Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240900030-8.doi: 10.11896/jsjkx.240900030

• Information Security • Previous Articles     Next Articles

Reversible Data Hiding in Fully Encrypted Images Based on Pixel Interval Partitioning andPrediction Recovery

LIU Runjun1, XIAO Fengjun2, HU Weitong2, WANG Xu3   

  1. 1 Zhejiang Haers Vacuum Containers Co.,Ltd.,Jinhua,Zhejiang 321300,China
    2 School of Cyberspace Security,Hangzhou Dianzi University,Hangzhou 310018,China
    3 School of Information Science and Engineering,University of Jinan,Jinan 250022,China
  • Online:2025-06-16 Published:2025-06-12
  • About author:LIU Runjun,born in 1977,senior engineer.His main research interests include electronic applications based on IoT and image security.
    WANG Xu,born in 1990,Ph.D,lecturer,is a member of CCF(No.O0730M).His main research interests include multimedia security,data hiding and deep learning.
  • Supported by:
    National Natural Science Foundation of China(72374058) and Zhejiang Natural Science Foundation(LQ21F020013).

Abstract: Reversible data hiding in encrypted images is a crucial cybersecurity technology for covert communication and privacy protection,and reversible data hiding schemes for fully encrypted images offer more reliable security.However,existing algorithms suffer from low embedding capacity and poor quality of recovered images,making them unsuitable for complex cloud environments.To address these issues,this paperproposes a reversible data hiding scheme for fully encrypted images based on pixel interval partitioning and prediction recovery.The image owner fully encrypts the original image using an image encryption key.The data hider embeds additional information into the encrypted image using a data embedding key through pixel interval partitioning.The image receiver can extract the embedded data using the data embedding key losslessly and achieve high-quality recovery of the image with the help of the image encryption key and pixel prediction.Experimental results demonstrate that the embedding rate of the proposed algorithm is more than doubled compared to the optimal existing algorithms,and the quality of the recovered images is significantly improved.

Key words: Reversible data hiding, Fully encrypted image, Pixel interval partitioning, Pixel prediction, Privacy protection

CLC Number: 

