Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Bi-directional Block Encoding for Reversible Data Hiding over Encrypted Images

Published: 07 February 2024 Publication History
  • Get Citation Alerts
  • Abstract

    Reversible data hiding over encrypted images (RDH-EI) technology is a viable solution for privacy-preserving cloud storage, as it enables the reversible embedding of additional data into images while maintaining image confidentiality. Since the data hiders, e.g., cloud servers, are willing to embed as much data as possible for storage, management, or other processing purposes, a large embedding capacity is desirable in an RDH-EI scheme. In this article, we introduce a novel bi-directional block encoding (BDBE) method, which, for the first time, encodes the distances of values in a binary sequence from both ends. This approach allows for encoding images with smaller sizes compared to traditional and state-of-the-art encoding methods. Leveraging the BDBE technique, we propose a high-capacity RDH-EI scheme. In this scheme, the content owner initially predicts the image pixels and then employs BDBE to encode the prediction errors, creating space for data embedding. The resulting encoded data are subsequently encrypted using a secure stream cipher, such as the Advanced Encryption Standard, before being transmitted to a data hider. The data hider can embed confidential information within the encrypted image for the purposes of storage, management, or other processing. Upon receiving the data, an authorized receiver can accurately recover the original image and the embedded data without any loss. Experimental results demonstrate that our RDH-EI scheme achieves a significantly larger embedding capacity compared to several state-of-the-art schemes.

