-based activity recognition. Neurocomputing 181:108–115

    Article  Google Scholar 

  26. Liu Y, Zhang L, Nie L, Yan, Y, Rosenblum DS (2016) Fortune Teller: Predicting Your Career Path. Thirtieth AAAI Conference on Artificial Intelligence, pp 201–207

  27. Liu Y, Zheng Y, Liang Y, Liu S, Rosenblum DS (2016) Urban water quality prediction based on multi-task multi-view learning. In: Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, pp 2576–2582

  28. Nazeer M., Kim DG (2012) An efficient data hiding technique in frequency domain by using fresnelet basis. In: Proceedings of the World Congress on Engineering, pp 1156–1161

  29. Nowak RD, Wright SJ (2007) Gradient projection for sparse reconstruction: Application to compressed sensing and other inverse problems. IEEE J Sel Top Sign Proces 1(4):586–597

    Article  Google Scholar 

  30. Parvez MT, Gutub AA-A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait Journal of Science and Engineering (KJSE) 38(1B):127–142

    Google Scholar 

  31. Puech W, Chaumont M, Strauss O (2008) A reversible data hiding method for encrypted images. In: Electronic Imaging, International Society for Optics and Photonics, pp 68191E-68191E

  32. Rani A, Raman B (2016) An image copyright protection scheme by encrypting secret data with the host image. Multimedia Tools and Applications 75(2):1027–1042

    Article  Google Scholar 

  33. Subramanyam AV, Emmanuel S, Kankanhalli MS (2010) Compressed-encrypted domain JPEG2000 image watermarking. IEEE International Conference on Multimedia and Expo, pp 1315–1320

  34. Thakkar FN, Srivastava VK (2017) A fast watermarking algorithm with enhanced security using compressive sensing and principle components and its performance analysis against a set of standard attacks. Multimedia Tools and Applications 76(14):15191–15219

    Article  Google Scholar 

  35. Veena VK, Lal GJ, Prabhu SV, Kumar SS, Soman KP (2012) A robust watermarking method based on Compressed Sensing and Arnold scrambling. In Machine Vision and Image Processing (MVIP), pp 105–108

  36. Xiao D, Chen S (2014) Separable data hiding in encrypted image based on compressive sensing. Electron Lett 50(8):598–600

    Article  Google Scholar 

  37. Xiao D, Cai H, Wang Y, Bai S (2016) High-capacity separable data hiding in encrypted image based on compressive sensing. Multimedia Tools and Applications 75(21):13779–13789

    Article  Google Scholar 

  38. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258

    Article  Google Scholar 

Download references

Acknowledgements

The work was funded by the National Natural Science Foundation of China (Grant Nos. 61572089, 61472464, 61633005), the Natural Science Foundation of Chongqing Science and Technology Commission (Grant Nos. cstc2017jcyjBX0008, cstc2014jcyjA40030, cstc2015jcyjA40039), the Project Supported by Graduate Student Research and Innovation Foundation of Chongqing (Grant No. CYB17026) and the Fundamental Research Funds for the Central Universities (Grant Nos., 106112017CDJQJ188830, 106112017CDJXY180005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Di Xiao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xiao, D., Zhao, J., Wang, M. et al. Controllable high-capacity separable data hiding in encrypted images by compressive sensing and data pretreatment. Multimed Tools Appl 77, 23949–23968 (2018). https://doi.org/10.1007/s11042-018-5726-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5726-x

Keywords

Navigation