Reversible Data Hiding in Encrypted Images Based on Image Interpolation

Reversible Data Hiding in Encrypted Images Based on Image Interpolation

Xiyu Han (Shanghai University, Shanghai, China), Zhenxing Qian (Shanghai University, Shanghai, China), Guorui Feng (Shanghai University, Shanghai, China) and Xinpeng Zhang (Shanghai University, Shanghai, China)
Copyright: © 2014 |Pages: 14
DOI: 10.4018/ijdcf.2014070102
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

This paper proposes a novel method for data hiding in encrypted image using image interpolation. Before the image encryption, the original image is sampled and an interpolation algorithm is used to calculate an estimation of the original image. Errors between the original image and the estimated image are compressed by Huffman encoding, which are further embedded into the estimated image to generate the redundant room. After image encryption using an encryption key, the secret bits are embedded into the reserved room. On the receiver side, the hidden bits can be extracted and the original content of the image can be perfectly recovered. Compared with the published results, the proposed method provides a larger embedding payload.
Article Preview

Introduction

Reversible data hiding (RDH) is an effective tool by which the original image can be perfectly restored and the embedded message completely extracted. Since RDH can losslessly recover the original image after data extraction, it becomes a hot topic and is extensively used in many areas, such as medical imagery, military imagery and law forensics. And RDH is a relatively mature technology, which can generally be divided into three kinds: the general RDH framework by lossless compression in (Fridrich, Goljan & Du, 2002), difference expansion (DE) (Kundur & Karthik, 2004; Celik, Sharma, Tekal & Saber, 2005) and histogram shifting (HS) (Ni, Shi, Ansari & Su, 2006; Tian, 2003). Other RDH methods can be found in (Thodi & Rodríguez, 2007; Tai, Yeh, & Chang, 2009; Luo, Chen, Chen, Zeng, & Xiong, 2010; Li, Yang, & Zeng, 2011).

With the increasing demands for privacy protection, data encryption is vital in cloud computing (Hwang & Li, 2010; Wang, Wang, Ren & Lou, 2010; Takabi, Joshi & Ahn, 2010), especially in some scenarios that the owner of the image is unwilling to publish the image content for the sake of privacy. For example, the image owner wants to upload an image to the server. However, he does not want to expose the image content. On the other side, the server hopes to embed some information of the encrypted data, like the owner’s information and the uploading time, for labelling the image. To this end, some works have been done to hide messages into encrypted images using RDH. Zhang (2011) divides the encrypted image into several non-overlapping blocks sized s×s. In order to embed data, pixels in each block should be randomly partitioned to two pixel sets and with the data hiding key. Each block is embedded with one bit by flipping 3 LSBs (Least Significant Bits) of (or ). Hong, Chen & Wu (2012) improve the accuracy of image recovery in method (Zhang, 2011) by utilizing the spatial correlation and side match technique.

Zhang (2012) first pseudo-randomly permutes the encrypted image into several groups. And all the bits in each group are compressed by multiplying a low density parity check matrix, while the vacated room can be used to embed data. Zhang, Qian, Feng & Ren (2014) losslessly compress partition of the encrypted image using Low Density Parity Check Code (LDPC) and obtain the extra room for embedding the data; on the receiver side, with the help of compressed data and the uncompressed data, the image content can be perfectly recovered. Qian, Han & Zhang (2013) utilize the property of the random histogram in encrypted image, and modulate the histogram for embedding room. All these methods in (Zhang, 2011; Hong et al, 2012; Zhang, 2012) vacate room before encryption and recover the image through the correlation of pixels. Another concept of state-of-art work is to reserve room before encryption. Ma, Zhang, Zhao, Yu & Li (2013) first empty out space by reversibly embedding LSBs of some pixels into other pixels employing traditional RDH algorithms, thus, the emptied positions of these LSBs can be used to embed data. To reserve room before encryption, Zhang, Ma, & Yu (2014) propose a method based on estimation technique. A few parts of pixels are estimated by the rest pixels before encryption. The estimated errors are trimmed and modified to vacate room for embedding data.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 10: 4 Issues (2018): 1 Released, 3 Forthcoming
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing