scispace - formally typeset
Search or ask a question
Journal Article

Reversible Data Hiding In Encrypted Images

TL;DR: Original image can be recovered from the marked image without any distortion and improve the data hiding capacity using adaptive Thresolding purpose of the data hide capacity.
Abstract: There is good potential for practical applications such as encrypted image authentication, content owner identification and privacy protection, reversible data hiding in encrypted image has attracted increasing attention in recent year. Data hiding is the technique by which some data is hidden into a cover media. Data hiding can be done in audio, video, image, text, and picture. we use image for data hiding especially digital images. The data may be any text related to the image such as authentication data or author information. At the receiver side it must be able to extract the hidden data and original image. A data hiding technique satisfying this requirement is known as reversible data hiding. Reversible data hiding is a type of data hiding techniques whereby the host image can be recovered exactly. Being lossless makes this technique suitable for medical, military applications and cloud storage. Reversible data hiding in encrypted image , which can recover the original image without any distortion from the marked image after the hidden data have been extracted. Now a days reversible data hiding in encrypted images is in used due to its excellent property which is original cover can be recovered with no loss after extraction of the embedded data. Also it protect the original data. Existing reversible data hiding methods in encrypted images (RDHEI) can be divided into two categories: without or with a preprocessing before image encryption. This paper focusing on original image can be recovered from the marked image without any distortion and improve the data hiding capacity. Using adaptive Thresolding purpose of the data hiding capacity.
Citations
More filters
Journal ArticleDOI
TL;DR: A novel method of evaluating the complexity of image blocks, which considers multiple neighboring pixels according to the locations of different pixels, which can increase the correctness of data extraction/image recovery and reduce average extracted-bit error rate when the block size is appropriate.

245 citations


Cites background or methods from "Reversible Data Hiding In Encrypted..."

  • ...And we elaborate the experimental results and compare the performances among Zhang’s, Hong et al.’s and the proposed one in Section 4....

    [...]

  • ...Experimental comparisons among the proposed method and these methods in [15,16] are shown in Fig....

    [...]

  • ...In this paper, we propose an improved method based on Zhang’s and Hong et al.’s works....

    [...]

  • ...Here we adopt the image encryption algorithm identical to Zhang’s [15] and Hong et al.’s [16], in order to compare them conveniently and impartially....

    [...]

  • ...Section 2 introduces some related works such as Zhang’s and Hong et al.’s method briefly....

    [...]

Journal ArticleDOI
TL;DR: A novel framework for RDH-EI based on reversible image transformation (RIT), in which the ciphertexts may attract the notation of the curious cloud and the data-embedding process executed by the cloud server is irrelevant with the processes of both encryption and decryption.
Abstract: With the popularity of outsourcing data to the cloud, it is vital to protect the privacy of data and enable the cloud server to easily manage the data at the same time. Under such demands, reversible data hiding in encrypted images (RDH-EI) attracts more and more researchers’ attention. In this paper, we propose a novel framework for RDH-EI based on reversible image transformation (RIT). Different from all previous encryption-based frameworks, in which the ciphertexts may attract the notation of the curious cloud, RIT-based framework allows the user to transform the content of original image into the content of another target image with the same size. The transformed image, that looks like the target image, is used as the “encrypted image,” and is outsourced to the cloud. Therefore, the cloud server can easily embed data into the “encrypted image” by any RDH methods for plaintext images. And thus a client-free scheme for RDH-EI can be realized, that is, the data-embedding process executed by the cloud server is irrelevant with the processes of both encryption and decryption. Two RDH methods, including traditional RDH scheme and unified embedding and scrambling scheme, are adopted to embed watermark in the encrypted image, which can satisfy different needs on image quality and large embedding capacity, respectively.

114 citations


Cites background or methods from "Reversible Data Hiding In Encrypted..."

  • ...In [17], Zhang divided the encrypted image into several blocks....

    [...]

  • ...In fact, in some application cases, the cloud server does not need to consider the quality of marked image as done in all previous RDH-EI schemes [14], [17]–[23], only if the cloud server can losslessly restore the encrypted image E(I) and send it back to the users....

    [...]

  • ...For both methods in [17] and [18], decrypting image and extracting data must be jointly executed....

