Skip to main content
Log in

Encrypted separable reversible watermarking with authentication and error correction

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Reversible Watermarking (RW) in encrypted images helps to reconstruct the original content and embedded data without distortion while protecting the owner’s privacy. The security and integrity of embedded data is very much demanding. In this paper, an efficient RW method is proposed that recovers the embedded data from the marked encrypted color palette images in the presence of attacks. In this method, embeddable color-triples are constructed by employing color partitioning. Next, the cryptographic SHA-256 hash and Bose–Chaudhuri–Hocquenghem (BCH) are applied over the secret information to ensure the authenticity and integrity. The hash authenticated secret data is embedded into the encrypted color palette image. The secret data is extracted using the separable color partitioning method and authenticated with cryptographic hash function. The proposed method has higher embedding capacity when compared to other relative schemes. The BCH codes helps to recover the secret data and cover image in the presence of noise and attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Alattar AM (2004) Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform. IEEE Trans Image Process 13(8):1147–1156. https://doi.org/10.1109/TIP.2004.828418

    Article  MathSciNet  Google Scholar 

  2. Barton JM 1997 Method and apparatus for embedding authentication information within digital data. US Patent 5646997

  3. Caldelli R, Filippini F, Becarelli R (2010) Reversible Watermarking Techniques: An Overview and a Classification. EURASIP J Inf Secur 2010(2):1–19 10.1155/2010/134546

    Google Scholar 

  4. Chao H-M, Hsu C-M, Miaou S-G (2002) A data-hiding Technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6(1):46–53. https://doi.org/10.1109/4233.992161

    Article  Google Scholar 

  5. Chen Y-H, Huang H-C, Lin C-C (2016) Block-based reversible data hiding with multi-round estimation and difference alteration. Multimedia Tools and Applications 75(21):13679–13704. https://doi.org/10.1007/s11042-015-2825-9

    Article  Google Scholar 

  6. Fallahpour M (2008) Reversible image data hiding based on gradient adjusted prediction. IEICE Electronics Express 5(20):870–876 10.1587/elex.5.870

    Article  Google Scholar 

  7. Feng J-B, Lin I-C, Tsai C-S, Chu Y-P (2006) Reversible Watermarking : Current status and key issues. International Journal of Network Security 2:161–171 10.1.1.97.507

    Google Scholar 

  8. Fontaine C, Galand F (2008) How Reed-Solomon Codes Can Improve Steganographic Schemes. EURASIP J Inf Secur 2009:274845.1–274845.10. https://doi.org/10.1155/2009/274845

    Article  Google Scholar 

  9. Guruswami V, Sudan M (1999) Improved decoding of Reed Solomon and Algebraic-Geometry Codes. IEEE Trans Inf Theory 45(6):1757–1767. https://doi.org/10.1109/18.782097

    Article  MathSciNet  MATH  Google Scholar 

  10. Hong W, Chen T, Wu H (2012) An Improved Reversible Data Hiding in Encrypted Images using Side Match. IEEE Signal Processing Letters 19(4):199–202. https://doi.org/10.1109/LSP.2012.2187334

    Article  Google Scholar 

  11. Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Inf Sci 279:251–272. https://doi.org/10.1016/j.ins.2014.03.118

    Article  Google Scholar 

  12. Kim C, Shin D, Lu L, Yang C-N (2016) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14:101–114. https://doi.org/10.1007/s11554-016-0641-8

    Article  Google Scholar 

  13. Kim C, Shin D, Shin D (2011) Data hiding in a halftone image using hamming code (15, 11). Intelligent Information and Database Systems 6592:372–381. https://doi.org/10.1007/978-3-642-20042-7_38

    Article  Google Scholar 

  14. Lee S-K, Suh Y-H, Ho Y-S (2006) Reversible Image Authentication Based on Watermarking. Proceedings of the IEEE International Conference Multimedia Expo:1321–1324 10.1.1.420.5626

  15. Lee J-H, Wu M-Y (2008) Reversible Data Hiding Scheme for Color Image Protection Based on Palette Color Replacement. Third International Conference on Innovative Computing Information and Control:1–4. https://doi.org/10.1109/ICICIC.2008.471

  16. Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36:1365–1371. https://doi.org/10.1016/j.jnca.2013.02.034

    Article  Google Scholar 

  17. Liao X, Yin J, Guo S, Li X, Sangaiah AK (2017) Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng:1–10. https://doi.org/10.1016/j.compeleceng.2017.08.020

    Article  Google Scholar 

  18. Liao X, Zheng Q, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156. https://doi.org/10.1016/j.image.2017.07.006

    Article  Google Scholar 

  19. Lien BK, Chen SK, Wang WS, King KP (2015) Dispersed Data Hiding using Hamming Code with Recovery Capability. Genetic and Evolutionary Computing 329:179–187. https://doi.org/10.1007/978-3-319-12286-1_18

