Reversible data hiding in encrypted images using variable prediction
- Vol. 29, Issue 1, Pages: 95-110(2024)
Published: 16 January 2024
DOI: 10.11834/jig.221182
移动端阅览
浏览全部资源
扫码关注微信
Published: 16 January 2024 ,
移动端阅览
陈佳妮, 徐达文. 2024. 利用可变预测的密文域可逆信息隐藏. 中国图象图形学报, 29(01):0095-0110
Chen Jiani, Xu Dawen. 2024. Reversible data hiding in encrypted images using variable prediction. Journal of Image and Graphics, 29(01):0095-0110
目的
2
随着云计算和云存储场景中用户隐私保护的需求日益增加,密文域图像可逆信息隐藏(reversible data hiding in encrytpted images,RDHEI)受到了广泛关注。然而大多数RDHEI算法以提升嵌入率和保障图像加密安全性为目的,复杂化图像的预处理操作。为此,提出一种基于可变预测和多MSB(most significant bit)替换的密文域图像可逆信息隐藏算法。
方法
2
提出可变预测位平面翻转策略,用相邻像素值迭代预测当前像素值的多位最高有效位。若预测值比翻转值更接近目标像素值,则当前预测位平面可以用于信息隐藏,将其比特值修改为0。同时,用位置图自适应地标记可嵌入像素点。所生成的位置图具有稀疏特征,可以使用算术编码无损压缩。最后,对预留空间后的图像进行加密,通过多MSB替换的策略嵌入隐秘信息和压缩位置图。
结果
2
经实验测试,本文算法在BOWS-2(break our watermarking system 2nd)数据集上平均嵌入率为2.953 bit/像素,并记录了1 000幅图像在预处理前后的每个位平面信息熵,其中最高位平面的信息熵比原始MSB下降了0.76,说明可变预测位平面翻转将多个高位平面翻转为0,使其处于稀疏状态,有效增加了嵌入空间。
结论
2
本文算法利用明文图像的空间相关性,对高位平面进行翻转与替换,从而为隐秘信息预留了更多的嵌入空间。所提方法可无损恢复原始图像,且无差错提取隐秘信息。
Objective
2
With the growing demand of users for privacy protection in cloud computing and cloud storage scenarios, reversible data hiding in encrypted images (RDHEI) has gained widespread attention. RDHEI has three independent roles, namely, image holder, service provider, and image receiver. Before uploading the images to the cloud, the holder encrypts it, and the service provider embeds some necessary information into the encrypted image for management and other purposes in the cloud server. After obtaining the marked encrypted image, the receiver can opt to extract the embedded data or recover the image according to its own secret key. The existing RDHEI schemes can be divided into two categories: vacating room after encryption (VRAE) and reserving room after encryption (RRBE). The largest difference between two types of methods lies in the different processes before and after the encryption phase. For RRBE, before uploading the encrypted image to the service provider, essential preprocessing needs to be operated by the image holder for reserving the data space. For VRAE, the image holder can upload the encrypted image directly, and the service provider conducts the data space for the preparation of the subsequent embedding. The operation of vacating room in two types of methods is a redundant processing of images. The core is to select the point to use pixel correlation, and it is also a compromise between embedded capacity and transmission security. However, most RDHEI algorithms complicate the preprocessing of images to improve the embedding rate and ensure the security of image encryption. This paper proposes a reversible data hiding algorithm based on variable prediction and multi-most significant bit (MSB) replacement in encrypted images.
Method
2
The proposed algorithm mainly consists of the following parts: image preprocessing, exclusive encryption, data embedding, data extraction, and image recovery. This paper proposes a variable prediction bit-plane inversion (VPBI) strategy, which aims to make full use of the whole relevance of the image. First, VPBI is designed to predict iteratively multiple relevant bit-planes of the current pixel value with adjacent pixel values. When the prediction value is closer to the target pixel than the inverted value, the prediction is accurate. The current prediction bit-plane can be used for data hiding and modify its bit value to zero. Because the method of VPBI works from the second row and second column of the image, to increase the number of embeddable pixels as much as possible, the linear prediction method is designed to obtain the prediction error in the first row and column except for the first pixel. The positive and negative signs of the prediction error are stored in the last bit of its binary sequence with one bit, which means the absolute value of the prediction error cannot be greater than 127 or -127. Then, a sign indication map is designed to record this type of prediction error. At the same time, the location map is used to mark adaptively the embeddable position, which is sparse and can be lossless compressed using arithmetic coding. After reserving space, the image is XOR-encrypted by the image holder, and the holder inserts the side information such as the compressed location map, sign indication map, and the first MSB back into the first MSB bit-plane. At the data embedding phase, the service provider embeds the secret data and the compressed location map through the multiMSB replacement strategy. Finally, the extraction of secret data and the recovery of image are reverse processes. Therefore, if the image receiver holds the corresponding key, the secret data can be extracted without loss or the original image can be recovered perfectly.
