收稿日期: 2017-05-22
修回日期: 2017-09-30
网络出版日期: 2018-07-31
基金资助
国家自然科学基金(No.61672354);上海智能家居大规模物联共性技术工程中心项目基金(No.GCZX14014);沪江基金(No.C14001,No.C14002)资助
High-Capacity Reversible Data Hiding for Encrypted Images
Received date: 2017-05-22
Revised date: 2017-09-30
Online published: 2018-07-31
何志红, 秦川, 周青 . 大容量的密文域图像可逆信息隐藏算法[J]. 应用科学学报, 2018 , 36(4) : 611 -627 . DOI: 10.3969/j.issn.0255-8297.2018.04.005
In this paper, we propose a novel scheme of reversible data hiding in encrypted image. By using the same encryption key to encrypt the pixels in each non-overlapping block of original image, the contents of original image can be effectively masked by the content owner. The data-hider can realize data embedding in the encrypted image by exploiting the continuity characteristic of the pixels in each encrypted block and using run-length coding. After receiving the encrypted image containing extra data, with the encryption key, the receiver can obtain a directly-decrypted image which is similar to the original image; with the data-hiding key, the receiver can extract the embedded data correctly; with both encryption and data-hiding keys, the receiver can extract extra data and recover original image. Experimental results demonstrate that the proposed scheme can not only increase the hiding capacity in encrypted image, but also recover the original image without error.
Key words: image recovery; hiding capacity; image encryption; reversible data hiding
[1] 王慧丽,秦川,高丽萍,陈庆奎. 基于恢复信息共享机制的最优自嵌入算法[J]. 应用科学学报, 2016, 34(6):667-690. Wang H L, Qin C, Gao L P, Chen Q K. Optimal self-embedding scheme based on recovery-data sharing[J]. Journal of Applied Sciences, 2016, 34(6):667-690. (in Chinese)
[2] 付天舒,韩春杰,隋鑫. 基于DCT变换的自适应图像水印实现[J]. 光学仪器,2016, 35(3):51-57. Fu T S, Han C J, Sui X. Adaptive image watermark realization based on DCT transform[J]. Optical Instruments, 2013, 35(3):51-57. (in Chinese)
[3] 孙刘杰,庄松林. 印刷图像中隐藏水印的涅菲尔变换方法[J]. 上海理工大学学报,2008, 30(5):475-478. Sun L J, Zhuang S L. Application of Fresnel holography to hiding watermark in printed image[J]. Journal of University of Shanghai for Science and Technology, 2008, 30(5):475-478. (in Chinese)
[4] Fridrich J, Goljan M, Du R. Lossless data embedding for all image formats[C]//Proceedings of SPIE 4675, Security and Watermarking of Multimedia Contents IV, 2002:572-583.
[5] Celik M, Sharma G, Tekalp A, Saber E. Lossless generalized-LSB data embedding[J]. IEEE Transactions on Image Processing, 2005, 14(2):253-266.
[6] Tian J. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13(8):890-896.
[7] Alattar A M. Reversible watermark using the difference expansion of a generalized integer transform[J]. IEEE Transactions on Image Processing, 2004, 13(8):1147-1156.
[8] Thodi D M, Rodriguez J J. Expansion embedding techniques for reversible watermarking[J]. IEEE Transactions on Image Processing, 2007, 16(3):721-730.
[9] Hu Y J, Lee H K, Li J W. DE-based reversible data hiding with improved overflow location map[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2009, 19(2):250-260.
[10] Li X L, Yang B, Zeng T Y. Efficient reversible watermarking based on adaptive predictionerror expansion and pixel selection[J]. IEEE Transactions on Image Processing, 2011, 20(12):3524-3533.
[11] Ni Z, Shi Y, Ansari N, Wei S. Reversible data hiding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(3):354-362.
[12] Qin C, Chang C C, Huang Y H, Liao L T. An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2013, 23(7):1109-1118.
[13] Li X L, Zhang W M, Gui X L, Yang B. Efficient reversible data hiding based on multiple histograms modification[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9):2016-2027.
[14] Li X L, Zhang W M, Gui X L, Yang B. A novel reversible data hiding scheme based on twodimensional difference-histogram modification[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(7):1091-1100.
[15] Tsai P Y, Hu Y C, Yeh H L. Reversible image hiding scheme using predictive coding and histogram shifting[J]. IEEE Signal Processing Letters, 2009, 89:1129-1143.
[16] Hong W, Chen T S, Shiu C W. Reversible data hiding for high quality images using modification of prediction errors[J]. Journal of Systems and Software, 2009, 82(11):1833-1842.
[17] Zhang X P. Reversible data hiding in encrypted images[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258.
[18] Zhang X P. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2):826-832.
[19] Qian Z X, Zhang X P, Feng G R. Reversible data hiding in encrypted images based on progressive recovery[J]. IEEE Signal Processing Letters, 2016, 23(11):1672-1676.
[20] Hong W, Chen T, Wu H. An improved reversible data hiding in encrypted images using side match[J]. IEEE Signal Processing Letters, 2012, 19(4):199-202.
[21] Liao X, Shu C W. Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels[J]. Journal of Visual Communication and Image Representation, 2015, 28:21-27.
[22] Xiao D, Xiang Y P, Zheng H Y, Wang Y. Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism[J]. Journal of Visual Communication and Image Representation, 2017, 45:1-10.
[23] Yin Z X, Abel A, Tang J, Zhang X P, Luo B. Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification[J]. Multimedia Tools and Applications, 2017, 76(3):3899-3920.
[24] Li M, Li Y. Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding[J]. Signal Processing, 2017, 130:190-196.
[25] Yi S, Zhou Y C. Binary-block embedding for reversible data hiding in encrypted images[J]. Signal Processing, 2017, 133:40-51.
[26] Wu H Z, Shi Y Q, Wang H X, Zhou L N. Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification[J]. IEEE Transaction on Circuits Systems for Video Technology, 2017, 27(8):1620-1631.
[27] International Telecommunication Union, CCITT Recommendation T.81, Information Technology-Digital Compression and Coding of Continuous-tone Still Images-Requirements and Guidelines, 1992.
/
| 〈 |
|
〉 |