Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Enabling Large-Capacity Reversible Data Hiding Over Encrypted JPEG Bitstreams

Authors Info & Claims
Published:01 March 2023Publication History
Skip Abstract Section

Abstract

Cloud computing offers advantages in handling the exponential growth of images but also entails privacy concerns on outsourced private images. Reversible data hiding (RDH) over encrypted images has emerged as an effective technique for securely storing and managing confidential images in the cloud. Most existing schemes only work on uncompressed images. However, almost all images are transmitted and stored in compressed formats such as JPEG. Recently, some RDH schemes over encrypted JPEG bitstreams have been developed, but these works have some disadvantages such as a small embedding capacity (particularly for low quality factors), damage to the JPEG format, and file size expansion. In this study, we propose a permutation-based embedding technique that allows the embedding of significantly more data than existing techniques. Using the proposed embedding technique, we further design a large-capacity RDH scheme over encrypted JPEG bitstreams, in which a grouping method is designed to boost the number of embeddable blocks. The designed RDH scheme allows a content owner to encrypt a JPEG bitstream before uploading it to a cloud server. The cloud server can embed additional data (e.g., copyright and identification information) into the encrypted JPEG bitstream for storage, management, or other processing purpose. A receiver can losslessly recover the original JPEG bitstream using a decryption key. Comprehensive evaluation results demonstrate that our proposed design can achieve approximately twice the average embedding capacity compared to the best prior scheme while preserving the file format without file size expansion.

