Skip to main content
Log in

Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

Reversible data hiding in encrypted image (RDH-EI) is a hot topic of data hiding in recent years. Most RDH-EI algorithms do not reach desirable embedding rate and their computational costs are not suitable for real-time applications. Aiming at these problems, we propose an efficient RDH-EI algorithm with shifting block histogram of pixel differences in homomorphic encrypted domain. A key step of our RDH-EI algorithm is the block-based encryption scheme with additive homomorphism, which can preserve spatial correlation of plaintext image in homomorphic encrypted domain. In addition, our proposed technique of shifting block histogram can achieve efficient data embedding with high payload and correctly recover image. Extensive experiments are conducted to validate performance of our RDH-EI algorithm. Comparison results illustrate that our RDH-EI algorithm outperforms some state-of-the-art algorithms in terms of embedding rate, visual quality and computational time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Tang, Z., Wang, F., Zhang, X.Q.: Image encryption based on random projection partition and chaotic system. Multimedia Tools Appl. 76(6), 8257–8283 (2017)

    Article  Google Scholar 

  2. Qin, C., Ji, P., Zhang, X.P., Dong, J., Wang, J.W.: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Sig. Process. 138, 280–293 (2017)

    Article  Google Scholar 

  3. Tang, Z., Zhang, X.Q., Zhang, S.C.: Robust perceptual image hashing based on ring partition and NMF. IEEE Trans. Knowl. Data Eng. 26(3), 711–724 (2014)

    Article  Google Scholar 

  4. Tang, Z., Zhang, X.Q., Li, X.X., Zhang, S.C.: Robust image hashing with ring partition and invariant vector distance. IEEE Trans. Inf. Forens. Secur. 11(1), 200–214 (2016)

    Article  Google Scholar 

  5. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kaller, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2007)

    Google Scholar 

  6. Jung, K.H.: Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane. J. Real Time Image Proc. 14(1), 127–136 (2018)

    Article  Google Scholar 

  7. Qin, C., Chang, C.C., Chiu, Y.P.: A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans. Image Process. 23(3), 969–978 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  8. Zhang, X.Q., Tang, Z., Liang, T., Zhang, S.C., Zhu, Y.J., Sun, Y.H.: Data hiding method based on local image feature. Lect. Notes Comput. Sci. 7669, 247–256 (2012)

    Article  Google Scholar 

  9. Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)

    Article  MATH  Google Scholar 

  10. Ker, A.: Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett. 12(6), 441–444 (2005)

    Article  Google Scholar 

  11. Zhang, X.Q., Sun, Z.R., Tang, Z., Yu, C.Q., Wang, X.Y.: High capacity data hiding based on interpolated image. Multimedia Tools Appl. 76(7), 9195–9218 (2017)

    Article  Google Scholar 

  12. Li, F., Wu, K., Zhang, X.P., Yu, J., Lei, J., Wen, M.: Robust batch steganography in social networks with non-uniform payload and data decomposition. IEEE Access 6, 29912–29925 (2018)

    Article  Google Scholar 

  13. Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS), Bangkok, Thailand, pp. 912–915 (2003)

  14. Qin, C., Chang, C.C., Hsu, T.: Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimedia Tools Appl. 74(15), 5861–5872 (2013)

    Article  Google Scholar 

  15. Jung, K.H.: High-capacity reversible data hiding method using block expansion in digital images. J. Real Time Image Proc. 14(1), 156–170 (2018)

    Google Scholar 

  16. Kim, C., Shin, D., Leng, L., Yang, C.: Lossless data hiding for absolute moment block truncation coding using histogram modification. J. Real Time Image Proc. 14(1), 101–114 (2018)

    Article  Google Scholar 

  17. Tang, Z., Lu, Q., Lao, H., Yu, C., Zhang, X.Q.: Error-free reversible data hiding with high capacity in encrypted image. Opt. Int. J. Light Electron Opt. 157, 750–760 (2018)

    Article  Google Scholar 

  18. Qin, C., Chang, C., Huang, Y., Liao, L.: An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7), 1109–1118 (2013)

    Article  Google Scholar 

  19. Yao, H., Qin, C., Tang, Z., Tian, Y.: Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels’ coordinates with minimum distortion. Sig. Process. 135, 26–35 (2017)

    Article  Google Scholar 

  20. Shi, Y.Q., Li, X., Zhang, X.P., Wu, H.T., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210–3237 (2016)

    Article  Google Scholar 

  21. Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forens. Secur. 8(3), 553–562 (2013)

    Article  Google Scholar 

  22. Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Sig. Process. 94(1), 118–127 (2014)

    Article  Google Scholar 

  23. Cao, X., Du, L., Wei, X., Meng, D., Guo, X.: High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern. 46(5), 1132–1143 (2016)