Result
2
To evaluate the performance of the proposed algorithm, experiments compare the proposed algorithm with five other state-of-the-art RDHEI algorithms on six common grayscale images and one public database: Break our watermarking system 2nd (BOWS-2). The information entropy, embedding capacity, embedding rate, peak signal-to-noise ratio (PSNR), and structure similarity index measure (SSIM) are used as the quantitative evaluation metrics. First, the experiment tests the information entropy of each bit-plane of 1 000 images before and after preprocessing. The information entropy of the highest bit-plane is 0.76 lower than that of the original MSB, and the second, third, fourth, and fifth bit-planes decrease by 0.25, 0.45, 0.61, and 0.75, respectively, indicating VPBI generates more zeros for multiple significant bit-planes, makes them sparse, and effectively increases the embedded space. Experimental results show the average embedding rates of the proposed algorithm on the BOWS-2 reach 2.953 bit/pixel, which is 0.423 bit/pixel higher than the latest algorithm. The secret data can be extracted without error, and the PSNR and SSIM are constant values that equal to ∞ and 1, respectively, which show the proposed algorithm is reversible.
Conclusion
2
In this paper, a reversible data hiding algorithm in encrypted images based on variable prediction and multiMSB replacement is proposed. By using the redundancy between pixels and reducing the space occupation of sign indication map, VPBI is proposed to deal the multiMSB planes. The comparison of the variable prediction value, the inverse value of the target pixel, and the target pixel can provide considerable spaces to embed data. In the embedding stage, the method of multiMSB replacement is used to hide secret data. The adaptive location map and other side information are saved to the highest bit-plane to ensure no additional data are required when the image is transmitted to the cloud server. Experiments show the proposed method has high embedding rate and can ensure reversibility and security. In the future, an effective scheme for optimizing high-texture images will be further developed.
可逆信息隐藏图像加密可变预测多MSB替换自适应位置图
reversible data hidingimage encryptionvariable predictionmulti-most significant bit replacementadaptive location map
Chang C C, Li C T and Shi Y Q. 2018. Privacy-aware reversible watermarking in cloud computing environments. IEEE Access, 6: 70720-70733 [DOI: 10.1109/ACCESS.2018.2880904http://dx.doi.org/10.1109/ACCESS.2018.2880904]
Chen F, Yuan Y, He H J, Tian M and Tai H M. 2021. Multi-MSB compression based reversible data hiding scheme in encrypted images. IEEE Transactions on Circuits and Systems for Video Technology, 31(3): 905-916 [DOI: 10.1109/TCSVT.2020.2992817http://dx.doi.org/10.1109/TCSVT.2020.2992817]
Chen K M and Chang C C. 2019. High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement. Journal of Visual Communication and Image Representation, 58: 334-344 [DOI: 10.1016/j.jvcir.2018.12.023http://dx.doi.org/10.1016/j.jvcir.2018.12.023]
Chen S S and Chang C C. 2022. Reversible data hiding in encrypted images using block-based adaptive MSBs prediction. Journal of Information Security and Applications, 69: #103297 [DOI: 10.1016/j.jisa.2022.103297http://dx.doi.org/10.1016/j.jisa.2022.103297]
Fu Y J, Kong P, Yao H, Tang Z J and Qin C. 2019. Effective reversible data hiding in encrypted image with adaptive encoding strategy. Information Sciences, 494: 21-36 [DOI: 10.1016/j.ins.2019.04.043http://dx.doi.org/10.1016/j.ins.2019.04.043]
