Skip to main content
Log in

Separable reversible data hiding in encrypted images with improved security and capacity

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Reversible data hiding (RDH) has to be conducted in the encrypted images when original images are encrypted for privacy protection in some open environments, including the cloud computing. However, the current RDH algorithms in encrypted images with error-free decryption may lead to leakage of image content and low embedding rate. In this paper, a novel RDH algorithm for image in encryption domain is proposed. To improve security, we propose a combined block permutation and a stream cipher into the encryption step, which considers data hiding in later steps. We further increase the embedding rate by proposing bit replacement in prediction error. This scheme has the advantages of built-in embedding flag, error-free decryption and high embedding rate. It can be applied to a wide variety of scenarios: If the recipient has only the data-hiding key, he can extract the hidden data but cannot restore the image; If the recipient has only the image encryption key, he can read the distorted image but cannot extract the hidden data; If the recipient has both keys, he can extract the hidden data and restore the original image completely.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253–266

    Article  Google Scholar 

  2. Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process 19(4):199–202

    Article  Google Scholar 

  3. Huang F, Huang J, Shi YQ (2016) New framework for Reversible data hiding in encrypted domain. IEEE Trans Inf Forensics Secur 11(12):2777–2789

    Article  Google Scholar 

  4. Li M, Li Y (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190–196

    Article  Google Scholar 

  5. Liu Y, Nie LQ, Han L, Zhang LM, Rosenblum DS (2015) Action2activity: recognizing complex activities from sensor data. In: International conference on artificial intelligence, pp 1617–1623

  6. Liu Y, Nie LQ, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108–115

    Article  Google Scholar 

  7. Liu Y, Zhang LM, Nie LQ, Yan Y, Rosenblum DS (2016) Fortune teller: predicting your career path. In: Proceedings of the Thirtieth AAAI conference on artificial intelligence, pp 201–207

  8. Liu Y, Zheng Y, Liang YX, Liu SM, Rosenblum DS (2016) Urban water quality prediction based on multi-task multi-view learning. In: Proceedings of the Twenty-Fifth international joint conference on artificial intelligence, pp 2576–2582

  9. Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5 (3):187–191

    Article  Google Scholar 

  10. Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8(3):553–562

    Article  Google Scholar 

  11. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362

    Article  Google Scholar 

  12. Preotiuc-Pietro D, Liu Y, Hopkins DJ, Ungar L (2017) Beyond binary labels: political ideology prediction of twitter users. In: Meeting of the association for computational linguistics, pp 729–740

  13. Qian Z, Zhang XP (2016) Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans Circuits Syst Video Technol 26(4):636–646

    Article  Google Scholar 

  14. Qin C, Chang CC, Hsu TJ (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimedia Tools and Applications 74(15):5861–5872

    Article  Google Scholar 

  15. Qin C, Zhang XP (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164

    Article  Google Scholar 

  16. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Transactions on Cricuits and Systems for Video Technology 13(8):890–896

    Article  Google Scholar 

  17. Xiao D, Xiang YP, Zheng HY, Wang Y (2017) Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism. J Vis Commun Image R 45:1–10

    Article  Google Scholar 

  18. Xu DW, Wang RD (2016) Separable and error-free reversible data hiding in encrypted images. Signal Process 123:9–21

    Article  Google Scholar 

  19. Zhang XP (2011) Reversible data hiding in encrypted image. IEEE Signal Process 18(4):255–258

    Article  Google Scholar 

  20. Zhang XP (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):826–832

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (NSFC) (No. 61272432) and Shandong Provincial Natural Science Foundation (No. ZR2014JL044).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bin Yan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, Q., Yan, B., Li, H. et al. Separable reversible data hiding in encrypted images with improved security and capacity. Multimed Tools Appl 77, 30749–30768 (2018). https://doi.org/10.1007/s11042-018-6187-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6187-y

Keywords

Navigation