DOI QR코드

DOI QR Code

Design of Generalized Fluctuation Function for Reversible Data Hiding in Encrypted Image

암호화된 영상의 가역적 데이터 은닉을 위한 일반화된 섭동 함수 설계

  • Kim, Young-Hun (Dongguk University Department of Information Security Code and Cipher laboratory) ;
  • Lim, Dae-Woon (Dongguk University Department of Information and Communication Engineering) ;
  • Kim, Young-Sik (Chosun University, Department of Information and Communication Engineering)
  • Received : 2016.03.02
  • Accepted : 2016.10.25
  • Published : 2016.11.30

Abstract

Recently, Zhang proposed a scheme to hide information in encrypted images using synchronous stream ciphers. After the receiver decrypts the encrypted image and extracts data by calculating the spatial correlation property value using the fluctuation function which is designed to calculate spacial correlation between adjacent pixels in a decrypted image. Then, Hong improved the Zhang's data hiding scheme by introducing the side match technique. In this paper, a novel fluctuation function is proposed to reduce the recovery errors which arise during extracting hidden data. Then, we also demonstrated that the proposed fluctuation function outperforms the previous functions through computer simulations for sample images.

최근 Zhang은 동기식 스트림 암호를 통해 암호화된 영상에 데이터를 은닉하는 방법을 제안하였다. 수신자는 먼저 암호화된 영상을 복호하고, 복호된 영상에 섭동 함수(fluctuation function)를 이용하여 공간 상관 특성 값을 계산함으로써 데이터를 추출한다. 그 후 Hong은 사이드 매치(side match) 기법을 이용하여 Zhang의 데이터 은닉 기법을 개선하였다. 본 논문에서는 데이터 추출과정에서 발생하는 오류를 감소시키기 위해 새로운 섭동 함수를 제안하고, 표본 영상들에 대한 컴퓨터 모의실험을 통해 제안하는 기법이 기존의 방법들보다 우수함을 검증하였다.

Keywords

References

  1. W. Stallings, Cryptography and Network Security: Principles and Practice, New Jersey: Pearson Education, 2003.
  2. J.-H. Kim, S.-K. Yoo, and S.-H. Lee, "Fully homomorphic encryption scheme without key switching," J. KICS, vol. 38, no. 5, pp. 428-433, May 2013.
  3. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding-a survey," in Proc. IEEE, special issue on protection of multimedia content, May 1999. Invited paper.
  4. R. J. Anderson and F. A. P. Petitcolas, "On the limits of steganography," IEEE J. Sel. Areas on Commun., 16:474-481, 1998. https://doi.org/10.1109/49.668971
  5. J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, Aug. 2003. https://doi.org/10.1109/TCSVT.2003.815962
  6. M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. Image Process., vol. 14, no. 2, pp. 253-266, Feb. 2005. https://doi.org/10.1109/TIP.2004.840686
  7. Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, 2006. https://doi.org/10.1109/TCSVT.2006.869964
  8. D. M. Thodi and J. J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. Image Process., vol. 16, no. 3, pp. 721-730, 2007. https://doi.org/10.1109/TIP.2006.891046
  9. L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, "Reversible image watermarking using interpolation technique," IEEE Trans. Inf. Forensics Secur., vol. 5, no. 1, pp. 187-193, 2010. https://doi.org/10.1109/TIFS.2009.2035975
  10. X. Zhang, "Reversible data hiding in encrypted image," IEEE. Sign. Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011. https://doi.org/10.1109/LSP.2011.2114651
  11. W. Hong, T.-S. Chen, and H.-Y. Wu, "An improved reversible data hiding in encrypted images using side match," IEEE. Sign. Process. Lett., vol. 19, no. 4, pp. 199-202, Apr. 2012. https://doi.org/10.1109/LSP.2012.2187334
  12. J. Fridirich, M. Goljan, and R Du, "Lossless data embedding for all image formats," SPIE Proc. Security and Watermarking of Multimedia Contents, vol. 4675, pp. 572-583, 2002.
  13. Y. C. Li, C. M. Yeh, and C. C. Chang, "Data hiding based on the similarity between neighboring pixels with reversibility," Digital Sign. Process., vol. 20, no. 4, pp. 1116-1128, 2010. https://doi.org/10.1016/j.dsp.2009.10.025
  14. P. Tsai, Y. C. Hu, and H. L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Sign. Process., vol. 89, no. 6, pp. 1129-1143, 2009. https://doi.org/10.1016/j.sigpro.2008.12.017
  15. W. L. Tai, C. M. Yeh, and C. C. Chang, "Reversible data hiding based on histogram modification of pixel differences," IEEE Trans. Circuits and Syst. for Video Technol., vol. 19, no. 6, pp. 906-910, Jun. 2009. https://doi.org/10.1109/TCSVT.2009.2017409
  16. H. C. Wu, H. C. Wang, C. S. Tsai, and C. M. Wang, "Reversible image steganographic scheme via predictive coding," Displays, vol. 31, pp. 35-43, 2010. https://doi.org/10.1016/j.displa.2009.10.002
  17. J.-H. Jeong, K.-J. Kang, Y.-S. Kim, and D.-W. Lim, "Reversible data hiding scheme using dynamic bit selection in encrypted image," in Proc. KIISC C-ISC-W'12, pp. 56-59, Dec. 2012.
  18. Y.-S. Kim and D.-W. Lim, "Reversible data hiding scheme based on lattices," J. KMMS, vol. 16, no. 4, pp. 27-33, Dec. 2012.
  19. S.-H. Cho, D.-S. Kim, and K.-Y. Yoo, "Improved reversible data hiding scheme based on difference value of adjacent pixels," in Proc. KICS Int. Conf. Commun., pp. 205-206, Jeju Island, Korea, Jun. 2013.
  20. J.-H. Choi and K.-Y. Yoo, "A reversible steganography scheme using improved hiding tree," in Proc. KICS Int. Conf. Commun., pp. 176-177, Jun. 2011.
  21. S. W. Kim, S. Yoo, J. Shin, and J. Ryou, "A study on the protection method for the medical image using DQT encryption," in Proc. KICS Int. Conf. Commun., pp. 205-206, Jeju Island, Korea, Jun. 2013.
  22. T.-S. Kim, M.-H. Jang, and S.-H. Kim, "Transmission methods using RS codes to improve spatial relationship of images in reversible data hiding systems," J. KICS, vol. 40, no. 8, pp. 1477-1484, Aug. 2015. https://doi.org/10.7840/kics.2015.40.8.1477
  23. Y.-H. Kim, D.-W. Lim, and Y.-S. Kim, "Design of fluctuation function to improve BER performance of data hiding in encrypted image," J. KICS, vol. 41, no. 3, pp. 307-316, Mar. 2016. https://doi.org/10.7840/kics.2016.41.3.307
  24. C.-C. Chang, C.-C. Lin, and Y.-H. Chen, "Reversible data-embedding scheme using differences between original and predicted pixel values," Inf. Secur., vol. 2, no. 2, pp. 35-46, 2008. https://doi.org/10.1049/iet-ifs:20070004
  25. S. Lian, Z. Liu, Z. Ren, and H. Wang, "Commutative encryption and watermarking in video compression," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774-778, 2007. https://doi.org/10.1109/TCSVT.2007.896635
  26. Image database [Online], Available: http://sipi.usc.edu/database/