Abstract
While most reversible data hiding in encrypted images (RDH-EI) are based on stream cipher, this paper aims to present an alternative method feasible for block-enciphered images. Before uploading data to a remote server, the content owner encrypts the original image with a block cipher algorithm using an encryption key. Then, the server embeds additional bits into the encrypted image with an embedding key to generate the marked encrypted image. On the recipient side, the additional bits can be extracted if the receiver has the embedding key. In case the receiver has only the encryption key, the marked encrypted image can be directly deciphered to a plaintext image with good quality. When both the embedding and encryption keys are available for the receiver, he can recover the original image without any errors. Compared with the existing block cipher based RDH-EI method, drawbacks of the encryption and the recovery are avoided, and good embedding payloads are achieved.
Similar content being viewed by others
References
Deng M, Bianchi T, Piva A, Preneel B (2009) An efficient buyer-seller watermarking protocol based on composite signal representation. in Proc. 11th ACM Workshop Multimedia and Security. pp. 9–18.
Erkin Z, Piva A, Katzenbeisser S, et al. (2008) Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP J Inf Secur 2007
Fridrich J, Goljan M (2002) “Lossless data embedding for all image formats, vol 4675. Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, pp 572–583
Fu Z, Sun X, Liu Q, et al. (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200.
Hong W, Chen T, Wu H (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19(4):199–202
Johnson M, Ishwar P, Prabhakaran VM, Schonberg D, Ramchandran K (2004) On compressing encrypted data. IEEE Trans Signal Process 52(10):2992–3006
Kalker T, Willems FM (2002) Capacity bounds and code constructions for reversible data-hiding. in Proc. 14th Int. Conf Digital Signal Process (DSP2002), pp. 71–76
Li XL, Yang B, Zeng TY (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20(12):3524–3533
Lian S, Liu Z, Ren Z, Wang H (2007) Commutative encryption and watermarking in video compression. IEEE Trans Circuits Syst Video Technol 17(6):774–778
Liu W, Zeng W, Dong L, Yao Q (2010) Efficient compression of encrypted grayscale images. IEEE Trans Image Process 19(4):1097–1102
Luo L et al (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187–193
Ma K, Zhang W et al (2013) Reversible data hiding in encrypted Images by reserving room before encryption. IEEE Trans Inf Forensics Security 8(3):553–562
Ni Z, Shi Y, Ansari N, Wei S (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362
Puech W, Chaumont M, Strauss O (2008) A reversible data hiding method for encrypted images, Proc. SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 68191E, Feb. 26, doi:10.1117/12.766754.
Qian Z, Han X, Zhang X (2013) Separable Reversible Data hiding in Encrypted Images by n-nary Histogram Modification, 3rd edn. International Conference on Multimedia Technology (ICMT 2013), Guangzhou, pp 869–876
Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted JPEG Bitstream. IEEE Trans on Multimedia 16(5):1486–1491
Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896
Wu X, Sun W (2014) High-capacity reversible data hiding in encrypted Images by prediction error. Signal Process 104:387–400
Zhang X (2011) Reversible data hiding in encrypted images. IEEE Signal Process Lett 18(4):255–258
Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):826–832
Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94:118–127
Acknowledgments
This work was supported by Shanghai Rising-Star Program under Grant 14QA1401900, Natural Science Foundation of China under Grant 61232016, U1405254, and 61472235, Shanghai Key Laboratory of Intelligent Information Processing under Grant IIPL-2014-006, Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning, Shanghai Pujiang Program under Grant 13PJ1403200, and the PAPD fund.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Qian, Z., Zhang, X., Ren, Y. et al. Block cipher based separable reversible data hiding in encrypted images. Multimed Tools Appl 75, 13749–13763 (2016). https://doi.org/10.1007/s11042-015-2760-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2760-9