Skip to main content
Log in

Block cipher based separable reversible data hiding in encrypted images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

While most reversible data hiding in encrypted images (RDH-EI) are based on stream cipher, this paper aims to present an alternative method feasible for block-enciphered images. Before uploading data to a remote server, the content owner encrypts the original image with a block cipher algorithm using an encryption key. Then, the server embeds additional bits into the encrypted image with an embedding key to generate the marked encrypted image. On the recipient side, the additional bits can be extracted if the receiver has the embedding key. In case the receiver has only the encryption key, the marked encrypted image can be directly deciphered to a plaintext image with good quality. When both the embedding and encryption keys are available for the receiver, he can recover the original image without any errors. Compared with the existing block cipher based RDH-EI method, drawbacks of the encryption and the recovery are avoided, and good embedding payloads are achieved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Deng M, Bianchi T, Piva A, Preneel B (2009) An efficient buyer-seller watermarking protocol based on composite signal representation. in Proc. 11th ACM Workshop Multimedia and Security. pp. 9–18.

  2. Erkin Z, Piva A, Katzenbeisser S, et al. (2008) Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP J Inf Secur 2007

  3. Fridrich J, Goljan M (2002) “Lossless data embedding for all image formats, vol 4675. Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, pp 572–583

    Google Scholar 

  4. Fu Z, Sun X, Liu Q, et al. (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200.

    Article  Google Scholar 

  5. Hong W, Chen T, Wu H (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19(4):199–202

    Article  Google Scholar 

  6. Johnson M, Ishwar P, Prabhakaran VM, Schonberg D, Ramchandran K (2004) On compressing encrypted data. IEEE Trans Signal Process 52(10):2992–3006

    Article  MathSciNet  Google Scholar 

  7. Kalker T, Willems FM (2002) Capacity bounds and code constructions for reversible data-hiding. in Proc. 14th Int. Conf Digital Signal Process (DSP2002), pp. 71–76

  8. Li XL, Yang B, Zeng TY (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20(12):3524–3533

    Article  MathSciNet  Google Scholar 

  9. Lian S, Liu Z, Ren Z, Wang H (2007) Commutative encryption and watermarking in video compression. IEEE Trans Circuits Syst Video Technol 17(6):774–778

    Article  Google Scholar 

  10. Liu W, Zeng W, Dong L, Yao Q (2010) Efficient compression of encrypted grayscale images. IEEE Trans Image Process 19(4):1097–1102

    Article  MathSciNet  Google Scholar 

  11. Luo L et al (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187–193

    Article  Google Scholar 

  12. Ma K, Zhang W et al (2013) Reversible data hiding in encrypted Images by reserving room before encryption. IEEE Trans Inf Forensics Security 8(3):553–562

    Article  Google Scholar 

  13. Ni Z, Shi Y, Ansari N, Wei S (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362

    Article  Google Scholar 

  14. Puech W, Chaumont M, Strauss O (2008) A reversible data hiding method for encrypted images, Proc. SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 68191E, Feb. 26, doi:10.1117/12.766754.

  15. Qian Z, Han X, Zhang X (2013) Separable Reversible Data hiding in Encrypted Images by n-nary Histogram Modification, 3rd edn. International Conference on Multimedia Technology (ICMT 2013), Guangzhou, pp 869–876

    Google Scholar 

  16. Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted JPEG Bitstream. IEEE Trans on Multimedia 16(5):1486–1491

    Article  Google Scholar 

  17. Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730

    Article  MathSciNet  Google Scholar 

  18. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896

    Article  Google Scholar 

  19. Wu X, Sun W (2014) High-capacity reversible data hiding in encrypted Images by prediction error. Signal Process 104:387–400

    Article  Google Scholar 

  20. Zhang X (2011) Reversible data hiding in encrypted images. IEEE Signal Process Lett 18(4):255–258

    Article  Google Scholar 

  21. Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):826–832

    Article  Google Scholar 

  22. Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94:118–127

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by Shanghai Rising-Star Program under Grant 14QA1401900, Natural Science Foundation of China under Grant 61232016, U1405254, and 61472235, Shanghai Key Laboratory of Intelligent Information Processing under Grant IIPL-2014-006, Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning, Shanghai Pujiang Program under Grant 13PJ1403200, and the PAPD fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhenxing Qian.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qian, Z., Zhang, X., Ren, Y. et al. Block cipher based separable reversible data hiding in encrypted images. Multimed Tools Appl 75, 13749–13763 (2016). https://doi.org/10.1007/s11042-015-2760-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2760-9

Keywords

Navigation