DOI QR코드

DOI QR Code

A Modified Reversible Data Hiding in Encrypted Images Using Random Diffusion and Accurate Prediction

  • Li, Ming (College of Computer Science, Chongqing University) ;
  • Xiao, Di (College of Computer Science, Chongqing University) ;
  • Peng, Zhongxian (College of Computer Science, Chongqing University) ;
  • Nan, Hai (College of Computer Science, Chongqing University)
  • Received : 2013.09.17
  • Accepted : 2013.10.16
  • Published : 2014.04.01

Abstract

A modified version of Zhang's reversible data hiding method in encrypted images is proposed in this letter. To make full use of spatial correlation in natural images, the former idea of block division is thoroughly abandoned, whereas the random diffusion strategy is used. Additionally, the fluctuation measurement of pixels containing embedded data is improved by accurate prediction. The experiment results reveal that our proposed method is superior to both Zhang's method and the later improved version proposed by Hong and others.

Keywords

References

  1. J. Tian, "Reversible Data Embedding Using a Difference Expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, Aug. 2003, pp. 890-896. https://doi.org/10.1109/TCSVT.2003.815962
  2. Z. Ni et al., "Reversible Data Hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 8, Mar. 2006, pp. 354-362. https://doi.org/10.1109/TCSVT.2006.869964
  3. X.-T. Zeng, Z. Li, and L.-D. Ping, "Reversible Data Hiding Scheme Using Reference Pixel and Multi-layer Embedding." Int. J. Electr. Commun., vol. 66, no. 7, July 2012, pp. 532-539. https://doi.org/10.1016/j.aeue.2011.11.004
  4. S. Lian et al., "Commutative Encryption and Watermarking in Video Compression," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, June 2007, pp. 774-778. https://doi.org/10.1109/TCSVT.2007.896635
  5. M. Cancellaro et al., "A Commutative Digital Image Watermarking and Encryption Method in the Tree Structured Haar Transform Domain," Signal Process., Image Commun., vol. 26, no. 1, Jan. 2011, pp. 1-12. https://doi.org/10.1016/j.image.2010.11.001
  6. X. Zhang, "Reversible Data Hiding in Encrypted Image," IEEE Signal Process. Lett., vol. 18, no. 4, Apr. 2011, pp. 255-258. https://doi.org/10.1109/LSP.2011.2114651
  7. W. Hong, T.-S. Chen, and H.-Y. Wu, "An Improved Reversible Data Hiding in Encrypted Images Using Side Match," IEEE Signal Process. Lett., vol. 19, no. 4, Apr. 2012, pp. 199-202. https://doi.org/10.1109/LSP.2012.2187334
  8. S. Kang, H.J. Hwang, and H.J. Kim, "Reversible Watermark Using an Accurate Predictor and Sorter Based on Payload Balancing," ETRI J., vol. 34, no. 3, June 2012, pp. 410-420. https://doi.org/10.4218/etrij.12.0111.0075
  9. K.T. Alligood, T.D. Sauer, and J.A. Yorke, Chaos: An Introduction to Dynamical Systems, New York: Springer-Verlag, 1996.
  10. Standard picture collection: grayscale images and color images. Accessed Apr. 19, 2013. http://media.cs.tsinghua.edu.cn/-ahz/digitalimageprocess/benchmark.htm

Cited by

  1. Improved reversible data hiding for encrypted images using full embedding strategy vol.51, pp.9, 2014, https://doi.org/10.1049/el.2014.4476
  2. Reversible Data Hiding in Block Compressed Sensing Images vol.38, pp.1, 2014, https://doi.org/10.4218/etrij.16.0114.0242
  3. Enhanced Joint and Separable Reversible Data Hiding in Encrypted Images with High Payload vol.9, pp.4, 2014, https://doi.org/10.3390/sym9040050
  4. A Block-Based Division Reversible Data Hiding Method in Encrypted Images vol.9, pp.12, 2014, https://doi.org/10.3390/sym9120308
  5. A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing vol.2018, pp.None, 2014, https://doi.org/10.1155/2018/1591206
  6. Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud vol.11, pp.1, 2014, https://doi.org/10.3390/sym11010082
  7. Encrypted images-based reversible data hiding in Paillier cryptosystem vol.79, pp.1, 2014, https://doi.org/10.1007/s11042-019-07874-w
  8. Reversible Data Hiding in Encrypted Image Based on Multi-MSB Embedding Strategy vol.10, pp.6, 2014, https://doi.org/10.3390/app10062058
  9. A comparison of joint reversible data hiding methods in encrypted remote sensing satellite images vol.1528, pp.None, 2014, https://doi.org/10.1088/1742-6596/1528/1/012038