Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

Reversible image visual transformation for privacy and content protection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

In this paper, a novel image transformation scheme is proposed to protect the visual information. By mimicking an arbitrarily chosen reference image, a secret image is visually changed and can be exactly recovered from the transformed image when needed. Unlike the block-wise visual encryption methods, the proposed transformation scheme modifies the secret image by bit plane replacement and reordering so that no block effect is introduced. In particular, one or more bit planes are hidden into the other bit planes so that the most significant one(s) can be vacated. Besides replacing the vacated bit plane(s) and reordering the others according to the reference image, histogram modification may be performed to conceal the secret content if needed. To exactly recover the secret image, the required information is recorded and reversibly hidden into the transformed image by adopting a reversible data hiding algorithm. The experimental results on three image sets show that their content can be semantically changed to prevent leakage of visual information. Moreover, the applicability and efficiency of the proposed scheme have been validated by comparing the existing visual encryption schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans. Inf. Foren. Sec 7(3):1003–1017

    Article  Google Scholar 

  2. Break Our Watermarking System, 2nd Edition. http://bows2.ec-lille.fr/

  3. Cheung YM, Wu HT (2007) A sequential quantization strategy for data embedding and integrity verification. IEEE Trans. Circuits Syst. Video Technol 17 (8):1007–1016

    Article  Google Scholar 

  4. Coltuc D, Chassery J-M (2007) Very fast watermarking by reversible contrast mapping. IEEE Signal Processing Letters 14(4):255–258

    Article  Google Scholar 

  5. Dragoi I-C, Coltuc D (2015) On local prediction based reversible watermarking. IEEE Trans. Image Process 24(4):1244–1246

    Article  MathSciNet  Google Scholar 

  6. Hou D, Zhang W, Yu N (2016) Image camouflage by reversible image transformation. J. Vis. Commun. Image R 40(A):225–236

    Article  Google Scholar 

  7. Hou D, Zhang W, Zhan Z, Jiang R, Yang Y, Yu N (2016) Reversible image processing via reversible data hiding. Proc. IEEE International Workshop on Digital Signal Processing, pp 427–431

  8. Kang Y, Liu F, Yang C, Luo X, Zhang T (2019) Color image steganalysis based on residuals of channel differences. Computers, Materials & Continua 59(1):315–329

    Article  Google Scholar 

  9. Lai IJ, Tsai WH (2011) Secret-fragment-visible mosaic image - a new computer art and its application to information hiding. IEEE Trans. Inf. Forens. Secur 6(3):936–945

    Article  Google Scholar 

  10. Lee YL, Tsai WH (2014) A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformations. IEEE Trans. Circuits Syst. Video Technol 24(4):695–703

    Article  Google Scholar 

  11. Li X, et al. (2015) Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Foren. Sec 10(9):2016–2027

    Article  Google Scholar 

  12. Liao X, et al. (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Selected Topics Signal Process 14 (5):955–968

    Article  Google Scholar 

  13. Ma B, Shi YQ (2016) A reversible data hiding scheme based on code division multiplexing. IEEE Trans. Inf. Foren. Sec 11(9):1914–1927

    Article  Google Scholar 

  14. Ou B, Li X, Zhao Y, Ni R, Shi YQ (2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process 22(12):5010–5021

    Article  MathSciNet  Google Scholar 

  15. Peng F, Lin Z, Zhang X, Long M (2019) Reversible data hiding in encrypted 2D vector graphics based on reversible mapping model for real numbers. IEEE Trans. Inf. Foren. Sec 14(9):2400–2411

    Article  Google Scholar 

  16. Qin C, Chang C-C, Hsu T-J (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimedia Tools and Applications 74:5861–5872

    Article  Google Scholar 

  17. Reinhard E, Ashikhmin M, Gooch B, Shirley P (2001) Color transfer between images. IEEE Comput. Graph. Appl 21(5):34–41

    Article  Google Scholar 

  18. Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol 19(7):989–999

    Article  Google Scholar 

  19. Shi YQ, Li X, Zhang X, Wu HT, Ma B (2016) Reversible data hiding: Advances in the past two decades. IEEE Access 4:3210–3237

    Article  Google Scholar 

  20. Su W, Wang X, Li F, Shen Y, Pei Q (2019) Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering. Multimedia Tools and Applications 78:7927–7945