  • TP309
[1]LI CG,HAN Z Z,ZHANG,H R.Image encryption techniques:A servey[J].Journal of Computer Research and Development,2002,10:1317-1324.
[2]TAI W L,YEH C M,CHANG C C.Reversible data hidingbased on histogram modification of pixel differences[J].IEEE Transactions on Circuits and Systems for Video Technology,2009,19(6):906-910.
[3]TIAN,J.Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896.
[4]HU Y J,LEE H K,CHEN K,et al.Difference expansion based reversible data hiding using two embedding directions[J].IEEE Transactions on Multimedia,2008,10(8):1500-1512.
[5]KIM H J,SACHNEV V,SHI Y Q,et al.A novel difference expansion transform for reversible data embedding[J].IEEE Transactions on Information Forensics and Security,2008,3(3):456-465.
[6]HONG W.Adaptive reversible data hiding method based on error energy control and histogram shifting[J].Optics Communications,2012,285(2):101-108.
[7]LI X L,LI B,YANG B,et al.General framework to histogram-shifting-based reversible data hiding[J].IEEE Transactions on Image Processing,2013,22(6):2181-2191.
[8]ZHANG W M,HU X C,LI X L,et al.Recursive histogrammodification:establishing equivalency between reversible data hiding and lossless data compression[J].IEEE Transactions on Image Processing,2013,22(7):2775-2785.
[9]QU X C,HYOUNG J K.Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding[J].Signal Proces-sing,2015,111:249-260.
[10]WENG S W,SHI Y Q,HONG W,et al.Dynamic improvedpixel value ordering reversible data hiding[J].Information Scien-ces,2019,489:136-154.
[11]OU B,LI X L,ZHAO Y,et al.Pairwise prediction-error expansion for efficient reversible data hiding[J].IEEE Transactions on Image Processing,2013,22(12):5010-5021.
[12]CHEN J Y,WANG C,ZHANG W M,et al.Secure ciphertext domain image steganography[J].Journal of Electronics & Information Technology,2012,34(7):1721-1726.
[13]MA K D,ZHANG W M,ZHAO X F,et al.Reversible data hiding in encrypted images by reserving room before encryption[J].IEEE Transactions on Information Forensics and Security,2013,8(3):553-562.
[14]XIAO D,XIANG Y P,ZHENG H Y,et al.Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism[J].Journal of Visual Communication and Image Representation,2017,45:1-10.
[15]CAO X C,DU L,WEI X X,et al.High capacity reversible data hiding in encrypted images by patch-level sparse representation[J].IEEE Transactions on Cybernetics,2015,46(5):1132-1143.
[16]PUTEAUX P,WILLIAM P.An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images[J].IEEE Transactions on Information Forensics and Security,2018,13(7):1670-1681.
[17]PUTEAUX P,WILLIAM P.A recursive reversible data hiding in encrypted images method with a very high payload[J].IEEE Transactions on Multimedia,2020,23:636-650.
[18]YIN ZX,XIANG Y Z,ZHANG X P.Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding[J].IEEE Transactions on Multimedia,2019,22(4):874-884.
[19]YI S,ZHOU Y C.Binary-block embedding for reversible data hiding in encrypted images[J].Signal Processing,2017,133:40-51.
[20]CHEN K M,CHANG C C.High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement[J].Journal of Visual Communication and Image Representation,2019,58:334-344.
[21]YI S,ZHOU Y C.Separable and reversible data hidingin encrypted images using parametric binary tree labeling[J].IEEETransactions on Multimedia,2018,21(1):51-64.
[22]SHIU P F,TAI W L,JAN J K,et al.An interpolative AMBTC-based high-payload RDH scheme for encrypted images[J].Signal Processing:Image Communication,2019,74:64-77.
[23]MOHAMMADI A,MANSOR N,MOHAMMAD A.A high-capacityreversible data hiding in encrypted images employing local difference predictor[J].IEEE Transactions on Circuits and Systems for Video Technology,2020,30(8):2366-2376.
[24]ZHANG X Q,HE F Y,YU C Q,et al.Reversible Data Hiding in Encrypted Images with Asymmetric Coding and Bit-plane Block Compression[J].IEEE Transactions on Multimedia,2024,26:10174-10188.
[25]ZHANG X P.Reversible data hiding in encrypted image[J].IEEE Signal Processing etters,2011,18(4):255-258.
[26]HONG W,CHEN T S,WU H Y.An improved reversible data hiding in encrypted images using side match[J].IEEE Signal Processing Letters,2012,19(4):199-202.
[27]ZHANG X P.Separable reversible data hiding in encryptedimage[J].IEEE Transactions on Information Forensics and Security,2011,7(2):826-832.
[28]WU X T,WEI S.High-capacity reversible data hiding in encrypted images by prediction error[J].Signal Processing,2014,104:387-400.
