Abstract
Cloud computing offers advantages in handling the exponential growth of images but also entails privacy concerns on outsourced private images. Reversible data hiding (RDH) over encrypted images has emerged as an effective technique for securely storing and managing confidential images in the cloud. Most existing schemes only work on uncompressed images. However, almost all images are transmitted and stored in compressed formats such as JPEG. Recently, some RDH schemes over encrypted JPEG bitstreams have been developed, but these works have some disadvantages such as a small embedding capacity (particularly for low quality factors), damage to the JPEG format, and file size expansion. In this study, we propose a permutation-based embedding technique that allows the embedding of significantly more data than existing techniques. Using the proposed embedding technique, we further design a large-capacity RDH scheme over encrypted JPEG bitstreams, in which a grouping method is designed to boost the number of embeddable blocks. The designed RDH scheme allows a content owner to encrypt a JPEG bitstream before uploading it to a cloud server. The cloud server can embed additional data (e.g., copyright and identification information) into the encrypted JPEG bitstream for storage, management, or other processing purpose. A receiver can losslessly recover the original JPEG bitstream using a decryption key. Comprehensive evaluation results demonstrate that our proposed design can achieve approximately twice the average embedding capacity compared to the best prior scheme while preserving the file format without file size expansion.
- [1] , “An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 7, pp. 1670–1681, Jul. 2018.Google ScholarCross Ref
- [2] , “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553–562, Mar. 2013.Google ScholarDigital Library
- [3] , “Reversibility improved data hiding in encrypted images,” Signal Process., vol. 94, pp. 118–127, Jan. 2014.Google ScholarDigital Library
- [4] , “High capacity reversible data hiding in encrypted images by patch-level sparse representation,” IEEE Trans. Cybern., vol. 46, no. 5, pp. 1132–1143, May 2016.Google ScholarCross Ref
- [5] , “Reversible data hiding in encrypted image,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.Google ScholarCross Ref
- [6] , “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.Google ScholarDigital Library
- [7] , “Secure reversible image data hiding over encrypted domain via key modulation,” IEEE Trans. Circuits Syst. Video Technol., vol. 26, no. 3, pp. 441–452, Mar. 2016.Google ScholarDigital Library
- [8] , “Reversible data hiding: Advances in the past two decades,” IEEE Access, vol. 4, pp. 3210–3237, 2016.Google ScholarCross Ref
- [9] , “Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform,” Multimedia Tools Appl., vol. 76, no. 20, pp. 20739–20753, Oct. 2017.Google ScholarDigital Library
- [10] , “Reversible data hiding in encrypted images using chunk encryption and redundancy matrix representation,” IEEE Trans. Dependable Secure Comput., vol. 19, no. 2, pp. 1382–1394, Mar. 2022, doi:
10.1109/TDSC.2020.3011838 .Google ScholarCross Ref - [11] , “High capacity reversible data hiding in encrypted image based on adaptive MSB prediction,” IEEE Trans. Multimedia, vol. 24, pp. 1288–1298, 2022, doi:
10.1109/TMM.2021.3062699 .Google ScholarDigital Library - [12] , “An improved block based joint reversible data hiding in encrypted images by symmetric cryptosystem,” Pattern Recognit. Lett., vol. 139, pp. 60–68, Nov. 2020.Google ScholarCross Ref
- [13] , “Cryptanalysis of reversible data hiding in encrypted images by block permutation and co-modulation,” IEEE Trans. Multimedia, vol. 24, pp. 2924–2937, 2022, doi:
10.1109/TMM.2021.3090588 .Google ScholarDigital Library - [14] , “On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain,” Signal Process., vol. 143, pp. 336–345, Feb. 2018.Google ScholarDigital Library
- [15] , “Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain,” IEEE Trans. Circuits Syst. Video Technol., vol. 30, no. 8, pp. 2353–2365, Aug. 2020.Google ScholarDigital Library
- [16] , “Reversible data hiding in encrypted images with additive and multiplicative public-key homomorphism,” Signal Process., vol. 164, pp. 48–57, Nov. 2019.Google ScholarDigital Library
- [17] , “Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding,” Signal Process., vol. 130, pp. 190–196, Jan. 2017.Google ScholarDigital Library
- [18] , “Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain,” IEEE Trans. Image Process., vol. 22, no. 6, pp. 2455–2468, Jun. 2013.Google ScholarDigital Library