    Article  Google Scholar 

  21. Subburam S, Selvakumar S, Geetha S (2018) High performance reversible data hiding scheme through multilevel histogram modification in lifting integer wavelet transform. Multimedia Tools and Applications 77:7071–7095

    Article  Google Scholar 

  22. The USC Image Database. http://sipi.usc.edu/database/

  23. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process 13(4):600–612

    Article  Google Scholar 

  24. Wang B, Kong W, Li W, Xiong NN (2019) A dual-chaining watermark scheme for data integrity protection in internet of things, computers. Materials & Continua 58(3):679–695

    Article  Google Scholar 

  25. Wang J, Ni J, Zhang X, Shi YQ (2017) Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans. Cybernetics 47(2):315–326

    Google Scholar 

  26. Wang Y, Zhu G, Kwong S, Shi YQ (2018) A study on the security levels of spread-spectrum embedding schemes in the WOA framework. IEEE Trans. Cybernetics 48(8):2307–2320

    Article  Google Scholar 

  27. Wu HT, Huang J (2012) Reversible image watermarking on prediction error by efficient histogram modification. Signal Process 92(12):3000–3009

    Article  Google Scholar 

  28. Wu HT, Dugelay JL, Cheung YM (2008) A data mapping method for steganography and its application to images. In: Proc. Information Hiding. IH 2008. Lecture Notes in Computer Science, vol 5284. Springer, Berlin, Heidelberg, pp 236–250

  29. Wu HT, Dugelay JL, Shi YQ (2015) Reversible image data hiding with contrast enhancement. IEEE Signal Process. Lett 22(1):81–85

    Article  Google Scholar 

  30. Wu HT, Cheung YM, Huang J (2016) Reversible data hiding in Paillier cryptosystem. J Vis Commun Image R 40:765–771

    Article  Google Scholar 

  31. Wu HT, Tang S, Dugelay JL (2018) Image reversible visual transformation based on MSB replacement and histogram bin mapping. Proc. the 10th International Conference on Advanced Computational Intelligence, pp 813–818

  32. Wu H-T, Tang S, Huang J, Shi Y-Q (2018) A novel reversible data hiding method with image contrast enhancement. Signal Process: Image Communication 62:64–73

    Google Scholar 

  33. Wu HT, Yang Z, Cheung YM, Xu L, Yang S (2019) High-capacity reversible data hiding in encrypted images by bit plane partiton and MSB prediction. IEEE Access 7:62361–62371

    Article  Google Scholar 

  34. Xia Z, Lu L, Qiu T, Shim HJ, Chen X, Jeon B (2019) A privacy-preserving image retrieval based on ac-coefficients and color histograms in cloud environment, computers. Materials & Continua 58(1):27–43

    Article  Google Scholar 

  35. Xiao D, Liang J, Ma Q, Xiang Y, Zhang Y (2019) High capacity data hiding in encrypted image based on compressive sensing for nonequivalent resources. Computers, Materials & Continua 58(1):1–13

    Article  Google Scholar 

  36. Yang J, Xie J, Zhu G, Kwong S, Shi YQ (2014) An effective method for detecting double JPEG compression with the same quantization matrix. IEEE Trans. Inf. Foren. Sec 9(11):1933–1942

    Article  Google Scholar 

  37. Yang J, Zhang Y, Zhu G, Kwong S (2020) A Clustering-based framework for improving the performance of jpeg quantization step estimation. IEEE Trans. Circuits Syst. Video Technol. https://doi.org/10.1109/TCSVT.2020.3003653

  38. Zhang W, Wang H, Hou D, Yu N (2016) Reversible data hiding in encrypted images by reversible image transformation. IEEE Trans. Multimedia 18 (8):1469–1479

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (No. 61772208), the Key-Area Research and Development Program of Guangdong Province (No. 2019B010137004) of China and Fundamental Research Funds for the Central Universities of China (x2js-D2190700).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hao-Tian Wu.

Ethics declarations

Conflict of interests

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, HT., Jia, R., Dugelay, JL. et al. Reversible image visual transformation for privacy and content protection. Multimed Tools Appl 80, 30863–30877 (2021). https://doi.org/10.1007/s11042-020-09985-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09985-1

Keywords