Reversible Data Hiding in a Chaotic Encryption Domain Based on Odevity Verification

Reversible Data Hiding in a Chaotic Encryption Domain Based on Odevity Verification

Lianshan Liu, Xiaoli Wang, Lingzhuang Meng, Gang Tian, Ting Wang
Copyright: © 2021 |Pages: 14
DOI: 10.4018/IJDCF.20211101.oa9
Article PDF Download
Open access articles are freely available for download

Abstract

On the premise of guaranteeing the visual effect, in order to improve the security of the image containing digital watermarking and restore the carrier image without distortion, reversible data hiding in chaotic encryption domain based on odevity verification was proposed. The original image was scrambled and encrypted by Henon mapping, and the redundancy between the pixels of the encrypted image was lost. Then, the embedding capacity of watermarking can be improved by using odevity verification, and the embedding location of watermarking can be randomly selected by using logistic mapping. When extracting the watermarking, the embedded data was judged according to the odevity of the pixel value of the embedding position of the watermarking, and the carrier image was restored nondestructively by odevity check image. The experimental results show that the peak signal-to-noise ratio (PSNR) of the original image is above 53 decibels after the image is decrypted and restored after embedding the watermarking in the encrypted domain, and the invisibility is good.
Article Preview
Top

1 Introduction

More and more people were aware of the importance of protecting intellectual property rights. In order to protect their personal privacy and protect their legitimate rights and interests, they paid more and more attention to the protection of image property rights. Encryption technology and watermarking technology were two important means to protect multimedia digital information security and integrity. Reversible digital watermarking technology (Thodi & Rodriguez, 2007) was a new branch of digital watermarking technology. It could not only extract watermarking information correctly, but also restore the original carrier without distortion after extracting information. Therefore, it was widely used in sensitive areas such as medical images, military images and forensic images. Image encryption technology (Yun-peng et al., 2009) was to transform plaintext data into ciphertext data, which can reduce the risk of being stolen by others. How to combine encryption technology with reversible watermarking technology to improve the reliability of embedding and extracting process was a subject worthy of study.

Reversible watermarking technology mainly included spatial domain algorithm (Xiao et al., 2019)(Ishtiaq et al., 2018) and transform domain algorithm. (Nguyen et al., 2016) Spatial domain algorithm mainly used redundancy between pixels to realize watermarking embedding, and transform domain algorithm used frequency of image to embedding watermarking. Reversible watermarking technology in encryption domain belonged to a special kind, it was encrypted in space domain and transform domain. Reversible data hiding of encrypted image was widely used in medical field(Kittawi & Al-Haj, 2017)(Parah & Ahad, 2018)(Abbasi & Memon, 2018). In the aspect of algorithm, for example, Zhang (2011) used the least significant bit method to embed the watermarking after excepting or encrypting the image in the spatial domain. Hong (2012) improved the above algorithm, making full use of the pixels calculated the smoothness of each block and the pixel correlation of adjacent block boundaries. Qian (2014) aimed to encrypt a JPEG bit stream into a properly organized structure, and embedded a secret message into the encrypted bit stream by slightly modifying the JPEG stream. Peng (2019) proposed an encryption domain RDH scheme for two-dimensional vector graphics based on real reversible mapping model (Bouridah et al., 2017)(Gao & Gao,). Encryption used chaotic mode to encrypt the image. After chaotic encryption, reversible data was hidden and extracted, which had higher security. But after encryption, the redundancy between the pixels of the image was lost, this situation resulted in the difficulty of watermarking embedding and the decreased of the embedding capacity of the watermarking. Zhang improved the watermarking embedding method of encrypted image and designed a special encryption scheme to encrypt the estimation error(Zhang et al., 2014). Later, a framework of RDH-EI based on Reversible Image Transform (RIT) was proposed to meet different image quality requirements and larger embedding capacity(Zhang et al., 2016). Aiming at the problem of low embedding capacity of encrypted image(Cao et al., 2016)(Choi & Pun, 2017), different high embedding capacity methods were adopted to improve the embedding capacity.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing