Abstract
In this paper, we propose a novel real-time scheme of separable reversible data hiding in encrypted images, which consists of image encryption, data embedding, data extraction and image recovery. In image encryption phase, the content owner divides the original image into a number of non-overlapping blocks and encrypts blocks by stream cipher and permutation. During the data embedding phase, the data hider classifies encrypted blocks into smooth region and complex region according to the threshold and replaces the MSB layer of a part of pixels in blocks of smooth region with the secret data. Then, the LSB layers of other pixels are collected and compressed to generate a room for embedding the secret data again. When the receiver receives the marked image, he can divide the marked image into blocks and decrypt them by the encryption key to obtain a similar image with good quality. If the receiver only has the data hiding key, he can classify the blocks into smooth region and complex region according to the threshold and extract the embedded data by the data hiding key. If the receiver has both encryption key and data hiding key, he can extract the embedded data from the marked image and recover the original image perfectly. The proposed scheme can achieve satisfactory quality of decrypted image and high embedding rate. Experimental results demonstrate the effectiveness and computational efficiency of our scheme.








Similar content being viewed by others
References
Zhang, Y., Qin, C., Zhang, W.M., Liu, F.L., Luo, X.Y.: On the fault-tolerant performance for a class of robust image steganography. Signal Process. 146, 99–111 (2018)
Qin, C., Chang, C.C., Chiu, Y.P.: A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans. Image Process. 23(3), 969–978 (2014)
Ma, Y.Y., Luo, X.Y., Li, X.L., Bao, Z.K., Zhang, Y.: Selection of rich model steganalysis features based on decision rough set α-positive region reduction. IEEE Trans. Circuits Syst. Video Technol. (2018). https://doi.org/10.1109/TCSVT.2018.2799243
Luo, X.Y., Song, X.F., Li, X.L., Zhang, W.M., Lu, J.C., Yang, C.F., Liu, F.L.: Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multimed. Tools Appl. 75(21), 13557–13583 (2016)
Qin, C., Ji, P., Zhang, X.P., Dong, J., Wang, J.W.: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 138, 280–293 (2017)
Qin, C., Ji, P., Chang, C.-C., Dong, J., Sun, X.M.: Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimed. (2018). https://doi.org/10.1109/MMUL.2018.112142509
Qin, C., Chen, X.Q., Ye, D.P., Wang, J.W., Sun, X.M.: A novel image hashing scheme with perceptual robustness using block truncation coding. Inf. Sci. 361–362, 84–99 (2016)
Qin, C., Chen, X.Q., Luo, X.Y., Zhang, X.P., Sun, X.M.: Perceptual image hashing via dual-cross pattern encoding and salient structure detection. Inf. Sci. 423, 284–302 (2018)
Yao, H., Qin, C., Tang, Z.J., Tian, Y.: Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels’ coordinates with minimum distortion. Signal Process. 135, 26–35 (2017)
Yao, H., Qin, C., Tang, Z.J., Tian, Y.: Guided filtering based color image reversible data hiding. J. Vis. Commun. Image Represent. 43, 152–163 (2017)
Li, X.L., Zhang, W.M., Gui, X.L., Yang, B.: Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 10(9), 2016–2027 (2015)
Ou, B., Li, X.L., Zhao, Y., Ni, R.R., Shi, Y.Q.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010–5021 (2013)
Li, X.L., Li, B., Yang, B., Zeng, T.Y.: General framework to histogram-shifting-based reversible data hiding. IEEE Trans. Image Process. 22(6), 2181–2191 (2013)
Qin, C., Chang, C.C., Huang, Y.H., Liao, L.T.: An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7), 1109–1118 (2013)
Qin, C., Chang, C.C., Hsu, T.J.: Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed. Tools Appl. 74(15), 5861–5872 (2015)
Hu, R., Li, X., Yang, B.: A new lossy compression scheme for encrypted gray-scale images. In: IEEE International Conference on Acoustic, Speech and Signal Processing, pp. 7387–7390 (2014)
Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255–258 (2011)
Hong, W., Chen, T., Wu, H.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)
Liao, X., Shu, C.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Represent. 28, 21–27 (2015)
Liu, W., Zeng, W., Dong, L., Yao, Q.: Efficient compression of encrypted grayscale images. IEEE Trans. Image Process. 19(4), 1097–1102 (2010)
Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)
Qian, Z., Zhang, X., Feng, G.: Reversible data hiding in encrypted images based on progressive recovery. IEEE Signal Process. Lett. 23(11), 1672–1676 (2016)
Bianchi, T., Piva, A., Barni, M.: On the implementation of the discrete Fourier transform in the encrypted domain. IEEE Trans. Inf. Forensics Secur. 4(1), 86–97 (2009)
Puteaux, P., Trinel, D., Puech, W.: High-capacity data hiding in encrypted images using MSB prediction. In: 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA), Oulu, Finland, pp. 1–6 (2016)
Zhang, X., Qian, Z., Feng, G., Ren, Y.: Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image Represent. 25(2), 322–328 (2014)
Qian, Z., Zhang, X.: Reversible data hiding in encrypted image by distributed encoding. IEEE Trans. Circuits Syst. Video Technol. 26(4), 636–646 (2016)
Qin, C., Zhang, X.P.: Effective reversible data hiding in encrypted image with privacy protection for image content. J. Vis. Commun. Image Represent. 31, 154–164 (2015)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
Acknowledgements
This work was supported by the National Natural Science Foundation of China (61672354, 61702332), Shanghai Engineering Center Project of Massive Internet of Things Technology for Smart Home (GCZX14014), and Hujiang Foundation of China (C14001, C14002). The authors would like to thank the anonymous reviewers for their valuable comments.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, W., Kong, P., Yao, H. et al. Real-time reversible data hiding in encrypted images based on hybrid embedding mechanism. J Real-Time Image Proc 16, 697–708 (2019). https://doi.org/10.1007/s11554-018-0811-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11554-018-0811-y