Abstract
Reversible Watermarking (RW) in encrypted images helps to reconstruct the original content and embedded data without distortion while protecting the owner’s privacy. The security and integrity of embedded data is very much demanding. In this paper, an efficient RW method is proposed that recovers the embedded data from the marked encrypted color palette images in the presence of attacks. In this method, embeddable color-triples are constructed by employing color partitioning. Next, the cryptographic SHA-256 hash and Bose–Chaudhuri–Hocquenghem (BCH) are applied over the secret information to ensure the authenticity and integrity. The hash authenticated secret data is embedded into the encrypted color palette image. The secret data is extracted using the separable color partitioning method and authenticated with cryptographic hash function. The proposed method has higher embedding capacity when compared to other relative schemes. The BCH codes helps to recover the secret data and cover image in the presence of noise and attacks.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-018-6450-2/MediaObjects/11042_2018_6450_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-018-6450-2/MediaObjects/11042_2018_6450_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-018-6450-2/MediaObjects/11042_2018_6450_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-018-6450-2/MediaObjects/11042_2018_6450_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-018-6450-2/MediaObjects/11042_2018_6450_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-018-6450-2/MediaObjects/11042_2018_6450_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-018-6450-2/MediaObjects/11042_2018_6450_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-018-6450-2/MediaObjects/11042_2018_6450_Fig8_HTML.png)
Similar content being viewed by others
References
Alattar AM (2004) Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform. IEEE Trans Image Process 13(8):1147–1156. https://doi.org/10.1109/TIP.2004.828418
Barton JM 1997 Method and apparatus for embedding authentication information within digital data. US Patent 5646997
Caldelli R, Filippini F, Becarelli R (2010) Reversible Watermarking Techniques: An Overview and a Classification. EURASIP J Inf Secur 2010(2):1–19 10.1155/2010/134546
Chao H-M, Hsu C-M, Miaou S-G (2002) A data-hiding Technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6(1):46–53. https://doi.org/10.1109/4233.992161
Chen Y-H, Huang H-C, Lin C-C (2016) Block-based reversible data hiding with multi-round estimation and difference alteration. Multimedia Tools and Applications 75(21):13679–13704. https://doi.org/10.1007/s11042-015-2825-9
Fallahpour M (2008) Reversible image data hiding based on gradient adjusted prediction. IEICE Electronics Express 5(20):870–876 10.1587/elex.5.870
Feng J-B, Lin I-C, Tsai C-S, Chu Y-P (2006) Reversible Watermarking : Current status and key issues. International Journal of Network Security 2:161–171 10.1.1.97.507
Fontaine C, Galand F (2008) How Reed-Solomon Codes Can Improve Steganographic Schemes. EURASIP J Inf Secur 2009:274845.1–274845.10. https://doi.org/10.1155/2009/274845
Guruswami V, Sudan M (1999) Improved decoding of Reed Solomon and Algebraic-Geometry Codes. IEEE Trans Inf Theory 45(6):1757–1767. https://doi.org/10.1109/18.782097
Hong W, Chen T, Wu H (2012) An Improved Reversible Data Hiding in Encrypted Images using Side Match. IEEE Signal Processing Letters 19(4):199–202. https://doi.org/10.1109/LSP.2012.2187334
Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Inf Sci 279:251–272. https://doi.org/10.1016/j.ins.2014.03.118
Kim C, Shin D, Lu L, Yang C-N (2016) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14:101–114. https://doi.org/10.1007/s11554-016-0641-8
Kim C, Shin D, Shin D (2011) Data hiding in a halftone image using hamming code (15, 11). Intelligent Information and Database Systems 6592:372–381. https://doi.org/10.1007/978-3-642-20042-7_38
Lee S-K, Suh Y-H, Ho Y-S (2006) Reversible Image Authentication Based on Watermarking. Proceedings of the IEEE International Conference Multimedia Expo:1321–1324 10.1.1.420.5626
