Abstract
In this paper, a novel image transformation scheme is proposed to protect the visual information. By mimicking an arbitrarily chosen reference image, a secret image is visually changed and can be exactly recovered from the transformed image when needed. Unlike the block-wise visual encryption methods, the proposed transformation scheme modifies the secret image by bit plane replacement and reordering so that no block effect is introduced. In particular, one or more bit planes are hidden into the other bit planes so that the most significant one(s) can be vacated. Besides replacing the vacated bit plane(s) and reordering the others according to the reference image, histogram modification may be performed to conceal the secret content if needed. To exactly recover the secret image, the required information is recorded and reversibly hidden into the transformed image by adopting a reversible data hiding algorithm. The experimental results on three image sets show that their content can be semantically changed to prevent leakage of visual information. Moreover, the applicability and efficiency of the proposed scheme have been validated by comparing the existing visual encryption schemes.






Similar content being viewed by others
References
Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans. Inf. Foren. Sec 7(3):1003–1017
Break Our Watermarking System, 2nd Edition. http://bows2.ec-lille.fr/
Cheung YM, Wu HT (2007) A sequential quantization strategy for data embedding and integrity verification. IEEE Trans. Circuits Syst. Video Technol 17 (8):1007–1016
Coltuc D, Chassery J-M (2007) Very fast watermarking by reversible contrast mapping. IEEE Signal Processing Letters 14(4):255–258
Dragoi I-C, Coltuc D (2015) On local prediction based reversible watermarking. IEEE Trans. Image Process 24(4):1244–1246
Hou D, Zhang W, Yu N (2016) Image camouflage by reversible image transformation. J. Vis. Commun. Image R 40(A):225–236
Hou D, Zhang W, Zhan Z, Jiang R, Yang Y, Yu N (2016) Reversible image processing via reversible data hiding. Proc. IEEE International Workshop on Digital Signal Processing, pp 427–431
Kang Y, Liu F, Yang C, Luo X, Zhang T (2019) Color image steganalysis based on residuals of channel differences. Computers, Materials & Continua 59(1):315–329
Lai IJ, Tsai WH (2011) Secret-fragment-visible mosaic image - a new computer art and its application to information hiding. IEEE Trans. Inf. Forens. Secur 6(3):936–945
Lee YL, Tsai WH (2014) A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformations. IEEE Trans. Circuits Syst. Video Technol 24(4):695–703
Li X, et al. (2015) Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Foren. Sec 10(9):2016–2027
Liao X, et al. (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Selected Topics Signal Process 14 (5):955–968
Ma B, Shi YQ (2016) A reversible data hiding scheme based on code division multiplexing. IEEE Trans. Inf. Foren. Sec 11(9):1914–1927
Ou B, Li X, Zhao Y, Ni R, Shi YQ (2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process 22(12):5010–5021
Peng F, Lin Z, Zhang X, Long M (2019) Reversible data hiding in encrypted 2D vector graphics based on reversible mapping model for real numbers. IEEE Trans. Inf. Foren. Sec 14(9):2400–2411
Qin C, Chang C-C, Hsu T-J (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimedia Tools and Applications 74:5861–5872
Reinhard E, Ashikhmin M, Gooch B, Shirley P (2001) Color transfer between images. IEEE Comput. Graph. Appl 21(5):34–41
Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol 19(7):989–999
Shi YQ, Li X, Zhang X, Wu HT, Ma B (2016) Reversible data hiding: Advances in the past two decades. IEEE Access 4:3210–3237
Su W, Wang X, Li F, Shen Y, Pei Q (2019) Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering. Multimedia Tools and Applications 78:7927–7945
Subburam S, Selvakumar S, Geetha S (2018) High performance reversible data hiding scheme through multilevel histogram modification in lifting integer wavelet transform. Multimedia Tools and Applications 77:7071–7095
The USC Image Database. http://sipi.usc.edu/database/
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process 13(4):600–612
Wang B, Kong W, Li W, Xiong NN (2019) A dual-chaining watermark scheme for data integrity protection in internet of things, computers. Materials & Continua 58(3):679–695
Wang J, Ni J, Zhang X, Shi YQ (2017) Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans. Cybernetics 47(2):315–326
Wang Y, Zhu G, Kwong S, Shi YQ (2018) A study on the security levels of spread-spectrum embedding schemes in the WOA framework. IEEE Trans. Cybernetics 48(8):2307–2320
Wu HT, Huang J (2012) Reversible image watermarking on prediction error by efficient histogram modification. Signal Process 92(12):3000–3009
Wu HT, Dugelay JL, Cheung YM (2008) A data mapping method for steganography and its application to images. In: Proc. Information Hiding. IH 2008. Lecture Notes in Computer Science, vol 5284. Springer, Berlin, Heidelberg, pp 236–250
Wu HT, Dugelay JL, Shi YQ (2015) Reversible image data hiding with contrast enhancement. IEEE Signal Process. Lett 22(1):81–85
Wu HT, Cheung YM, Huang J (2016) Reversible data hiding in Paillier cryptosystem. J Vis Commun Image R 40:765–771
Wu HT, Tang S, Dugelay JL (2018) Image reversible visual transformation based on MSB replacement and histogram bin mapping. Proc. the 10th International Conference on Advanced Computational Intelligence, pp 813–818
Wu H-T, Tang S, Huang J, Shi Y-Q (2018) A novel reversible data hiding method with image contrast enhancement. Signal Process: Image Communication 62:64–73
Wu HT, Yang Z, Cheung YM, Xu L, Yang S (2019) High-capacity reversible data hiding in encrypted images by bit plane partiton and MSB prediction. IEEE Access 7:62361–62371
Xia Z, Lu L, Qiu T, Shim HJ, Chen X, Jeon B (2019) A privacy-preserving image retrieval based on ac-coefficients and color histograms in cloud environment, computers. Materials & Continua 58(1):27–43
Xiao D, Liang J, Ma Q, Xiang Y, Zhang Y (2019) High capacity data hiding in encrypted image based on compressive sensing for nonequivalent resources. Computers, Materials & Continua 58(1):1–13
Yang J, Xie J, Zhu G, Kwong S, Shi YQ (2014) An effective method for detecting double JPEG compression with the same quantization matrix. IEEE Trans. Inf. Foren. Sec 9(11):1933–1942
Yang J, Zhang Y, Zhu G, Kwong S (2020) A Clustering-based framework for improving the performance of jpeg quantization step estimation. IEEE Trans. Circuits Syst. Video Technol. https://doi.org/10.1109/TCSVT.2020.3003653
Zhang W, Wang H, Hou D, Yu N (2016) Reversible data hiding in encrypted images by reversible image transformation. IEEE Trans. Multimedia 18 (8):1469–1479
Acknowledgements
This work was supported by the National Natural Science Foundation of China (No. 61772208), the Key-Area Research and Development Program of Guangdong Province (No. 2019B010137004) of China and Fundamental Research Funds for the Central Universities of China (x2js-D2190700).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
The authors declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Wu, HT., Jia, R., Dugelay, JL. et al. Reversible image visual transformation for privacy and content protection. Multimed Tools Appl 80, 30863–30877 (2021). https://doi.org/10.1007/s11042-020-09985-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09985-1