- [19] , “The JPEG still picture compression standard,” Commun. ACM, vol. 34, no. 4, pp. 30–44, Apr. 1991.Google ScholarDigital Library
- [20] , “Reversible data hiding for encrypted image based on adaptive prediction error coding,” IET Image Process., vol. 15, no. 11, pp. 2643–2655, Sep. 2021.Google Scholar
- [21] , “Reversible data hiding with adaptive difference recovery for encrypted images,” Inf. Sci., vol. 584, pp. 89–110, Jan. 2022.Google ScholarDigital Library
- [22] , “Reversible data hiding with hierarchical embedding for encrypted images,” IEEE Trans. Circuits Syst. Video Technol., vol. 32, no. 2, pp. 451–466, Feb. 2022.Google Scholar
- [23] , “A novel high-capacity reversible data hiding scheme for encrypted JPEG bitstreams,” IEEE Trans. Circuits Syst. Video Technol., vol. 29, no. 12, pp. 3501–3515, Apr. 2019.Google ScholarCross Ref
- [24] , “Separable reversible data hiding in encrypted JPEG bitstreams,” IEEE Trans. Depend. Secur. Comput., vol. 15, no. 6, pp. 1055–1067, Dec. 2018.Google Scholar
- [25] , “New framework of reversible data hiding in encrypted JPEG bitstreams,” IEEE Trans. Circuits Syst. Video Technol., vol. 29, no. 2, pp. 351–362, Feb. 2019.Google ScholarDigital Library
- [26] , “Lossless data hiding in JPEG bitstream,” J. Syst. Softw., vol. 85, no 2, pp. 309–313, 2012.Google ScholarDigital Library
- [27] , “Optimized lossless data hiding in JPEG bitstream and relay transfer-based extension,” IEEE Trans. Circuits Syst. Video Technol., vol. 31, no. 4, pp. 1380–1394, Apr. 2021.Google Scholar
- [28] , “Reversible data hiding in JPEG bitstream using optimal VLC mapping,” J. Vis. Commun. Image Represent., vol. 71, Aug. 2020, Art. no. 102821.Google Scholar
- [29] , “Reversible data hiding in encrypted JPEG bitstream,” IEEE Trans. Multimedia, vol. 16, no. 5, pp. 1486–1491, Aug. 2014.Google ScholarCross Ref
- [30] , “A separable reversible data hiding scheme for encrypted JPEG bitstreams,” Signal Process., vol. 133, pp. 135–143, Apr. 2017.Google ScholarDigital Library
- [31] , “CPA-secure privacy-preserving reversible data hiding for JPEG images,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 3647–3661, 2021.Google ScholarDigital Library
- [32] , “JPEG image encryption with improved format compatibility and file size preservation,” IEEE Trans. Multimedia, vol. 20, no. 10, pp. 2645–2658, Oct. 2018.Google ScholarCross Ref
- [33] , “An encrypted medical image retrieval algorithm based on DWT-DCT frequency domain,” in Proc. IEEE 15th Int. Conf. Softw. Eng. Res., Manage. Appl. (SERA),
Jun. 2017 , pp. 135–141.Google Scholar - [34] , “Scrambling–embedding for JPEG compressed image,” Signal Process., vol. 109, pp. 38–53, Apr. 2015.Google ScholarDigital Library
- [35] , “Rotation based reversible data hiding for JPEG images,” IETE Tech. Rev., vol. 33, no. 6, pp. 607–614, 2016.Google ScholarCross Ref
- [36] , “‘Break our steganographic system’: The ins and outs of organizing boss,” in Proc. Int. Workshop Inf. Hiding.
Berlin, Germany :Springer ,2011 , pp. 59–70.Google Scholar - [37] , “A leak and its remedy in JPEG image encryption,” Int. J. Comput. Math., vol. 84, no. 9, pp. 1367–1378, Sep. 2007.Google ScholarDigital Library
- [38] , “JPEG image scrambling without expansion in bitstream size,” in Proc. 19th IEEE Int. Conf. Image Process.,
Sep. 2012 , pp. 261–264.Google Scholar - [39] , “On the security of reversible data hiding in encrypted images by MSB prediction,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 187–189, 2021.Google Scholar
Recommendations
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
This paper proposes a novel framework of reversible data hiding in encrypted JPEG bitstream. We first provide a JPEG encryption algorithm to encipher a JPEG image to a smaller size and keep the format compliant to JPEG decoders. After an image owner ...
A separable reversible data hiding scheme for encrypted JPEG bitstreams
In this paper, we construct a separable reversible data hiding scheme for encrypted JPEG bitstreams. Our proposed scheme is constructed via a reserving-room-before-encryption manner, that is, the original JPEG bitstream is modified with small distortion ...
Reversible data hiding scheme with high payload for JPEG images
ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and CommunicationIn 2008 Lin et al. proposed a reversible steganographic method with a high payload for JPEG images. Because modifying the quantized DCT coefficients may lead to serious image distortion, Lin et al. embedded the secrets into the middle frequency of the ...
Comments