Gao K, Horng J H and Chang C C. 2022. High-capacity reversible data hiding in encrypted images based on adaptive block encoding. Journal of Visual Communication and Image Representation, 84: #103481 [DOI: 10.1016/j.jvcir.2022.103481http://dx.doi.org/10.1016/j.jvcir.2022.103481]
Ge H L, Chen Y, Qian Z X and Wang J J. 2019. A high capacity multi-level approach for reversible data hiding in encrypted images. IEEE Transactions on Circuits and Systems for Video Technology, 29(8): 2285-2295 [DOI: 10.1109/TCSVT.2018.2863029http://dx.doi.org/10.1109/TCSVT.2018.2863029]
Hong W, Chen T S and Wu H Y. 2012. An improved reversible data hiding in encrypted images using side match. IEEE Signal Processing Letters, 19(4): 199-202 [DOI: 10.1109/LSP.2012.2187334http://dx.doi.org/10.1109/LSP.2012.2187334]
Liu Z L and Pun C M. 2022. Reversible data hiding in encrypted images using chunk encryption and redundancy matrix representation. IEEE Transactions on Dependable and Secure Computing, 19(2): 1382-1394 [DOI: 10.1109/TDSC.2020.3011838http://dx.doi.org/10.1109/TDSC.2020.3011838]
Ma K D, Zhang W M, Zhao X F, Yu N H and Li F H. 2013. Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics and Security, 8(3): 553-562 [DOI: 10.1109/TIFS.2013.2248725http://dx.doi.org/10.1109/TIFS.2013.2248725]
Manikandan V M and Zhang Y D. 2022. An adaptive pixel mapping based approach for reversible data hiding in encrypted images. Signal Processing: Image Communication, 105: #116690 [DOI: 10.1016/j.image.2022.116690http://dx.doi.org/10.1016/j.image.2022.116690]
Mohammadi A, Nakhkash M and Akhaee M A. 2020. A high-capacity reversible data hiding in encrypted images employing local difference predictor. IEEE Transactions on Circuits and Systems for Video Technology, 30(8): 2366-2376 [DOI: 10.1109/TCSVT.2020.2990952http://dx.doi.org/10.1109/TCSVT.2020.2990952]
Puteaux P and Puech W. 2018. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Transactions on Information Forensics and Security, 13(7): 1670-1681 [DOI: 10.1109/TIFS.2018.2799381http://dx.doi.org/10.1109/TIFS.2018.2799381]
Qin C, Qian X K, Hong W and Zhang X P. 2019. An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer. Information Sciences, 487: 176-192 [DOI: 10.1016/j.ins.2019.03.008http://dx.doi.org/10.1016/j.ins.2019.03.008]
Wang X, Li L Y, Chang C C and Huang Y F. 2022. Multi-level reversible data hiding for crypto-imagery via a block-wise substitution-transposition cipher. Journal of Information Security and Applications, 64: #103067 [DOI: 10.1016/j.jisa.2021.103067http://dx.doi.org/10.1016/j.jisa.2021.103067]
Wang Y M and He W G. 2022. High capacity reversible data hiding in encrypted image based on adaptive MSB prediction. IEEE Transactions on Multimedia, 24: 1288-1298 [DOI: 10.1109/TMM.2021.3062699http://dx.doi.org/10.1109/TMM.2021.3062699]
Wu F H, Zhou X, Chen Z L and Yang B H. 2021a. A reversible data hiding scheme for encrypted images with pixel difference encoding. Knowledge-Based Systems, 234: #107583 [DOI: 10.1016/j.knosys.2021.107583http://dx.doi.org/10.1016/j.knosys.2021.107583]
Wu X S, Qiao T, Xu M and Zheng N. 2021b. Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling. Signal Processing, 188: #108200 [DOI: 10.1016/j.sigpro.2021.108200http://dx.doi.org/10.1016/j.sigpro.2021.108200]
Wu X T and Sun W. 2014. High-capacity reversible data hiding in encrypted images by prediction error. Signal Processing, 104: 387-400 [DOI: 10.1016/j.sigpro.2014.04.032http://dx.doi.org/10.1016/j.sigpro.2014.04.032]
