Special Issue: Information Security of Multimedia Contents

Synchronized Data Embedding and Scrambling Scheme in JPEG Images

Expand
  • 1. School of Electronics and Information Engineering, Anhui University, Hefei 230601, China;
    2. School of Computer Science and Technology, Anhui University, Hefei 230601, China

Received date: 2018-01-31

  Online published: 2018-03-31

Abstract

A synchronized data embedding-scrambling scheme in JPEG images is proposed in this paper. First, Checkerboard prediction method is used to predict the DC coefcient. According to the prediction error, the DC coefcient values are classifed into three categories:not-predicted (NP), predicted but not embedded (PN), and predictedand-embedded (PE). Then, the PE is vacated to embed information while scrambling the DC coefcients. Finally, the eligible RLC (run length coding) pairs of AC coefcients are rotated to embed information. Experimental results confrmed that the method ensures the high payload and the low fle expansion. The SSIM value of the reconstructed image is more than 0.996. The PSNR value of the reconstructed image is more than 50. And the original image can be reconstructed completely under certain conditions.

Cite this article

DAI Yu, YIN Zhao-xia . Synchronized Data Embedding and Scrambling Scheme in JPEG Images[J]. Journal of Applied Sciences, 2018 , 36(2) : 255 -266 . DOI: 10.3969/j.issn.0255-8297.2018.02.005

References

[1] 张新鹏,殷赵霞. 多媒体信息隐藏技术[J]. 自然杂志,2017,39(2):87-95. Zhang X P, Yin Z X, Data hiding in multimedia[J]. Chinese Journal of Nature, 2017, 39(2):87-95. (in Chinese)
[2] Zhang X P. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(2):826-832.
[3] Qian Z X, Zhang X P, Wang S Z. Reversible data hiding in encrypted JPEG bitstream[J]. IEEE Transactions on Multimedia, 2014, 16(5):1486-1491.
[4] Luo B, Li X L, Zhang W M. PVO-based reversible data hiding for encrypted images[C]//IEEE China Summit and International Conference on Signal and Information Processing. IEEE,2015:831-835.
[5] Zhang X P, Long J, Wang Z C, Cheng H. Lossless and reversible data hiding in encrypted images with public-key cryptography[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2016, 26(9):1622-1631.
[6] Qian Z X, Zhang X P. Reversible data hiding in encrypted images with distributed source encoding[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2016, 26(4):636-646.
[7] Qian Z X, Zhou H, Zhang X P, Zhang W M. Separable reversible data hiding in encrypted JPEG bitstreams[J]. IEEE Transactions on Dependable & Secure Computing, 2016(99):1-13.
[8] Yin Z X, Abel A, Tang J, Zhang X P, Luo B. Reversible data hiding in encrypted images based on multi-level encryption and block histogram modifcation[J]. Multimedia Tools & Applications, 2017, 76(3):1-22.
[9] Yin Z X, Chang C C, Xu Q, Luo B. Second-order steganographic method based on adaptive reference matrix[J]. Image Processing Iet, 2014, 9(4):300-305.
[10] Long J, Yin Z X, Lv J P, Zhang X P. Rotation based reversible data hiding for JPEG images[J]. Iete Technical Review, 2016, 33(6):1-8.
[11] Ong S Y, Wong K S, Tanaka K. A scalable reversible data embedding method with progressive quality degradation functionality[J]. Signal Processing Image Communication, 2014, 29(1):135-149
[12] Karim M S A, Wong K. Universal data embedding in encrypted domain[M]. Elsevier NorthHolland, Inc. 2014, 94(1):174-182
[13] Rad R M, Wong K, Guo J M. A unifed data embedding and scrambling method[J]. IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society, 2014, 23(4):1463-1475.
[14] Wang Z, Bovik A C, Sheikh H R, Simoncelli E P. Image quality assessment:from error visibility to structural similarity[J]. IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society, 2004, 13(4):600-612.
[15] Ma K D, Zhang W M, Zhao X F, Yu N H, Li F H. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics & Security, 2013, 8(3):553-562.
[16] Kundur D, Karthik K. Video fngerprinting and encryption principles for digital rights management[J]. Proceedings of the IEEE, 2004, 92(6):918-932.
[17] Ong S Y, Wong K S, Tanaka K. Scrambling-embedding for JPEG compressed image[J]. Signal Processing, 2015, 109:38-53.

Outlines

/