    Article  Google Scholar 

  24. Agrawal, S., Kumar, M.: Mean value based reversible data hiding in encrypted images. Opt. Int. J. Light Electron Opt. 30, 922–934 (2017)

    Article  Google Scholar 

  25. Zhang, X.P.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255–258 (2011)

    Article  Google Scholar 

  26. Hong, W., Chen, T., Wu, H.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199–202 (2012)

    Article  Google Scholar 

  27. Liao, X., Shu, C.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Represent. 28, 21–27 (2015)

    Article  Google Scholar 

  28. Qin, C., Zhang, X.P.: Effective reversible data hiding in encrypted image with privacy protection for image content. J. Vis. Commun. Image Represent. 31, 154–164 (2015)

    Article  Google Scholar 

  29. Zheng, S., Li, D., Hu, D., Ye, D., Wang, L., Wang, J.: Lossless data hiding algorithm for encrypted images with high capacity. Multimedia Tools Appl. 75(21), 13765–13778 (2016)

    Article  Google Scholar 

  30. Yin, Z., Abel, A., Tang, J., Zhang, X.P., Luo, B.: Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multimedia Tools Appl. 76(3), 1–22 (2017)

    Article  Google Scholar 

  31. Li, M., Xiao, D., Zhang, Y., Hai, N.: Reversible data hiding in encrypted images using cross division and additive homomorphism. Sig. Process. Image Commun. 39, 234–248 (2015)

    Article  Google Scholar 

  32. Xiao, D., Xiang, Y., Zheng, H., Wang, Y.: Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism. J. Vis. Commun. Image Represent. 45, 1–10 (2017)

    Article  Google Scholar 

  33. Yu, C., Zhang, X.Q., Tang, Z., Chen, Y., Huang, J.: Reversible data hiding with pixel prediction and additive homomorphism for encrypted image. Secur. Commun. Netw. 9103418, 1–13 (2018)

    Google Scholar 

  34. Chen, Y., Shiu, C., Horng, G.: Encrypted signal-based reversible data hiding with public key cryptosystem. J. Vis. Commun. Image Represent. 25(5), 1164–1170 (2014)

    Article  Google Scholar 

  35. Li, M., Li, Y.: Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Sig. Process. 130, 190–196 (2017)

    Article  Google Scholar 

  36. Xiang, S., Luo, X.: Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group. IEEE Trans. Circuits Syst. Video Technol. 28(11), 3099–3110 (2018)

    Article  MathSciNet  Google Scholar 

  37. Shiu, C.W., Chen, Y.C., Hong, W.: Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Sig. Process. Image Commun. 39, 226–233 (2015)

    Article  Google Scholar 

  38. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern J. (ed.) EUROCRYPT'99. Lecture Notes Computure Science, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

  39. Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. Found. Secure Comput. 169–178 (1978)

  40. Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28, 270–299 (1984)

    Article  MathSciNet  MATH  Google Scholar 

  41. Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  42. Subramanyam, A.V., Emmanuel, S., Kankanhalli, M.S.: Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Trans. Multimed. 14, 703–716 (2012)

    Article  Google Scholar 

  43. Huang, F., Huang, J., Shi, Y.Q.: New framework for reversible data hiding in encrypted domain. IEEE Trans. Inf. Forens. Secur. 11(12), 2777–2789 (2016)

    Article  Google Scholar 

  44. Rivest, R.L.: The RC4 encryption algorithm. Lect. Notes Comput. Sci. 1008, 86–96 (1994)

    Google Scholar 

  45. Image database of BOWS-2. http://bows2.ec-lille.fr/. Accessed 12 July 2018

  46. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)

    Article  Google Scholar 

  47. CVG (UGR) Image database. http://decsai.ugr.es/cvg/dbimagenes/index.php. Accessed 10 Dec 2017

  48. Puteaux, P., Puech, W.: An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forens. Secur. 13(17), 1670–1681 (2018)

    Article  Google Scholar 

Download references

Acknowledgements

This work is partially supported by the National Natural Science Foundation of China (61562007, 61762017, 61502111, 61763003, U1636101), the National Key Research Development Program of China (2016QY01W0200), the Guangxi Natural Science Foundation (2017GXNSFAA198222, 2016GXNSFAA380192), the Project of Guangxi Science and Technology (GuiKeAD17195062), Guangxi 1000-Plan of Training Middle-aged/Young Teachers in Higher Education Institutions, and the Innovation Project of Guangxi Graduate Education (XYCSZ 2018076). The authors would like to thank the anonymous referees for their valuable comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhenjun Tang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tang, Z., Xu, S., Ye, D. et al. Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image. J Real-Time Image Proc 16, 709–724 (2019). https://doi.org/10.1007/s11554-018-0838-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-018-0838-0

Keywords

Navigation