Wu Y Q, Xiang Y Z, Guo Y T, Tang J and Yin Z X. 2020. An improved reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Transactions on Multimedia, 22(8): 1929-1938 [DOI: 10.1109/TMM.2019.2952979http://dx.doi.org/10.1109/TMM.2019.2952979]
Xu D W, Chen K, Wang R D and Su S B. 2018. Separable reversible data hiding in encrypted images based on two-dimensional histogram modification. Security and Communication Networks, 2018: #1734961 [DOI: 10.1155/2018/1734961http://dx.doi.org/10.1155/2018/1734961]
Xu D W and Su S B. 2021. Reversible data hiding in encrypted images with separability and high embedding capacity. Signal Processing: Image Communication, 95: #116274 [DOI: 10.1016/j.image.2021.116274http://dx.doi.org/10.1016/j.image.2021.116274]
Xu D W and Wang R D. 2016. Separable and error-free reversible data hiding in encrypted images. Signal Processing, 123: 9-21 [DOI: 10.1016/j.sigpro.2015.12.012http://dx.doi.org/10.1016/j.sigpro.2015.12.012]
Yang Y L, He H J, Chen F and Guo Y Y. 2023. Reversible data hiding in encryption images based on MSB two-dimensional label. Acta Electronica Sinica, 51(4): 993-1005
杨尧林, 和红杰, 陈帆, 郭炀炀. 2023. 基于MSB二维标记的加密图像可逆数据隐藏. 电子学报, 51(4): 993-1005 [DOI: 10.12263/DZXB.20210571http://dx.doi.org/10.12263/DZXB.20210571]
Yi P Y, Yin Z X and Qian Z X. 2018. Reversible data hiding in encrypted images with two-MSB prediction//Proceedings of 2018 IEEE International Workshop on Information Forensics and Security (WIFS). Hong Kong, China: IEEE: 1-7 [DOI: 10.1109/WIFS.2018.8630785http://dx.doi.org/10.1109/WIFS.2018.8630785]
Yi S and Zhou Y C. 2017. Binary-block embedding for reversible data hiding in encrypted images. Signal Processing, 133: 40-51 [DOI: 10.1016/j.sigpro.2016.10.017http://dx.doi.org/10.1016/j.sigpro.2016.10.017]
Yi S and Zhou Y C. 2019. Separable and reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Transactions on Multimedia, 21(1): 51-64 [DOI: 10.1109/TMM.2018.2844679http://dx.doi.org/10.1109/TMM.2018.2844679]
Yin Z X, Peng Y Y and Xiang Y Z. 2022. Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression. IEEE Transactions on Dependable and Secure Computing, 19(2): 992-1002 [DOI: 10.1109/TDSC.2020.3019490http://dx.doi.org/10.1109/TDSC.2020.3019490]
Yin Z X, She X M, Tang J and Luo B. 2021. Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement. Signal Processing, 187: #108146 [DOI: 10.1016/j.sigpro.2021.108146http://dx.doi.org/10.1016/j.sigpro.2021.108146]
Yin Z X, Xiang Y Z and Zhang X P. 2020. Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding. IEEE Transactions on Multimedia, 22(4): 874-884 [DOI: 10.1109/TMM.2019.2936314http://dx.doi.org/10.1109/TMM.2019.2936314]
Yu M J, Yao H and Qin C. 2022. Reversible data hiding in encrypted images without additional information transmission. Signal Processing: Image Communication, 105: #116696 [DOI: 10.1016/j.image.2022.116696http://dx.doi.org/10.1016/j.image.2022.116696]
Zhang X P. 2011. Reversible data hiding in encrypted image. IEEE Signal Processing Letters, 18(4): 255-258 [DOI: 10.1109/LSP.2011.2114651http://dx.doi.org/10.1109/LSP.2011.2114651]
Zhang X P. 2012. Separable reversible data hiding in encrypted image. IEEE Transactions on Information Forensics and Security, 7(2): 826-832 [DOI: 10.1109/TIFS.2011.2176120http://dx.doi.org/10.1109/TIFS.2011.2176120]
Zhang Y K and Luo W B. 2022. Vector-based efficient data hiding in encrypted images via Multi-MSB replacement. IEEE Transactions on Circuits and Systems for Video Technology, 32(11): 7359-7372 [DOI: 10.1109/TCSVT.2022.3183391http://dx.doi.org/10.1109/TCSVT.2022.3183391]
相关文章
相关作者
相关机构