Skip to main content

Advertisement

Log in

Real-time reversible data hiding in encrypted images based on hybrid embedding mechanism

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

In this paper, we propose a novel real-time scheme of separable reversible data hiding in encrypted images, which consists of image encryption, data embedding, data extraction and image recovery. In image encryption phase, the content owner divides the original image into a number of non-overlapping blocks and encrypts blocks by stream cipher and permutation. During the data embedding phase, the data hider classifies encrypted blocks into smooth region and complex region according to the threshold and replaces the MSB layer of a part of pixels in blocks of smooth region with the secret data. Then, the LSB layers of other pixels are collected and compressed to generate a room for embedding the secret data again. When the receiver receives the marked image, he can divide the marked image into blocks and decrypt them by the encryption key to obtain a similar image with good quality. If the receiver only has the data hiding key, he can classify the blocks into smooth region and complex region according to the threshold and extract the embedded data by the data hiding key. If the receiver has both encryption key and data hiding key, he can extract the embedded data from the marked image and recover the original image perfectly. The proposed scheme can achieve satisfactory quality of decrypted image and high embedding rate. Experimental results demonstrate the effectiveness and computational efficiency of our scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Zhang, Y., Qin, C., Zhang, W.M., Liu, F.L., Luo, X.Y.: On the fault-tolerant performance for a class of robust image steganography. Signal Process. 146, 99–111 (2018)

    Article  Google Scholar 

  2. Qin, C., Chang, C.C., Chiu, Y.P.: A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans. Image Process. 23(3), 969–978 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  3. Ma, Y.Y., Luo, X.Y., Li, X.L., Bao, Z.K., Zhang, Y.: Selection of rich model steganalysis features based on decision rough set α-positive region reduction. IEEE Trans. Circuits Syst. Video Technol. (2018). https://doi.org/10.1109/TCSVT.2018.2799243

    Google Scholar 

  4. Luo, X.Y., Song, X.F., Li, X.L., Zhang, W.M., Lu, J.C., Yang, C.F., Liu, F.L.: Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multimed. Tools Appl. 75(21), 13557–13583 (2016)

    Article  Google Scholar 

  5. Qin, C., Ji, P., Zhang, X.P., Dong, J., Wang, J.W.: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 138, 280–293 (2017)

    Article  Google Scholar 

  6. Qin, C., Ji, P., Chang, C.-C., Dong, J., Sun, X.M.: Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimed. (2018). https://doi.org/10.1109/MMUL.2018.112142509

    Google Scholar 

  7. Qin, C., Chen, X.Q., Ye, D.P., Wang, J.W., Sun, X.M.: A novel image hashing scheme with perceptual robustness using block truncation coding. Inf. Sci. 361–362, 84–99 (2016)

    Article  Google Scholar 

  8. Qin, C., Chen, X.Q., Luo, X.Y., Zhang, X.P., Sun, X.M.: Perceptual image hashing via dual-cross pattern encoding and salient structure detection. Inf. Sci. 423, 284–302 (2018)

    Article  MathSciNet  Google Scholar 

  9. Yao, H., Qin, C., Tang, Z.J., Tian, Y.: Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels’ coordinates with minimum distortion. Signal Process. 135, 26–35 (2017)

    Article  Google Scholar 

  10. Yao, H., Qin, C., Tang, Z.J., Tian, Y.: Guided filtering based color image reversible data hiding. J. Vis. Commun. Image Represent. 43, 152–163 (2017)

    Article  Google Scholar 

  11. Li, X.L., Zhang, W.M., Gui, X.L., Yang, B.: Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 10(9), 2016–2027 (2015)

    Article  Google Scholar 

  12. Ou, B., Li, X.L., Zhao, Y., Ni, R.R., Shi, Y.Q.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010–5021 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  13. Li, X.L., Li, B., Yang, B., Zeng, T.Y.: General framework to histogram-shifting-based reversible data hiding. IEEE Trans. Image Process. 22(6), 2181–2191 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  14. Qin, C., Chang, C.C., Huang, Y.H., Liao, L.T.: An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7), 1109–1118 (2013)

    Article  Google Scholar 

  15. Qin, C., Chang, C.C., Hsu, T.J.: Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed. Tools Appl. 74(15), 5861–5872 (2015)

    Article  Google Scholar 

  16. Hu, R., Li, X., Yang, B.: A new lossy compression scheme for encrypted gray-scale images. In: IEEE International Conference on Acoustic, Speech and Signal Processing, pp. 7387–7390 (2014)

  17. Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255–258 (2011)

    Article  Google Scholar 

  18. Hong, W., Chen, T., Wu, H.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)

    Article  Google Scholar 

  19. Liao, X., Shu, C.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Represent. 28, 21–27 (2015)

    Article  Google Scholar 

  20. Liu, W., Zeng, W., Dong, L., Yao, Q.: Efficient compression of encrypted grayscale images. IEEE Trans. Image Process. 19(4), 1097–1102 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  21. Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)

    Article  Google Scholar 

  22. Qian, Z., Zhang, X., Feng, G.: Reversible data hiding in encrypted images based on progressive recovery. IEEE Signal Process. Lett. 23(11), 1672–1676 (2016)

    Article  Google Scholar 

  23. Bianchi, T., Piva, A., Barni, M.: On the implementation of the discrete Fourier transform in the encrypted domain. IEEE Trans. Inf. Forensics Secur. 4(1), 86–97 (2009)

    Article  Google Scholar 

  24. Puteaux, P., Trinel, D., Puech, W.: High-capacity data hiding in encrypted images using MSB prediction. In: 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA), Oulu, Finland, pp. 1–6 (2016)

  25. Zhang, X., Qian, Z., Feng, G., Ren, Y.: Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image Represent. 25(2), 322–328 (2014)

    Article  Google Scholar 

  26. Qian, Z., Zhang, X.: Reversible data hiding in encrypted image by distributed encoding. IEEE Trans. Circuits Syst. Video Technol. 26(4), 636–646 (2016)

    Article  MathSciNet  Google Scholar 

  27. Qin, C., Zhang, X.P.: Effective reversible data hiding in encrypted image with privacy protection for image content. J. Vis. Commun. Image Represent. 31, 154–164 (2015)

    Article  Google Scholar 

  28. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (61672354, 61702332), Shanghai Engineering Center Project of Massive Internet of Things Technology for Smart Home (GCZX14014), and Hujiang Foundation of China (C14001, C14002). The authors would like to thank the anonymous reviewers for their valuable comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fang Cao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, W., Kong, P., Yao, H. et al. Real-time reversible data hiding in encrypted images based on hybrid embedding mechanism. J Real-Time Image Proc 16, 697–708 (2019). https://doi.org/10.1007/s11554-018-0811-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-018-0811-y

Keywords