Browse > Article
http://dx.doi.org/10.3837/tiis.2019.02.029

Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy  

Shiu, Chih-Wei (Department of Education Industry and Digital Media, National Taitung University)
Chen, Yu-Chi (Computer Science and Engineering, Yuan Ze University)
Hong, Wien (School of Electrical and Computer Engineering, Nanfang College of Sun Yat- Sen University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.2, 2019 , pp. 1020-1042 More about this Journal
Abstract
Reversible data hiding in encrypted images (RDHEI) provides some real-time cloud applications; i.e. the cloud, acting as a data-hider, automatically embeds timestamp in the encrypted image uploaded by a content owner. Many existing methods of RDHEI only satisfy user privacy in which the data-hider does not know the original image, but leaks owner privacy in which the receiver can obtains the original image by decryption and extraction. In the literature, the method of Zhang et al. is the one providing weak content-owner privacy in which the content-owner and data-hider have to share a data-hiding key. In this paper, we take care of the stronger notion, called strong content-owner privacy, and achieve it by presenting a new reversible data hiding in encrypted images. In the proposed method, image decryption and message extraction are separately controlled by different types of keys, and thus such functionalities are decoupled to solve the privacy problem. At the technique level, the original image is segmented along a Hilbert filling curve. To keep image privacy, segments are transformed into an encrypted image by using random permutation. The encrypted image does not reveal significant information about the original one. Data embedment can be realized by using pixel histogram-style hiding, since this property, can be preserved before or after encryption. The proposed method is a modular method to compile some specific reversible data hiding to those in encrypted image with content owner privacy. Finally, our experimental results show that the image quality is 50.85dB when the averaged payload is 0.12bpp.
Keywords
Reversible Data Hiding; Encrypted Image; Histogram; Content Owner Privacy;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 W. Hong, G. Horng, C.W. Shiu, T.S. Chen, and Y.C. Chen, "Reversible steganographic method using complexity control and human visual system," The Computer Journal, 58, pp. 2583-2594, 2015.   DOI
2 S. Lian, Z. Liu, Z. Ren, and H. Wang, "Commutative encryption and watermarking in video compression," IEEE Transactions on Circuits and Systems for Video Technology, 17, pp. 775-778, 2007.
3 M. Cancellaro, F. Battisti, M. Carli, G. Boato, F.G.B. De Natale, and A. Neri, "A commutative digital image watermarking and encryption method in the tree structured haar transform domain," Signal Processing: Image Communication, 26, no. 1, pp. 1-12, 2011.   DOI
4 W.L. Tai, C.M. Yeh, and C.C. Chang, "Reversible data hiding based on histogram modification of pixel differences," IEEE Transactions on Circuits and Systems for Video Technology, 19(2009), pp. 906-910, 2009.   DOI
5 J. Tian, "Reversible data embedding using a difference expansion," IEEE Transactions on Circuits and Systems for Video Technology, 13, pp. 890-896, 2003.   DOI
6 W. Hong and T.S. Chen, "Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism," Journal of Visual Communication and Image Representation, 22, pp. 131-140, 2011.   DOI
7 Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Transactions on Circuits and Systems for Video Technology, 16, pp. 354-362, 2006.   DOI
8 X. Li, J. Li, B. Li, and B. Yang, "High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion," Signal Processing, 93, pp. 198-205, 2013.   DOI
9 X. Zhang, "Reversible Data Hiding in Encrypted Image," IEEE Signal Processing Letters, 18, pp. 255-258, 2011.   DOI
10 W. Hong, T.S. Chen, and H.Y. Wu, "An improved reversible data hiding in encrypted images using side match," IEEE Signal Processing Letters, 19, no. 4, pp. 199-202, 2012.   DOI
11 C.W. Shiu, Y.C. Chen, and W. Hong, "Encrypted image-based reversible data hiding with public key cryptography from difference expansion," Signal Processing: Image Communication, vol. 39, pp. 226-233, 2015.   DOI
12 X. Zhang, "Separable reversible data hiding in encrypted image," IEEE Transactions on Information Forensics and Security, 7, pp. 1556-6013, 2012.
