Jiu-fen LIU, Tao HAN, Yu-guo TIAN, et al. Reversible data hiding in encrypted images using recompression[J]. Journal on Communications, 2015, 36(9): 13-25.
DOI:
Jiu-fen LIU, Tao HAN, Yu-guo TIAN, et al. Reversible data hiding in encrypted images using recompression[J]. Journal on Communications, 2015, 36(9): 13-25. DOI: 10.11959/j.issn.1000-436x.2015166.
Reversible data hiding in encrypted images using recompression
To improve the performance of RDH (reversible data hiding) method in encrypted images
the embedding room was reserved before encryption and realizes the real separation of the data extraction from image decryption in op-eration.First
the feasibility of RDH in JPEG decompressed image blocks was researched.Then the theoretical probabil-ity of successful recovery of decompressed image blocks was calculated.Finally
a method of RDH in encrypted images was proposed and the main steps of the method include pretreatment
encryption
data embedding
data extraction and image recovery.The performance of the proposed method was compared with three existing RDH methods in encrypted images.The results demonstrate the proposed method has less error in image recovery
and for given embedding rates
the PSNR of decrypted image containing the embedded data are significantly improved.
关键词
Keywords
references
KALKER T , WILLEMS F M J . Capacity bounds and constructions for reversible data hiding [A ] . Proceedings of the 14th International Confer-ence on Digital Signal Processing [C ] . Santorini,Greece , 2002 . 71 - 76 .
ZHANG W , CHEN B , YU N . Capacity bounds and constructions for reversible data hiding [A ] . Proc of the Information Hiding [C ] . Springer Berlin Heidelberg , 2011 . 255 - 269 .
ZHANG W , CHEN B , YU N . Improving various reversible data hiding schemes via optimal codes for binary covers [J ] . IEEE Transactions on Image Processing , 2012 , 21 ( 6 ): 2991 - 3003 .
FRIDRICH J , GOLJAN M , DU R . Lossless data embedding for all image formats [A ] . Proc of the Electronic Imaging,International Soci-ety for Optics and Photonics [C ] . Santorini,Greece , 2002 . 572 - 583 .
TIAN J . Reversible data embedding using a difference expansion [J ] . IEEE Transactions on Circuits and Systems for Video Technology , 2003 , 13 ( 8 ): 890 - 896 .
NI Z , SHI Y Q , ANSARI N , et al . Reversible data hiding [J ] . IEEE Transactions on Circuits and Systems for Video Technology , 2006 , 16 ( 3 ): 354 - 362 .
LI X , YANG B , ZENG T . Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection [J ] . IEEE Transactions on Image Processing , 2011 , 20 ( 12 ): 3524 - 3533 .
TSAI P , HU Y C , YEH H L . Reversible image hiding scheme using predictive coding and histogram shifting [J ] . Signal Processing , 2009 , 89 ( 6 ): 1129 - 1143 .
LUO L , CHEN Z , CHEN M , et al . Reversible image watermarking using interpolation technique [J ] . IEEE Transactions on Information Forensics and Security , 2010 , 5 ( 1 ): 187 - 193 .
MENEZES A J , VAN OORSCHOT P C , VANSTONE S A . Handbook of Applied Cryptography [M ] . Boca Raton,FL,USA:CRC , 1996 .
HWANG K , LI D . Trusted cloud computing with secure resources and data coloring [J ] . Internet Computing,IEEE , 2010 , 14 ( 5 ): 14 - 22 .
ZHANG X , LI D . Reversible data hiding in encrypted image [J ] . Signal Processing Letters,IEEE , 2011 , 18 ( 4 ): 255 - 258 .
HONG W , CHEN T S , WU H Y . An improved reversible data hiding in encrypted images using side match [J ] . Signal Processing Letters,IEEE , 2012 , 19 ( 4 ): 199 - 202 .
ZHANG X . Separable reversible data hiding in encrypted image [J ] . IEEE Transactions on Information Forensics and Security , 2012 , 7 ( 2 ): 826 - 832 .
JOHNSON M , ISHWAR P , PRABHAKARAN V , et al . On compress-ing encrypted data [J ] . IEEE Transactions on Signal Processing , 2004 , 52 ( 10 ): 2992 - 3006 .
LIU W , ZENG W , DONG L , et al . Efficient compression of encrypted grayscale images [J ] . IEEE Transactions on Image Processing , 2010 , 19 ( 4 ): 1097 - 1102 .
MA K , ZHANG W , ZHAO X . IEEE Transactions on Information Forensics and Security [J ] . IEEE Transactions on Image Processing , 2013 , 8 ( 3 ): 553 - 562 .
LUO W , HUANG J , QIU G . JPEG error analysis and its applications to digital image forensics [J ] . IEEE Transactions on Information Foren-sics and Security , 2010 , 5 ( 3 ): 480 - 491 .
LAM E Y , GOODMAN J W . A mathematical analysis of the DCT coefficient distributions for images [J ] . IEEE Transactions on Image Processing , 2000 , 9 ( 10 ): 1661 - 1666 .
FRIDRICH J , GOLJAN M , SOUKAL D . Perturbed quantization steganography [J ] . Multimedia Systems , 2005 , 11 ( 2 ): 98 - 107 .