Computer Science ›› 2018, Vol. 45 ›› Issue (8): 151-155.doi: 10.11896/j.issn.1002-137X.2018.08.027

• Information Security • Previous Articles     Next Articles

Adaptive Pixel Block Reference Value Based Reversible Data Hiding in Encrypted Domain

LIU Yu, YANG Bai-long, ZHAO Wen-qiang, YUAN Zhi-hua   

  1. Academy of Operational Support,Rocket Engineering University,Xi’an 710025,China
  • Received:2017-04-09 Online:2018-08-29 Published:2018-08-29

Abstract: Aiming at the problems that the capacity of reversible data hiding in encrypted domain is not enough,the exis-ting algorithms are not reversible,inefficient and complex,a simple and efficient technique based on pixel blockrefe-rence was proposed.The scheme divides the image adaptively in the way of quadtree,partial image block mean values are obtained and retained,the pseudo-random sequenceis used to encrypt image,the secret information is embedded through addition operation.The secret information can be extracted independently,the image decrypted can be carried out independently,and the carrier image can be completely restored.Experiments show that the method is simple,efficient,easy to calculate,and it has good hidden capacity,reversibility and separability.

Key words: Encrypted domain, Quadtree, Reference value, Reversible data hiding

CLC Number: 

  • TP391
[1]TIAN J.Reversible data embedding using a difference expansion [J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896.
[2]CHANG Z,KOU W,XU J.More compressible location map for reversible watermarking using expansion embedding[J].Electronics Letters,2007,43(24):1353-1354.
[3]XIANG H Y,HOU S Z.Information Hiding Optimization Algorithm Based on Difference Location Map Adjustment[J].Computer Engineering,2016,42(3):249-253.(in Chinese)项洪印,侯思祖.基于差值位置图调整的信息隐藏优化算法[J].计算机工程,2016,42(3):249-253.
[4]NI Z,SHI Y Q,ANSARI N,et al.Reversible data hiding[J]. IEEE Transactions on Circuits and Systems for Video Technology,2006,16(3):354-362.
[5]WANG X,LI K,FU K Y,et al.Histogram shifting based adaptive reversible watermarking algorithm with a high capacity[J].Journal of XiDian University,2014,41(1):124-129.(in Chinese)王祥,李可,付凯元,等.直方图平移的自适应大容量可逆水印算法[J].西安电子科技大学学报(自然科学版),2014,41(1):124-129.
[6]THODI D M,RODRÍGUEZ J J.Expansion embedding tech-niques for reversible watermarking[J].IEEE Transactions on Image Processing,2007,16(3):721-730.
[7]THODI D M,RODRIGUEZ J J.Prediction-error based reversible watermarking[C]∥International Conference on Image Processing.IEEE,2004:1549-1552.
[8]QU X,KIM H J.Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding[J].Signal Processing,2015,111(C):249-260.
[9]KUMAR M,AGRAWAL S.Reversible data hiding based onprediction error expansion using adjacent pixels[J].Security & Communication Networks,2016,9(16):3703-3712.
[10]AN L,GAO X,LI X,et al.Robust reversible watermarking via clustering and enhanced pixel-wise masking[J].IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society,2012,21(8):3598-3611.
[11]AN L,GAO X,YUAN Y,et al.Content-adaptive reliable robust lossless data embedding[J].Neurocomputing,2012,79(3):1-11.
[12]ZHANG X.Reversible Data Hiding in Encrypted Image[J].Signal Processing Letters IEEE,2012,18(4):255-258.
[13]HONG W,CHEN T S,WU H Y.An improved rev-ersible data hiding in encrypted images using side match[J].IEEE Signal Processing Letters,2012,19(4):199-202.
