Digital Media Forensics and Security

Reversible Data Hiding in Encrypted Image Based on Dual-Domain Joint Coding and Secret Sharing

Expand
  • School of Computer and Information Technology, Liaoning Normal University, Dalian 116029, Liaoning, China

Received date: 2022-10-25

  Online published: 2023-03-29

Abstract

A reversible data hiding scheme in encrypted image (RDHEI) based on dualdomain joint coding and secret sharing is proposed to improve the security and embedding capacity. First, the image is predicted by median-edge detector (MED) and the optimal threshold l is calculated. Pixels with different prediction errors are divided into predictable and unpredictable pixels according to the threshold. Second, to enhance the embedding capacity, the dual-domain joint coding is adopted to compress the auxiliary information on the pixel domain and bit domain, respectively. Then, the original image is encrypted to generate multiple encrypted images using the secret sharing technique based on cipher feedback, where the auxiliary information and secret data from multiple parties are embedded into the encrypted images. Finally, the embedded secret data as well as the original image are perfectly recovered based on the extracted auxiliary information. Experimental results show that the algorithm significantly improves the embedding capacity and security.

Cite this article

WENG Ke, QIN Jianhao, SONG Tianran, SHI Hui . Reversible Data Hiding in Encrypted Image Based on Dual-Domain Joint Coding and Secret Sharing[J]. Journal of Applied Sciences, 2023 , 41(2) : 197 -217 . DOI: 10.3969/j.issn.0255-8297.2023.02.002

References

[1] Puech W, Chaumont M, Strauss O. A reversible data hiding method for encrypted images[C]//Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 2008, 6819:534-542.
[2] Zhang X P. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258.
[3] Puteaux P, Puech W. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7):1670-1681.
[4] Wu Y Q, Xiang Y Z, Guo Y T, et al. An improved reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2020, 22(8):1929-1938.
[5] Chen B, Lu W, Huang J W, et al. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2):978-991.
[6] 项世军, 罗欣荣. 同态公钥加密系统的图像可逆信息隐藏算法[J]. 软件学报, 2016, 27(6):1592-1601. Xiang S J, Luo X R. Reversible data hiding in encrypted image based on homomorphic public key cryptosystem[J]. Journal of Software, 2016, 27(6):1592-1601. (in Chinese)
[7] Ke Y, Zhang M Q, Liu J, et al. Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020, 30(8):2353-2365.
[8] Yi S, Zhou Y. Binary-block embedding for reversible data hiding in encrypted images[J]. Signal Processing, 2017, 133:40-51.
[9] Qin C, Qian X, Hong W, et al. An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer[J]. Information Sciences, 2019, 487:176-192.
[10] Ge H L, Chen Y, Qian Z X, et al. A high capacity multi-level approach for reversible data hiding in encrypted images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019, 29(8):2285-2295.
[11] Zhang L Y, Liu Y S, Pareschi F, et al. On the security of a class of diffusion mechanisms for image encryption[J]. IEEE Transactions on Cybernetics, 2018, 48(4):1163-1175.
[12] Qin C, Jiang C, Mo Q, et al. Reversible data hiding in encrypted image via secret sharing based on GF(p) and GF(28)[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(4):1928-1941.
[13] Wu X T, Weng J, Yan W. Adopting secret sharing for reversible data hiding in encrypted images[J]. Signal Processing, 2018, 143:269-281.
[14] Chen Y C, Hung T H, Hsieh S H, et al. A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(12):3332-3343.
[15] Chen F, Yuan Y, He H J, et al. Multi-MSB compression based reversible data hiding scheme in encrypted images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021, 31(3):905-916.
[16] Hua Z Y, Wang Y X, Yi S, et al. Reversible data hiding in encrypted images using cipherfeedback secret sharing[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(8):4968-4982.
[17] Hiary S, Jafar I, Hiary H. An efficient multi-predictor reversible data hiding algorithm based on performance evaluation of different prediction schemes[J]. Multimedia Tools and Applications, 2017, 76(2):2131-2157.
[18] Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11):612-613.
[19] Wang X Y, Zhang M Z. An image encryption algorithm based on new chaos and diffusion values of a truth table[J]. Information Science, 2021, 579:128-149.
[20] Wang X, Chang C C, Lin C C. High capacity reversible data hiding in encrypted images based on prediction error and block classification[J]. Multimedia Tools and Applications, 2021, 80(19):29915-29937.
[21] Xu S, Chang C C, Liu Y. A high-capacity reversible data hiding scheme for encrypted images employing vector quantization prediction[J]. Multimedia Tools and Applications, 2021, 80(5):20307-20325.
[22] Wang P, Cai B, Xu S, et al. Reversible data hiding scheme based on adjusting pixel modulation and block-wise compression for encrypted images[J]. IEEE Access, 2020(8):28902-28914.
[23] Chen B, Lu W, Huang J W, et al. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2):978-991.
[24] 吴友情, 张睿灵, 汤进, 等. 定长编码和哈夫曼编码的密文域可逆信息隐藏[J]. 中国图象图形学报, 2022, 27(1):277-288. Wu Y Q, Zhang R L, Tang J, et al. Reversible data hiding in encrypted images based on joint fixed-length coding and Huffman coding[J]. Journal of Image and Graphics, 2022, 27(1):277-288. (in Chinese)
[25] Hu W T, Yao Y, Zhou D, et al. A novel image secret sharing scheme without third-party scrambling method[J]. Mobile Networks and Applications, 2019, 24(4):1317-1335.
[26] Deshmukh M, Nain N, Ahmed M. Secret sharing scheme based on binary trees and Boolean operation[J]. Knowledge and Information Systems, 2019, 60(3):1377-1396.
[27] 秦宝堃, 郑洪英, 肖迪. 基于预测误差双重编码的大容量密文域可逆信息隐藏算法[J]. 计算机应用研究, 2022, 39(1):245-248. Qin B K, Zheng H Y, Xiao D. High-capacity reversible data hiding in encrypted images based on prediction error dual coding[J]. Application Research of Computers, 2022, 39(1):245-248. (in Chinese)
Outlines

/