Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3670105.3670189acmotherconferencesArticle/Chapter ViewAbstractPublication PagescniotConference Proceedingsconference-collections
research-article

Multi-level Block Differencing Approach for Reversible Data Hiding in Encrypted Images

Published: 29 July 2024 Publication History

Abstract

This paper introduces a new RDHEI technique on encrypted images. In our proposed approach, the image is first divided into non-overlapping blocks. The maximum pixel value in each block is found and the difference with other pixels in the block is calculated. Next, the block is then divided into 8 types based on the size of the difference, and compression is applied accordingly. Additionally, the remaining uncompressed pixel in each block is collected for a second layer of compression. Through multiple layers of compression, more compression space is created. Finally, the proposed approach is extended to reversible information hiding in encrypted images. Experimental results demonstrate successful information embedding in encrypted images and increased embedding capacity.

References

[1]
Z. Ni, Y. Shi, N. Ansari, W. Su, “Reversible data hiding,” IEEE Transaction on Circuits and Systems for Video Technology, vol. 16, pp. 354-362, Mar. 2006.
[2]
Ranjana Dwivedi and Vinay Kumar Srivastava, “Reversible Digital Image Watermarking scheme using Histogram Shifting Method,” 2021 IEEE 8th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), 2021.
[3]
S. Weng, W. Tan, B. Ou, J.S. Pan, "Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm," Inform. Sci., vol. 549, pp. 13-33, March 2021.
[4]
Jun Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Transaction on Circuits and System for Video Technology, Vol 13, pp. 890-896, Aug. 2003.
[5]
L. Luo, Z. Chen, M. Chen, X. Zeng, Z. Xiong, “Reversible image watermarking using interpolation technique,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 187-193, Mar. 2010.
[6]
A. Arham, H. A. Nugroho, T. B. Adji, “Multiple layer data hiding scheme based on difference expansion of quad,” Signal Processing, vol. 137, no. 8, pp.52-62, 2017.
[7]
K Ma, W Zhang, X Zhao, "Reversible data hiding in encrypted images by reserving room before encryption," IEEE Transactions on Information Forensics and Security, vol. 8, no. 3, pp. 553-562, 2013.
[8]
Sayli P. Raut and Kiran A. Bhandari, “Vacating Room before Encrypting of Image for Reversible Data Hiding, ” International Journal of Applied Information Systems (IJAIS) – ISSN, Foundation of Computer Science FCS, New York, USA, Volume 11 – No. 3, August 2016.
[9]
X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011.
[10]
Chunqiang Yu, Xianquan Zhang, Guoxiang Li, Shanhua Zhan, Zhenjun Tang, “Reversible data hiding with adaptive difference recovery for encrypted images,” Information Sciences, Vol. 584, pp. 89-110, Jan. 2022
[11]
F. Khanam, K.-Y. Song, and S. Kim, “A modified reversible data hiding in encrypted image using enhanced measurement functions,” in Proc. 8th Int. Conf. Ubiquitous Future Netw., 2016, pp. 869–872.
[12]
R. Bhardwaj and A. Aggarwal, “An improved block based joint reversible data hiding in encrypted images by symmetric cryptosystem,” Pattern Recognit. Lett., vol. 139, pp. 60–68, Nov. 2020.
[13]
P. Puteaux and W. Puech, “An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images,” IEEE Trans. Inf. Forensics Secur., vol. 13, no. 7, pp. 1670–1681, Jul. 2018.
[14]
Y. Wang and W. He, “High Capacity Reversible Data Hiding in Encrypted Image Based on Adaptive MSB Prediction,” IEEE Transactions on Multimedia, vol. 24, 2022.
[15]
S. Chen and C.C. Chang, “Reversible data hiding in encrypted images using block-based adaptive MSBs prediction,” Journal of Information Security and Applications, vol. 69, Sep. 2022.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CNIOT '24: Proceedings of the 2024 5th International Conference on Computing, Networks and Internet of Things
May 2024
668 pages
ISBN:9798400716751
DOI:10.1145/3670105
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 July 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Image compression
  2. Image encryption
  3. Image recovery
  4. Reversible data hiding

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CNIOT 2024

Acceptance Rates

Overall Acceptance Rate 39 of 82 submissions, 48%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 14
    Total Downloads
  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)2
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media