References

  1. [1] Puteaux P. and Puech W., “An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 7, pp. 16701681, Jul. 2018.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Ma K., Zhang W., Zhao X., Yu N., and Li F., “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553562, Mar. 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Zhang W., Ma K., and Yu N., “Reversibility improved data hiding in encrypted images,” Signal Process., vol. 94, pp. 118127, Jan. 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Cao X., Du L., Wei X., Meng D., and Guo X., “High capacity reversible data hiding in encrypted images by patch-level sparse representation,” IEEE Trans. Cybern., vol. 46, no. 5, pp. 11321143, May 2016.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Zhang X., “Reversible data hiding in encrypted image,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255258, Apr. 2011.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Zhang X., “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826832, Apr. 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Zhou J., Sun W., Dong L., Liu X., Au O. C., and Tang Y. Y., “Secure reversible image data hiding over encrypted domain via key modulation,” IEEE Trans. Circuits Syst. Video Technol., vol. 26, no. 3, pp. 441452, Mar. 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Shi Y.-Q., Li X., Zhang X., Wu H.-T., and Ma B., “Reversible data hiding: Advances in the past two decades,” IEEE Access, vol. 4, pp. 32103237, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Liao X., Li K., and Yin J., “Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform,” Multimedia Tools Appl., vol. 76, no. 20, pp. 2073920753, Oct. 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Liu Z. and Pun C.-M., “Reversible data hiding in encrypted images using chunk encryption and redundancy matrix representation,” IEEE Trans. Dependable Secure Comput., vol. 19, no. 2, pp. 13821394, Mar. 2022, doi: 10.1109/TDSC.2020.3011838.Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Wang Y. and He W., “High capacity reversible data hiding in encrypted image based on adaptive MSB prediction,” IEEE Trans. Multimedia, vol. 24, pp. 12881298, 2022, doi: 10.1109/TMM.2021.3062699.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Bhardwaj R. and Aggarwal A., “An improved block based joint reversible data hiding in encrypted images by symmetric cryptosystem,” Pattern Recognit. Lett., vol. 139, pp. 6068, Nov. 2020.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Lingfeng Q., Fan C., Shanjun Z., and He H., “Cryptanalysis of reversible data hiding in encrypted images by block permutation and co-modulation,” IEEE Trans. Multimedia, vol. 24, pp. 29242937, 2022, doi: 10.1109/TMM.2021.3090588.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Khelifi F., “On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain,” Signal Process., vol. 143, pp. 336345, Feb. 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Ke Y., Zhang M.-Q., Liu J., Su T.-T., and Yang X.-Y., “Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain,” IEEE Trans. Circuits Syst. Video Technol., vol. 30, no. 8, pp. 23532365, Aug. 2020.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Chen B., Wu X., Lu W., and Ren H., “Reversible data hiding in encrypted images with additive and multiplicative public-key homomorphism,” Signal Process., vol. 164, pp. 4857, Nov. 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Li M. and Li Y., “Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding,” Signal Process., vol. 130, pp. 190196, Jan. 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Zheng P. and Huang J., “Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain,” IEEE Trans. Image Process., vol. 22, no. 6, pp. 24552468, Jun. 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Wallace G. K., “The JPEG still picture compression standard,” Commun. ACM, vol. 34, no. 4, pp. 3044, Apr. 1991.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Tang Z., Pang M., Yu C., Fan G., and Zhang X., “Reversible data hiding for encrypted image based on adaptive prediction error coding,” IET Image Process., vol. 15, no. 11, pp. 26432655, Sep. 2021.Google ScholarGoogle Scholar
  21. [21] Yu C., Zhang X., Li G., Zhan S., and Tang Z., “Reversible data hiding with adaptive difference recovery for encrypted images,” Inf. Sci., vol. 584, pp. 89110, Jan. 2022.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Yu C., Zhang X., Zhang X., Li G., and Tang Z., “Reversible data hiding with hierarchical embedding for encrypted images,” IEEE Trans. Circuits Syst. Video Technol., vol. 32, no. 2, pp. 451466, Feb. 2022.Google ScholarGoogle Scholar
  23. [23] He J., Chen J., Luo W., Tang S., and Huang J., “A novel high-capacity reversible data hiding scheme for encrypted JPEG bitstreams,” IEEE Trans. Circuits Syst. Video Technol., vol. 29, no. 12, pp. 35013515, Apr. 2019.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Qian Z., Zhou H., Zhang X., and Zhang W., “Separable reversible data hiding in encrypted JPEG bitstreams,” IEEE Trans. Depend. Secur. Comput., vol. 15, no. 6, pp. 10551067, Dec. 2018.Google ScholarGoogle Scholar
  25. [25] Qian Z., Xu H., Luo X., and Zhang X., “New framework of reversible data hiding in encrypted JPEG bitstreams,” IEEE Trans. Circuits Syst. Video Technol., vol. 29, no. 2, pp. 351362, Feb. 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Qian Z. and Zhang X., “Lossless data hiding in JPEG bitstream,” J. Syst. Softw., vol. 85, no 2, pp. 309313, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Qiu Y., Qian Z., He H., Tian H., and Zhang X., “Optimized lossless data hiding in JPEG bitstream and relay transfer-based extension,” IEEE Trans. Circuits Syst. Video Technol., vol. 31, no. 4, pp. 13801394, Apr. 2021.Google ScholarGoogle Scholar
  28. [28] Zhang C., Ou B., Tian H., and Qin Z., “Reversible data hiding in JPEG bitstream using optimal VLC mapping,” J. Vis. Commun. Image Represent., vol. 71, Aug. 2020, Art. no. 102821.Google ScholarGoogle Scholar
  29. [29] Qian Z., Zhang X., and Wang S., “Reversible data hiding in encrypted JPEG bitstream,” IEEE Trans. Multimedia, vol. 16, no. 5, pp. 14861491, Aug. 2014.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Chang J.-C., Lu Y.-Z., and Wu H.-L., “A separable reversible data hiding scheme for encrypted JPEG bitstreams,” Signal Process., vol. 133, pp. 135143, Apr. 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Sheidani S., Mahmoudi-Aznaveh A., and Eslami Z., “CPA-secure privacy-preserving reversible data hiding for JPEG images,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 36473661, 2021.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] He J., Huang S., Tang S., and Huang J., “JPEG image encryption with improved format compatibility and file size preservation,” IEEE Trans. Multimedia, vol. 20, no. 10, pp. 26452658, Oct. 2018.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Zhang C., Li J., Wang S., and Wang Z., “An encrypted medical image retrieval algorithm based on DWT-DCT frequency domain,” in Proc. IEEE 15th Int. Conf. Softw. Eng. Res., Manage. Appl. (SERA), Jun. 2017, pp. 135141.Google ScholarGoogle Scholar
  34. [34] Ong S., Wong K., and Tanaka K., “Scrambling–embedding for JPEG compressed image,” Signal Process., vol. 109, pp. 3853, Apr. 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Long J., Yin Z., Lv J., and Zhang X., “Rotation based reversible data hiding for JPEG images,” IETE Tech. Rev., vol. 33, no. 6, pp. 607614, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Bas P., Filler T., and Pevný T., “‘Break our steganographic system’: The ins and outs of organizing boss,” in Proc. Int. Workshop Inf. Hiding. Berlin, Germany: Springer, 2011, pp. 5970.Google ScholarGoogle Scholar
  37. [37] Li W. and Yuan Y., “A leak and its remedy in JPEG image encryption,” Int. J. Comput. Math., vol. 84, no. 9, pp. 13671378, Sep. 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Minemura K., Moayed Z., Wong K., Qi X., and Tanaka K., “JPEG image scrambling without expansion in bitstream size,” in Proc. 19th IEEE Int. Conf. Image Process., Sep. 2012, pp. 261264.Google ScholarGoogle Scholar
  39. [39] Dragoi I. C. and Coltuc D., “On the security of reversible data hiding in encrypted images by MSB prediction,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 187189, 2021.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image IEEE Transactions on Circuits and Systems for Video Technology
    IEEE Transactions on Circuits and Systems for Video Technology  Volume 33, Issue 3
    March 2023
    516 pages

    1051-8215 © 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See https://www.ieee.org/publications/rights/index.html for more information.

    Publisher

    IEEE Press

    Publication History

    • Published: 1 March 2023

    Qualifiers

    • research-article