    References

    [1]
    Jacob Benesty, Jingdong Chen, and Yiteng Huang. 2008. On the importance of the Pearson correlation coefficient in noise reduction. IEEE Trans. Audio Speech Lang. Process. 16, 4 (2008), 757–765.
    [2]
    Rupali Bhardwaj and Ashutosh Aggarwal. 2020. An improved block based joint reversible data hiding in encrypted images by symmetric cryptosystem. Pattern Recognit. Lett. 139 (2020), 60–68.
    [3]
    Fan Chen, Yuan Yuan, Hongjie He, Miao Tian, and Heng-Ming Tai. 2021. Multi-MSB compression based reversible data hiding scheme in encrypted images. IEEE Trans. Circ. Syst. Video Technol. 31, 3 (2021), 905–916.
    [4]
    Kaimeng Chen and Chin-Chen Chang. 2019. High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement. J. Vis. Commun. Image Represent. 58 (2019), 334–344.
    [5]
    Bo Guan and Dawen Xu. 2020. An efficient high-capacity reversible data hiding scheme for encrypted images. J. Vis. Commun. Image Represent. 66 (2020), 102744.
    [6]
    Yan Ke, Minqing Zhang, Xinpeng Zhanga, Jia Liu, Tingting Su, and Xiaoyuan Yang. 2022. A reversible data hiding scheme in encrypted domain for secret image sharing based on chinese remainder theorem. IEEE Trans. Circ. Syst. Video Technol. 32, 4 (2022), 2469–2481.
    [7]
    Fouad Khelifi. 2018. On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain. Sign. Process. 143 (2018), 336–345.
    [8]
    Liang Kong and Heng Nian. 2021. Fault detection and location method for mesh-type DC microgrid using pearson correlation coefficient. IEEE Trans. Power Del. 36, 3 (2021), 1428–1439.
    [9]
    Qi Li, Bin Yan, Hui Li, and Na Chen. 2018. Separable reversible data hiding in encrypted images with improved security and capacity. Multimedia Tools Appl. 77 (2018), 30749–30768.
    [10]
    Zilong Liu and Chi-Man Pun. 2022. Reversible data hiding in encrypted images using chunk encryption and redundancy matrix representation. IEEE Trans. Depend. Secure Comput. 19, 2 (2022), 1382–1394.
    [11]
    Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, and Fenghua Li. 2013. Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forens. Secur. 8, 3 (2013), 553–562.
    [12]
    Mehedi Masud, Ghulam Muhammad, Hesham Alhumyani, Sultan S. Alshamrani, Omar Cheikhrouhou, Saleh Ibrahim, and M. Shamim Hossain. 2020. Deep learning-based intelligent face recognition in IoT-cloud environment. Computer Commun. 152 (2020), 215–222.
    [13]
    Ammar Mohammadi, Mansor Nakhkash, and Mohammad Ali Akhaee. 2020. A high-capacity reversible data hiding in encrypted images employing local difference predictor. IEEE Trans. Circ. Syst. Video Technol. 30, 8 (2020), 2366–2376.
    [14]
    W. Puech, M. Chaumont, and O. Strauss. 2008. A reversible data hiding method for encrypted images. In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Vol. 6819. International Society for Optics and Photonics, 534–542.
    [15]
    Pauline Puteaux and William Puech. 2021. A recursive reversible data hiding in encrypted images method with a very high payload. IEEE Trans. Multimedia 23 (2021), 636–650.
    [16]
    Zhenxing Qian and Xinpeng Zhang. 2016. Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans. Circ. Syst. Video Technol. 26, 4 (2016), 636–646.
    [17]
    Yingqiang Qiu, Qichao Ying, Yuyan Yang, Huanqiang Zeng, Sheng Li, and Zhenxing Qian. 2022. High-capacity framework for reversible data hiding in encrypted image using pixel prediction and entropy encoding. IEEE Trans. Circ. Syst. Video Technol. 32, 9 (2022), 5874–5887.
    [18]
    Lingfeng Qu, Fan Chen, Shanjun Zhang, and Hongjie He. 2021. Cryptanalysis of reversible data hiding in encrypted images by block permutation and co-modulation. IEEE Trans. Multimedia 24 (2021), 2924–2937.
    [19]
    Meng Shen, Guohua Cheng, Liehuang Zhu, Xiaojiang Du, and Jiankun Hu. 2020. Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Fut. Gener. Comput. Syst. 109 (2020), 621–632.
    [20]
    Shaowei Weng, Caiying Zhang, Tiancong Zhang, and Kaimeng Chen. 2021. High capacity reversible data hiding in encrypted images using SIBRW and GCC. J. Vis. Commun. Image Represent. 75 (2021), 102932.
    [21]
    Ian H. Witten, Radford M. Neal, and John G. Cleary. 1987. Arithmetic coding for data compression. Commun. ACM 30, 6 (1987), 520–540.
    [22]
    Hao-Tian Wu, Yiu ming Cheung, Zhiyuan Yang, and Shaohua Tang. 2019. A high-capacity reversible data hiding method for homomorphic encrypted images. J. Vis. Commun. Image Represent. 62 (2019), 87–96.
    [23]
    Xiaolin Wu and Nasir Memon. 1997. Context-based, adaptive, lossless image coding. IEEE Trans. Commun. 45, 4 (1997), 437–444.
    [24]
    Zebin Wu, Jin Sun, Yi Zhang, Yaoqin Zhu, Jun Li, Antonio Plaza, Jón Atli Benediktsson, and Zhihui Wei. 2021. Scheduling-guided automatic processing of massive hyperspectral image classification on cloud computing architectures. IEEE Trans. Cybern. 51, 7 (2021), 3588–3601.
    [25]
    Zhihua Xia, Qiuju Ji, Qi Gu, Chengsheng Yuan, and Fengjun Xiao. 2022. A format-compatible searchable encryption scheme for JPEG images using bag-of-words. ACM Trans. Multimedia Comput. Commun. Appl. 18, 3, Article 85 (March2022), 18 pages.
    [26]
    Zhihua Xia, Leqi Jiang, Dandan Liu, Lihua Lu, and Byeungwoo Jeon. 2019. BOEW: A content-based image retrieval scheme using bag-of-encrypted-words in cloud computing. IEEE Trans. Serv. Comput. 15, 1 (2019), 202–214.
    [27]
    Lizhi Xiong, Xiao Han, Ching-Nung Yang, and Zhihua Xia. 2023. RDH-DES: Reversible data hiding over distributed encrypted-image servers based on secret sharing. ACM Trans. Multimedia Comput. Commun. Appl. 19, 1, Article 5 (January2023), 19 pages.
    [28]
    Shuying Xu, Ji-Hwei Horng, Ching-Chun Chang, and Chin-Chen Chang. 2023. Reversible data hiding with hierarchical block variable length coding for cloud security. IEEE Trans. Depend. Secure Comput. 20, 5 (2023), 4199–4213.
    [29]
    Shuang Yi and Yicong Zhou. 2015. An improved reversible data hiding in encrypted images. In Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP ’15). 225–229.
    [30]
    Shuang Yi and Yicong Zhou. 2017. Binary-block embedding for reversible data hiding in encrypted images. Sign. Process. 133 (2017), 40–51.
    [31]
    Shuang Yi and Yicong Zhou. 2019. Separable and reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans. Multimedia 21, 1 (2019), 51–64.
    [32]
    Zhaoxia Yin, Yinyin Peng, and Youzhi Xiang. 2022. Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression. IEEE Trans. Depend. Secure Comput. 19, 2 (2022), 992–1002.
    [33]
    Zhaoxia Yin, Youzhi Xiang, and Xinpeng Zhang. 2020. Reversible data hiding in encrypted images based on multi-MSB prediction and huffman coding. IEEE Trans. Multimedia 22, 4 (2020), 874–884.
    [34]
    Weiming Zhang, Kede Ma, and Nenghai Yu. 2014. Reversibility improved data hiding in encrypted images. Sign. Process. 94 (2014), 118–127.
    [35]
    Xinpeng Zhang. 2011. Reversible data hiding in encrypted image. IEEE Sign. Process. Lett. 18, 4 (2011), 255–258.
    [36]
    Jiantao Zhou, Weiwei Sun, Li Dong, Xianming Liu, Oscar C. Au, and Yuan Yan Tang. 2016. Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans. Circ. Syst. Video Technol. 26, 3 (2016), 441–452.

    Index Terms

    1. Bi-directional Block Encoding for Reversible Data Hiding over Encrypted Images

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 20, Issue 5
      May 2024
      650 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/3613634
      • Editor:
      • Abdulmotaleb El Saddik
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 February 2024
      Online AM: 12 January 2024
      Accepted: 17 December 2023
      Revised: 01 November 2023
      Received: 26 June 2023
      Published in TOMM Volume 20, Issue 5

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Image encoding
      2. reversible data hiding
      3. encrypted image

      Qualifiers

      • Research-article

      Funding Sources

      • National Natural Science Foundation of China
      • Guangdong Basic and Applied Basic Research Foundation
      • Science and Technology Research Program of Chongqing Municipal Education Commission
      • Research Foundation of Southwest University of Political Science and Law
      • Foundation for Science and Technology Innovation of Shenzhen

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 214
        Total Downloads
      • Downloads (Last 12 months)214
      • Downloads (Last 6 weeks)36

      Other Metrics

      Citations

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media