13 Y.C. Chen, C.W. Shiu, and G. Horng, "Encrypted signal-based reversible data hiding with public key cryptosystem," Journal of Visual Communication and Image Representation, 25, pp. 1164-1170, 2014.   DOI
14 X. Zhang, J. Long, Z. Wang, and H. Cheng, "Lossless and reversible data hiding in encrypted images with public key cryptography," IEEE Transactions on Circuits and Systems for Video Technology, 26, pp. 1622-1631, 2015.   DOI
15 Z. Qian, X. Zhang, and G. Feng, "Reversible data hiding in encrypted images based on progressive recovery," IEEE Signal Processing Letters, 23, pp. 1672-1676, 2016.   DOI
16 Z. Qian, X. Zhang, and S. Wang, "Reversible data hiding in encrypted JPEG bitstream," IEEE Transactions on Multimedia, 16, pp. 1486-1491, 2014.   DOI
17 Z. Qian, H. Zhou, X. Zhang, and W. Zhang, "Separable reversible data hiding in encrypted JPEG bitstreams," IEEE Transactions on Dependable and Secure Computing, 2016.
18 Z. Qian, and X. Zhang, "Reversible data hiding in encrypted image with distributed source encoding," IEEE Transactions on Circuits and Systems for Video Technology, 26, pp. 636-646, 2016.   DOI
19 W. Zhang, K. Ma, and N. Yu, "Reversibility improved data hiding in encrypted Images," Signal Processing, 94, pp. 118-127, 2014.   DOI
20 P. Howard, F. Kossentini, B. Martins, S. Forchhammer, and W. Rucklidge, "The emerging JBIG2 standard," IEEE Transactions on Circuits and Systems for Video Technology, 8, pp. 838-848, 1998.   DOI
21 The Kodak image database, Available: http://r0k.us/graphics/kodak/
22 The USC SIPI Image database. Available: http://sipi.use.edu/database/
23 F. Huang, J. Huang, and Y. Q. Shi, "New framework for reversible data hiding in encrypted domain," IEEE Trans. Inf. Forensic Security, 11, pp. 2777-2789, 2016.   DOI
24 Z. Yin, B. Luo and W. Hong, "Separable and error-free reversible data hiding in encrypted image with high payload," The Scientific World Journal, pp. 1-8, 2014.
25 P. Tsai, Y.C. Hu and H.L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Processing, 89, pp. 1129-1143, 2009.   DOI
26 J. Fridrich, M. Goljan, R. Du, "Reliable detection of LSB steganography in color and grayscale images," pp. 27-30, 2001.
27 J.C. Joo, H.Y. Lee, and H.K. Lee, "Improved steganographic method preserving pixel-value differencing histogram with modulus function," EURASIP Journal on Advances in Signal Processing 2010, 2010.
28 J. Wang, J. Ni, and X. Zhang, and Y.Q. Shi "Rate and distortion optimization for reversible data hiding using multiple histogram shifting," IEEE Transactions on Cybernetics, 47, pp. 315-326, 2017.   DOI
29 S.A. Parah, F. Ahad, J.A. Sheikh, G.M. Bhat, "Hiding clinical information in medical images: A new high capacity and reversible data hiding technique," Journal of Biomedical Informatics, 66, pp. 214-230, 2017.   DOI
30 J. Chen, T.S. Chen, W. Hong, G, Horng, H.Y. Wu, and C.W. Shiu, "A new reference pixel prediction for reversible data hiding with reduced location map," KSII Transactions on Internet and Information Systems, 8, pp. 95-98, 2014.
31 L.C. Huang, L.Y. Tseng, and M.S. Hwang, "A reversible data hiding method by histogram shifting in high quality medical images," Journal of Systems and Software, 86, pp.716-727, 2013.   DOI
32 D.C. Lou, C.L. Chou, H.Y. Wei, and H.F. Huang, "Active steganalysis for interpolation-error based reversible data hiding," Pattern Recognition Letters, 34, pp. 1032-1036, 2013.   DOI
33 Y.Q. Shi, X. Li, X. Zhang, H.T. Wu and B. Ma, "Reversible data hiding: advances in the past two decades," IEEE Access: Latest Advances and Emerging Applications of Data Hiding, 4, pp. 3210-3237, 2016.   DOI