    [...]

  • ...1(a), such as schemes in [17] and [18], the image owner (the sender) encrypts the imageI into E(I) with a keyK....

    [...]

Journal ArticleDOI
TL;DR: A JPEG encryption algorithm is proposed, which enciphers an image to a smaller size and keeps the format compliant to JPEG decoder and outperforms a previous work in terms of separation capability, embedding capacity and security.
Abstract: While most techniques of reversible data hiding in encrypted images (RDH-EI) are developed for uncompressed images, this paper provides a separable reversible data hiding protocol for encrypted JPEG bitstreams. We first propose a JPEG encryption algorithm, which enciphers an image to a smaller size and keeps the format compliant to JPEG decoder. After a content owner uploads the encrypted JPEG bitstream to a remote server, a data hider embeds an additional message into the encrypted copy without changing the bitstream size. On the recipient side, the original bitstream can be reconstructed losslessly using an iterative recovery algorithm based on the blocking artifact. Since message extraction and image recovery are separable, anyone who has the embedding key can extract the message from the marked encrypted copy. Experimental results show that the proposed method outperforms a previous work in terms of separation capability, embedding capacity and security.

95 citations


Cites background or methods from "Reversible Data Hiding In Encrypted..."

  • ...Many approaches have been proposed for different applications, for example, compressing encrypted images [3], signal transformation in ciphertexts [4], pattern recognition in encrypted domain [5], watermarking in encrypted multimedia [6], data searching in encrypted dataset [7], etc. Reversible data hiding in encrypted images (RDH-EI) is another topic of SPED [8]....

    [...]

  • ...[8], [9], [10], [11], [12], [13], [14], [15], [14], [17], [18], [19], [20], [21], [22]....

    [...]

  • ...Reversible data hiding in encrypted images (RDH-EI) is another topic of SPED [8]....

    [...]

  • ...To find the achievable payload, we compare the proposed methods with [8] and [9] designed for uncompressed images....

    [...]

  • ...Experimental results listed in Table 5 show that payloads of the proposed method for JPEG are close to [8] and [9]....

    [...]

Journal ArticleDOI
TL;DR: A novel RDHEI by redundant space transfer (RST) scheme, which involves transferring redundant space from the original image to the encrypted image, has the advantages of a high embedding rate and requires few tasks of the content owner.

83 citations


Cites methods from "Reversible Data Hiding In Encrypted..."

  • ...AC CE PT ED M AN US CR IP T In general, the above RDHEI algorithms can be divided into two categories: algorithms based on vacating space after encryption (VRAE) based algorithms [11, 18, 28-30] and algorithms based on reserving room before encryption (RRBE) based algorithms [7, 16, 31]....

    [...]

Proceedings ArticleDOI
01 May 2017
TL;DR: A novel algorithm is proposed to reversibly hide data into encrypted grayscale medical images in a separable manner and demonstrates that the proposed algorithm has high embedding capacity, high visual image quality, and high entropy.
Abstract: Hiding information in an image in a way that does not affect the original cover image pixels or cause a permanent distortion after extracting that information is known as reversible data hiding technology. Many reversible data hiding schemes have been proposed and successfully applied in medical and military applications. Such schemes are developed to ensure digital images' authenticity and integrity without any distortion on the original images. They guarantee that any attempt to change the watermarked image will be detected by the image owner. In this paper, a novel algorithm is proposed to reversibly hide data into encrypted grayscale medical images in a separable manner. The proposed algorithm hides two watermarks in a given encrypted image. The first watermark is embedded by replacing selected encrypted image pixels based on data hiding key, and the second watermark is embedded in the watermarked encrypted image using the histogram shifting reversible data hiding method. The experimental results demonstrate that the proposed algorithm has high embedding capacity, high visual image quality, and high entropy.

73 citations


Cites background from "Reversible Data Hiding In Encrypted..."

  • ...In terms of separability, algorithms [9], [10] and [12] are separable, whereas algorithms [7] and [8] are non-separable....

    [...]

  • ...In terms of blindness, algorithms [7], [8], [9] and [12] are blind, whereas algorithm [10] is a non-blind algorithm....

    [...]