Lee J-H, Wu M-Y (2008) Reversible Data Hiding Scheme for Color Image Protection Based on Palette Color Replacement. Third International Conference on Innovative Computing Information and Control:1–4. https://doi.org/10.1109/ICICIC.2008.471
Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36:1365–1371. https://doi.org/10.1016/j.jnca.2013.02.034
Liao X, Yin J, Guo S, Li X, Sangaiah AK (2017) Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng:1–10. https://doi.org/10.1016/j.compeleceng.2017.08.020
Liao X, Zheng Q, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156. https://doi.org/10.1016/j.image.2017.07.006
Lien BK, Chen SK, Wang WS, King KP (2015) Dispersed Data Hiding using Hamming Code with Recovery Capability. Genetic and Evolutionary Computing 329:179–187. https://doi.org/10.1007/978-3-319-12286-1_18
Lin C-H, Yeh Y-S, Chien S-P, Lee C-Y, Chien H-S (2011) Generalized Secure Hashing Algorithm: SHA-X. International Conference on Computer as a Tool:1–4. https://doi.org/10.1109/EUROCON.2011.5929187
Ma K, Zhang W, Zhao X, Li NYF (2013) Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption. IEEE Transactions on Information Forensics and Security 8(3):553–562. https://doi.org/10.1109/TIFS.2013.2248725
Ni Z, Shi Y-Q, Ansari N, Wei S (2006) Reversible Data Hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3):354–362. https://doi.org/10.1109/TCSVT.2006.869964
Prathap I, Natarajan V, Anitha R (2014) Hybrid robust watermarking for color images. Comput Electr Eng 40(3):920–930. https://doi.org/10.1016/j.compeleceng.2014.01.006
Qian Z, Zhou H, Zhang X, Zhang W (2016) Separable Reversible Data Hiding in Encrypted JPEG Bitstreams. IEEE Transactions on Dependable and Secure Computing 99:1–13. https://doi.org/10.1109/TDSC.2016.2634161
Qin Z, Zhang X, Wang S (2014) Reversible Data Hiding in Encrypted JPEG bitstream. IEEE Transactions on Multimedia 16(5):1486–1491. https://doi.org/10.1109/TMM.2014.2316154
Sabery MK, Yaghoobi M (2008) A New Approach for Image Encryption using Chaotic Logistic Map. International Conference on Advanced Computer Theory and Engineering:585–590. https://doi.org/10.1109/ICACTE.2008.177
Shi Y-Q, Li X, Zhang X, Wu H-T, Ma B (2016) Reversible Data Hiding: Advances in the Past Two Decades. IEEE Access 4:3210–3237. https://doi.org/10.1109/ACCESS.2016.2573308
Solanki K, Jacobsen N, Madhow U, Manjunath BS, Chandrasekaran S (2004) Robust image-adaptive data hiding based on erasure and error correction. IEEE Trans Image Process 13(12):1627–1639. https://doi.org/10.1109/TIP.2004.837557
Thodi DM, Rodriguez JJ (2004) Prediction-error based reversible watermarking. Proc IEEE Int Conf Inf Process 3:1549–1552. https://doi.org/10.1109/ICIP.2004.1421361
Thodi DM, Rodríguez JJ (2007) Expansion Embedding Techniques for Reversible Watermarking. IEEE Trans Image Process 16(3):721–730. https://doi.org/10.1109/TIP.2006.891046
Tian J (2003) Reversible Data Embedding Using a Difference Expansion. IEEE Transactions on Circuits and Systems For Video Technology 13(8):890–896. https://doi.org/10.1109/TCSVT.2003.815962
Wu H-Z, Shi Y-Q, Wang H-X, Zhou L-N (2016) Separable Reversible Data Hiding for Encrypted Palette Images with Color Partitioning and Flipping Verification. IEEE Transactions on Circuits and Systems for Video Technology 27(8):1620–1631. https://doi.org/10.1109/TCSVT.2016.2556585
Xu S, Wang Y (2010) A Novel Image Encryption Scheme based on a Nonlinear Chaotic Map. International Journal on Image, Graphics and Signal Processing 1:61–68
Zhang X (2011) Reversible Data Hiding in Encrypted Image. IEEE Signal Processing Letters 18(4):255–258. https://doi.org/10.1109/LSP.2011.2114651
Zhang X (2012) Separable Reversible Data Hiding in Encrypted Image. IEEE Transaction on Information Forensics and Security 7(2):826–832. https://doi.org/10.1109/TIFS.2011.2176120
Zhang X, Qian Z, Feng G, Ren Y (2014) Efficient Reversible Data Hiding in Encrypted Images. ournal of. Visual Communication and Image Representation 25(2):322–328. https://doi.org/10.1016/j.jvcir.2013.11.001
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Vinoth Kumar, C., Natarajan, V., Nirmala, K. et al. Encrypted separable reversible watermarking with authentication and error correction. Multimed Tools Appl 78, 7005–7027 (2019). https://doi.org/10.1007/s11042-018-6450-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6450-2