Signal and Information Processing

Reversible Data Hiding in Encrypted Images Transmitted on Demand

Expand
  • School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China

Received date: 2014-10-17

  Revised date: 2014-12-02

  Online published: 2014-12-04

Abstract

This paper proposes a new method of reversible data hiding in encrypted images. The sender down-samples the original image and calculates the residuals to generate two sets of objects: sub-images and residuals. These are encrypted with an encryption keyand sent to the server. The server applies arithmetic coding on the encrypted residuals to generate spatial redundancy, and then hides extra data using the embedding key. With the key, the receiver obtains different versions of the data transmitted by the server. Unlike the conventional methods, a transmission-on-demand mechanism is used, which can effectively reduce the amount of transmitted data on the server. With the image perfectly recovered, the data embedding rate is greatly improved.

Cite this article

HAN Xi-yu, QIAN Zhen-xing, ZHANG Xin-peng, JIANG Fei . Reversible Data Hiding in Encrypted Images Transmitted on Demand[J]. Journal of Applied Sciences, 2015 , 33(1) : 50 -58 . DOI: 10.3969/j.issn.0255-8297.2015.01.006

References

[1]      FRIDRICH J, GOLJAN M, DU R. Lossless data embedding for all images formats[C]//Electronic Imaging 2002. International Society for Optics and Photonics, 2002: 572-583.
[2]      KUNDUR D, KARTHIK K. Video fingerprinting and encryption principles for digital rights management [J]. Proceedings of the IEEE, 2004, 92(6): 918-932.
[3]       CELIK M U, SHARMA G, TEKALP A M. Lossless generalized-LSB data embedding[J]. IEEE Transactions on Image Processing, 2005, 14(2): 253-266.
[4]       THODI D M, RODRÍGUEZ J J. Expansion embedding techniques for reversible watermarking [J]. IEEE Transactions on Image Processing, 2007, 16(3): 721-730.
[5]       NI Z, SHI Y Q, ANSARI N. Reversible data hiding [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(3): 354-362.
[6]       TAI W L, YEH C M, CHANG C C. Reversible data hiding based on histogram modification of pixel differences [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2009, 19(6):  906-910.
[7]       LUO L, CHEN Z, CHEN M, ZHENG X, XIONG Z. Reversible image watermarking using interpolation technique[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 187-193.
[8]       LI X, YANG B, ZENG T. Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection [J]. IEEE Transactions on Image Processing, 2011, 20(12): 3524-3533.
[9]      HWANG K, LI D. Trusted cloud computing with secure resources and data coloring[J]. IEEE  on Internet Computing, 2010, 14(5): 14-22.
[10]  ZHANG X. Reversible data hiding in encrypted image [J]. IEEE on Signal Processing Letters, 2011, 18(4): 255-258.
[11]  HONG W, CHEN T S, WU H Y. An improved reversible data hiding in encrypted images using side match [J]. IEEE on Signal Processing Letters, 2012, 19(4): 199-202.
[12]  ZHANG X. Separable reversible data hiding in encrypted image[J]. Information Forensics and Security, IEEE Transactions on, 2012, 7(2): 826-832.
[13]  ZHANG X, QIAN Z, FENG G, REN Y. Efficient reversible data hiding in encrypted images[J]. Journal of Visual Communication and Image Representation, 2014, 25(2): 322-328.
[14]  QIAN Z, ZHANG X H X. Separable reversible data hiding in encrypted images by n-nary histogram modification [C]//The Third International Conference on Multimedia Technology, Atlantis Press, Paris. 2013: 869-876.
 
[15]  MA K, ZHANG W, ZHAO X, YU N. Reversible data hiding in encrypted images by reserving room before encryption [J]. Information Forensics and Security, IEEE Transactions on, 2013, 8(3): 553-562.
[16]  ZHANG W, MA K, YU N. Reversibility improved data hiding in encrypted images[J]. Signal Processing, 2014, 94: 118-127.
[17]  ABDUL Karim M S, WONG K S. Universal data embedding in encrypted domain[J]. Signal Processing, 2014, 94: 174-182.
[18]  WITTEN I H, NEAL R M, CLEARY J G. Arithmetic coding for data compression[J]. Communications of the ACM, 1987, 30(6): 520-540.
[19]  ZHANG D, WU X. An edge-guided image interpolation algorithm via directional filtering and data fusion[J]. IEEE Transactions on Image Processing, 2006, 15(8): 2226-2238.
 
 
(编辑:管玉娟)
 
Outlines

/