[29]QIAN Z X,ZHANG X P.Reversible data hiding in encrypted images with distributed source encoding[J].IEEE Transactions on Circuits and Systems forVideo Technology,2015,26(4):636-646.
[30]YU M J,YAO H,QIN C.Reversible data hiding in encrypted images without additional information transmission[J].Signal Processing:Image Communication,2022,105:116696.
[31]WANG X,CHANG C C,LIN C C,et al.Reversal of pixel rotation:A reversible data hiding system towards cybersecurity in encrypted images[J].Journal of Visual Communication and Image Representation,2022,82:103421.
[32]GAO K,HORNG J H,CHANG C C.Dual mode data hiding in fully encrypted images with pixel-shuffling for cloud applications[J].Displays,2024,81:102609.
[33]GE H L,CHENY,QIAN Z X,et al.A high capacity multi-level approach for reversible data hiding in encrypted images[J].IEEE Transactions on Circuits and Systems for Video Technology,2018,29(8):2285-2295.
[34]QIN C,QIAN X K,HONG W,et al.An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer[J].Information Sciences,2019,487:176-192.
[35]WANG X,CHANG C C,LIN C C.Reversible data hiding in encrypted images with block-based adaptive MSB encoding[J].Information Sciences,2021,567:375-394.
[36]LIU Y,YANG B L,ZHAO W Q,et al.Adaptive pixel block re-ference value based reversible data hiding in encrypted domain [J].Computer Science,2018,45(8):151-155.
[37]SACHNEV V,KIM H J,NAM J,et al.Reversible watermar-king algorithm using sorting and prediction[J].IEEE Transactions on Circuits and Systems for Video Technology,2009,19(7):989-999.
[38]BAS P,TOMÁŠ F,TOMÁŠ P.Break our steganographicsys-tem:the ins and outs of organizing BOSS[C]//International Workshop on Information Hiding.Berlin,Heidelberg:Springer Berlin Heidelberg,2011.
[39]BAS P,FURON T.Image dataset of BOWS-2[EB/OL].(2017-06-20)[2019-05-16].http://bows2.ec-lille.fr/.
[1] WANG Chundong, ZHANG Qinghua, FU Haoran. Federated Learning Privacy Protection Method Combining Dataset Distillation [J]. Computer Science, 2025, 52(6A): 240500132-7.
[2] YUAN Lin, HUANG Ling, HAO Kaile, ZHANG Jiawei, ZHU Mingrui, WANG Nannan, GAO Xinbo. Adversarial Face Privacy Protection Based on Makeup Style Patch Activation [J]. Computer Science, 2025, 52(6): 405-413.
[3] CAO Tengfei, YIN Runtian, ZHU Liang, XU Changqiao. Survey of Personalized Location Privacy Protection Technologies [J]. Computer Science, 2025, 52(5): 307-321.
[4] ZHENG Xu, HUANG Xiangjie, YANG Yang. Reversible Facial Privacy Protection Method Based on “Invisible Masks” [J]. Computer Science, 2025, 52(5): 384-391.
[5] LIU Yuming, DAI Yu, CHEN Gongping. Review of Federated Learning in Medical Image Processing [J]. Computer Science, 2025, 52(1): 183-193.
[6] FU Yanming, ZHANG Siyuan. Privacy Incentive Mechanism for Mobile Crowd-sensing with Comprehensive Scoring [J]. Computer Science, 2024, 51(7): 397-404.
[7] LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14.
[8] SUN Min, DING Xining, CHENG Qian. Federated Learning Scheme Based on Differential Privacy [J]. Computer Science, 2024, 51(6A): 230600211-6.
[9] TAN Zhiwen, XU Ruzhi, WANG Naiyu, LUO Dan. Differential Privacy Federated Learning Method Based on Knowledge Distillation [J]. Computer Science, 2024, 51(6A): 230600002-8.
[10] WANG Chenzhuo, LU Yanrong, SHEN Jian. Study on Fingerprint Recognition Algorithm for Fairness in Federated Learning [J]. Computer Science, 2024, 51(6A): 230800043-9.
[11] XU Yicheng, DAI Chaofan, MA Wubin, WU Yahui, ZHOU Haohao, LU Chenyang. Particle Swarm Optimization-based Federated Learning Method for Heterogeneous Data [J]. Computer Science, 2024, 51(6): 391-398.
[12] YOU Feifu, CAI Jianping, SUN Lan. Census Associated Multiple Attributes Data Release Based on Differential Privacy [J]. Computer Science, 2024, 51(3): 368-377.
[13] WANG Dong, LI Zheng, XIAO Bingbing. Blockchain Coin Mixing Scheme Based on Homomorphic Encryption [J]. Computer Science, 2024, 51(3): 335-339.
[14] SUN Min, LI Xinyu, ZHANG Xin. Study on Identity Authentication Scheme of Alliance Chain Based on Multi-level Commitment Protocol [J]. Computer Science, 2024, 51(11A): 240200079-7.
[15] LIU Yuanlong, DAI Hua, LI Zhangchen, ZHOU Qian, YI Xun, YANG Geng. Research on Semantic-aware Ciphertext Rtrieval in Cloud Environments:A Survey [J]. Computer Science, 2024, 51(11): 298-306.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!