[14]ZHANG X.Separable Reversible Data Hiding in Encrypted Ima-ge[J].IEEE Transactions on Information Forensics & Security,2012,7(2):826-832.
[15]MA K,ZHANG W,ZHAO X,et al.Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption[J].IEEE Transactions on Information Forensics & Security,2013,8(3):553-562.
[16]AGRAWAL S,KUMAR M.Mean value based reversible data hiding in encrypted images[J].Optik-International Journal for Light and Electron Optics,2016,130(16):922-934.
[17]FISHER Y.Fractal image compression.Theory and application[M].New York:Springer,1995:1042-1045.
[18]ZHAO Y J,DI L Z.An Adaptive Watermarking Scheme Based on Quadtree-Split in the Wavelet Domain[J].Microelectronics &Computer,2005,22(12):122-125.(in Chinese)赵友军,邸兰振.一种基于四又树分割的小波域自适应水印方案[J].微电子学与计算机,2005,22(12):122-125.
[19]NIE D C,ZHENG H Y.A Fractal Information Hiding Algorithm Based on Quad-Tree Partition[J].Computer Applications and Software,2015(2):307-310.(in Chinese)聂道聪,郑洪源.一种使用四叉树分割的分形信息隐藏算法[J].计算机应用与软件,2015(2):307-310.
[20]ZHANG X,FENG G,REN Y,et al.Scalable Coding of Encryp-ted Images[J].IEEE Transactions on Image Processing,2012,21(6):3108-3114.
[1] HAO Jie, PING Ping, FU De-yin, ZHAO Hong-ze. Bi-histogram Shifting Reversible Data Hiding Method After Compressed Differences [J]. Computer Science, 2022, 49(9): 340-346.
[2] MA Bin, HOU Jin-cheng, WANG Chun-peng, LI Jian, SHI Yun-qing. High Capacity Reversible Data Hiding Algorithm for Audio Files Based on Code Division Multiplexing [J]. Computer Science, 2021, 48(9): 298-305.
[3] WANG Yin-di, ZHANG Zhe-qing, YAN Li. Indexing Bi-temporal RDF Model [J]. Computer Science, 2021, 48(4): 63-69.
[4] ZHANG Zhen-zhen ,WANG Jian-lin. Dictionary Learning Image Denoising Algorithm Combining Second Generation Bandelet Transform Block [J]. Computer Science, 2018, 45(7): 264-270.
[5] WANG Zhen-wu, LV Xiao-hua and HAN Xiao-hui. Survey of Terrain LOD Technology Based on Quadtree Segmentation [J]. Computer Science, 2018, 45(4): 34-45.
[6] XIANG Yu-dong and WU Gui-xing. Pixel Prediction Based Reversible Data Hiding Scheme for Image [J]. Computer Science, 2018, 45(2): 189-196.
[7] YU Xin-yi, ZHAN Yi-an, ZHU Feng, OU Lin-lin. Improved ORB Feature Extraction Algorithm Based on Quadtree Encoding [J]. Computer Science, 2018, 45(11A): 222-225.
[8] ZHANG Si-si, LIU Yu and ZHAO Zhi-bin. Fractal Image Retrieval Algorithm Based on Contiguous-matches [J]. Computer Science, 2015, 42(12): 292-296.
[9] LUO Jian-gao and HAN Guo-qiang. Reversible Data Hiding Based on Full Context Prediction [J]. Computer Science, 2013, 40(Z11): 219-223.
[10] . Layered Near-lossless Compression Scheme of Hyper-spectral Image in Airborne Remote Sensing System [J]. Computer Science, 2012, 39(7): 293-296.
[11] . Reversible Data Hiding Based on Reference Pixel of Block [J]. Computer Science, 2012, 39(2): 47-51.
[12] . Content-based Reversible Steganographic Method for Multimodal Biometrics [J]. Computer Science, 2012, 39(11): 70-74.
[13] FANG Shao-bong,ZHENG Yun-ping,CHEN Chuan-bo. Binary Image Representation Method Using Improved TNAM [J]. Computer Science, 2010, 37(4): 261-.
[14] . [J]. Computer Science, 2008, 35(8): 213-217.
[15] . [J]. Computer Science, 2008, 35(11): 220-224.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!