  • ...[7] [8] [9] [10] [12] Proposed Algorithm...

    [...]

  • ...Therefore, and due to the importance of hiding data in encrypted images, reversible data hiding in encrypted domain methods have recently become a very important research area [7-18]....

    [...]

References
More filters
Journal ArticleDOI
TL;DR: A novel method of evaluating the complexity of image blocks, which considers multiple neighboring pixels according to the locations of different pixels, which can increase the correctness of data extraction/image recovery and reduce average extracted-bit error rate when the block size is appropriate.

245 citations

Journal ArticleDOI
TL;DR: A novel framework for RDH-EI based on reversible image transformation (RIT), in which the ciphertexts may attract the notation of the curious cloud and the data-embedding process executed by the cloud server is irrelevant with the processes of both encryption and decryption.
Abstract: With the popularity of outsourcing data to the cloud, it is vital to protect the privacy of data and enable the cloud server to easily manage the data at the same time. Under such demands, reversible data hiding in encrypted images (RDH-EI) attracts more and more researchers’ attention. In this paper, we propose a novel framework for RDH-EI based on reversible image transformation (RIT). Different from all previous encryption-based frameworks, in which the ciphertexts may attract the notation of the curious cloud, RIT-based framework allows the user to transform the content of original image into the content of another target image with the same size. The transformed image, that looks like the target image, is used as the “encrypted image,” and is outsourced to the cloud. Therefore, the cloud server can easily embed data into the “encrypted image” by any RDH methods for plaintext images. And thus a client-free scheme for RDH-EI can be realized, that is, the data-embedding process executed by the cloud server is irrelevant with the processes of both encryption and decryption. Two RDH methods, including traditional RDH scheme and unified embedding and scrambling scheme, are adopted to embed watermark in the encrypted image, which can satisfy different needs on image quality and large embedding capacity, respectively.

114 citations

Journal ArticleDOI
TL;DR: A JPEG encryption algorithm is proposed, which enciphers an image to a smaller size and keeps the format compliant to JPEG decoder and outperforms a previous work in terms of separation capability, embedding capacity and security.
Abstract: While most techniques of reversible data hiding in encrypted images (RDH-EI) are developed for uncompressed images, this paper provides a separable reversible data hiding protocol for encrypted JPEG bitstreams. We first propose a JPEG encryption algorithm, which enciphers an image to a smaller size and keeps the format compliant to JPEG decoder. After a content owner uploads the encrypted JPEG bitstream to a remote server, a data hider embeds an additional message into the encrypted copy without changing the bitstream size. On the recipient side, the original bitstream can be reconstructed losslessly using an iterative recovery algorithm based on the blocking artifact. Since message extraction and image recovery are separable, anyone who has the embedding key can extract the message from the marked encrypted copy. Experimental results show that the proposed method outperforms a previous work in terms of separation capability, embedding capacity and security.

95 citations

Journal ArticleDOI
TL;DR: A novel RDHEI by redundant space transfer (RST) scheme, which involves transferring redundant space from the original image to the encrypted image, has the advantages of a high embedding rate and requires few tasks of the content owner.

83 citations

Proceedings ArticleDOI
01 May 2017
TL;DR: A novel algorithm is proposed to reversibly hide data into encrypted grayscale medical images in a separable manner and demonstrates that the proposed algorithm has high embedding capacity, high visual image quality, and high entropy.
Abstract: Hiding information in an image in a way that does not affect the original cover image pixels or cause a permanent distortion after extracting that information is known as reversible data hiding technology. Many reversible data hiding schemes have been proposed and successfully applied in medical and military applications. Such schemes are developed to ensure digital images' authenticity and integrity without any distortion on the original images. They guarantee that any attempt to change the watermarked image will be detected by the image owner. In this paper, a novel algorithm is proposed to reversibly hide data into encrypted grayscale medical images in a separable manner. The proposed algorithm hides two watermarks in a given encrypted image. The first watermark is embedded by replacing selected encrypted image pixels based on data hiding key, and the second watermark is embedded in the watermarked encrypted image using the histogram shifting reversible data hiding method. The experimental results demonstrate that the proposed algorithm has high embedding capacity, high visual image quality, and high entropy.

73 citations