    Article  Google Scholar 

  20. Lin C-H, Yeh Y-S, Chien S-P, Lee C-Y, Chien H-S (2011) Generalized Secure Hashing Algorithm: SHA-X. International Conference on Computer as a Tool:1–4. https://doi.org/10.1109/EUROCON.2011.5929187

  21. Ma K, Zhang W, Zhao X, Li NYF (2013) Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption. IEEE Transactions on Information Forensics and Security 8(3):553–562. https://doi.org/10.1109/TIFS.2013.2248725

    Article  Google Scholar 

  22. Ni Z, Shi Y-Q, Ansari N, Wei S (2006) Reversible Data Hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3):354–362. https://doi.org/10.1109/TCSVT.2006.869964

    Article  Google Scholar 

  23. Prathap I, Natarajan V, Anitha R (2014) Hybrid robust watermarking for color images. Comput Electr Eng 40(3):920–930. https://doi.org/10.1016/j.compeleceng.2014.01.006

    Article  Google Scholar 

  24. Qian Z, Zhou H, Zhang X, Zhang W (2016) Separable Reversible Data Hiding in Encrypted JPEG Bitstreams. IEEE Transactions on Dependable and Secure Computing 99:1–13. https://doi.org/10.1109/TDSC.2016.2634161

    Article  Google Scholar 

  25. Qin Z, Zhang X, Wang S (2014) Reversible Data Hiding in Encrypted JPEG bitstream. IEEE Transactions on Multimedia 16(5):1486–1491. https://doi.org/10.1109/TMM.2014.2316154

    Article  Google Scholar 

  26. Sabery MK, Yaghoobi M (2008) A New Approach for Image Encryption using Chaotic Logistic Map. International Conference on Advanced Computer Theory and Engineering:585–590. https://doi.org/10.1109/ICACTE.2008.177

  27. Shi Y-Q, Li X, Zhang X, Wu H-T, Ma B (2016) Reversible Data Hiding: Advances in the Past Two Decades. IEEE Access 4:3210–3237. https://doi.org/10.1109/ACCESS.2016.2573308

    Article  Google Scholar 

  28. Solanki K, Jacobsen N, Madhow U, Manjunath BS, Chandrasekaran S (2004) Robust image-adaptive data hiding based on erasure and error correction. IEEE Trans Image Process 13(12):1627–1639. https://doi.org/10.1109/TIP.2004.837557

    Article  Google Scholar 

  29. Thodi DM, Rodriguez JJ (2004) Prediction-error based reversible watermarking. Proc IEEE Int Conf Inf Process 3:1549–1552. https://doi.org/10.1109/ICIP.2004.1421361

    Article  Google Scholar 

  30. Thodi DM, Rodríguez JJ (2007) Expansion Embedding Techniques for Reversible Watermarking. IEEE Trans Image Process 16(3):721–730. https://doi.org/10.1109/TIP.2006.891046

    Article  MathSciNet  Google Scholar 

  31. Tian J (2003) Reversible Data Embedding Using a Difference Expansion. IEEE Transactions on Circuits and Systems For Video Technology 13(8):890–896. https://doi.org/10.1109/TCSVT.2003.815962

    Article  Google Scholar 

  32. Wu H-Z, Shi Y-Q, Wang H-X, Zhou L-N (2016) Separable Reversible Data Hiding for Encrypted Palette Images with Color Partitioning and Flipping Verification. IEEE Transactions on Circuits and Systems for Video Technology 27(8):1620–1631. https://doi.org/10.1109/TCSVT.2016.2556585

    Article  Google Scholar 

  33. Xu S, Wang Y (2010) A Novel Image Encryption Scheme based on a Nonlinear Chaotic Map. International Journal on Image, Graphics and Signal Processing 1:61–68

    Article  Google Scholar 

  34. Zhang X (2011) Reversible Data Hiding in Encrypted Image. IEEE Signal Processing Letters 18(4):255–258. https://doi.org/10.1109/LSP.2011.2114651

    Article  Google Scholar 

  35. Zhang X (2012) Separable Reversible Data Hiding in Encrypted Image. IEEE Transaction on Information Forensics and Security 7(2):826–832. https://doi.org/10.1109/TIFS.2011.2176120

    Article  Google Scholar 

  36. Zhang X, Qian Z, Feng G, Ren Y (2014) Efficient Reversible Data Hiding in Encrypted Images. ournal of. Visual Communication and Image Representation 25(2):322–328. https://doi.org/10.1016/j.jvcir.2013.11.001

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Vinoth Kumar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vinoth Kumar, C., Natarajan, V., Nirmala, K. et al. Encrypted separable reversible watermarking with authentication and error correction. Multimed Tools Appl 78, 7005–7027 (2019). https://doi.org/10.1007/s11042-018-6450-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6450-2

Keywords

Navigation