Submitted Successfully!
To reward your contribution, here is a gift for you: A free trial for our video production service.
Thank you for your contribution! You can also upload a video entry or images related to this topic.
Version Summary Created by Modification Content Size Created at Operation
1 -- 1088 2023-05-22 10:20:17 |
2 The sentences in the description are not on the same line + 1 word(s) 1089 2023-05-22 10:24:54 | |
3 layout & references Meta information modification 1089 2023-05-24 03:42:04 |

Video Upload Options

Do you have a full video?

Confirm

Are you sure to Delete?
Cite
If you have any further questions, please contact Encyclopedia Editorial Office.
Liu, R.; Zhou, Q. Reversible Data Hiding in Encrypted Images. Encyclopedia. Available online: https://encyclopedia.pub/entry/44642 (accessed on 08 July 2024).
Liu R, Zhou Q. Reversible Data Hiding in Encrypted Images. Encyclopedia. Available at: https://encyclopedia.pub/entry/44642. Accessed July 08, 2024.
Liu, Rui-Hua, Quan Zhou. "Reversible Data Hiding in Encrypted Images" Encyclopedia, https://encyclopedia.pub/entry/44642 (accessed July 08, 2024).
Liu, R., & Zhou, Q. (2023, May 22). Reversible Data Hiding in Encrypted Images. In Encyclopedia. https://encyclopedia.pub/entry/44642
Liu, Rui-Hua and Quan Zhou. "Reversible Data Hiding in Encrypted Images." Encyclopedia. Web. 22 May, 2023.
Reversible Data Hiding in Encrypted Images
Edit

As a necessary technical means, reversible data hiding in encrypted images (RDH-EIs) provides superior performance in terms of security. To simultaneously improve the effectiveness of RDH-EIs, the researchers proposed a mixed multi-bit layer embedding strategy in encrypted images.

reversible data hiding in encrypted images high capacity separability data transfer safety

1. Introduction

Data hiding technology is an essential technology in the field of data security. At the early stage of development, it can only guarantee the security of the secret data. Still, it cannot fully recover the cover image at the receiver, such as the least significant bit (LSB) algorithm [1]. Research focuses on reversible data hiding (RDH) at the second stage of technology development to achieve lossless recovery of the cover image. It has been widely applied in military, medical, and information security applications. In the last two decades, RDH technology has flourished [2]. General RDH algorithms are based on three types of techniques: lossless compression [3][4][5], extended transformations [6][7][8][9][10][11], and histogram shifting (HS) [12][13]. With these techniques, many algorithms can achieve better performance. For example, in [12][13], a general framework for constructing HS-based RDH is used to effectively achieve high capacity and low distortion by employing specific shifting and embedding functions.
The above traditional RDH methods are used in plaintext cover images. During data transmission, the visual quality of the transmission image is close to that of the original cover image because of the technology demand, so it is not easy for the secret data to be discovered. However, in this case, the content of the cover image is constantly exposed. Data security has become increasingly important in recent years with the continuous development of data privacy protection technology. On the one hand, the data sender does not trust the transferred server because the data are easily stolen. On the other hand, the plaintext cover image is more likely to be cracked. Then, RDH in encrypted images (RDH-EIs) was developed to meet the needs of privacy and security. RDH-EI technology embeds data in encrypted images so that the contents of secret data and the cover image are not visible during transmission. This benefit has significant implications for military communications, private medical data, trade secret data, and other data security areas. Therefore, it has been a research hotspot in recent years.

2. Reversible Data Hiding in Encrypted Images

The existing RDH-EI schemes are mainly divided into two main categories: vacating room after encryption (VRAE) [14][15][16][17][18][19][20][21][22] and reserving room before encryption (RRBE) [23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39]. They are based on the order in which the hidden room is vacated and image encryption. In general, the vacating room and reserving room mean analyzing the current image through certain techniques to create some space for other data hiding. The space can be empty bits, and data will be placed directly in empty positions. It can also be locations with data, but the data can be modified to reflect embedded information and can be completely restored.
Under the VRAE framework, the sender first encrypts the cover image, then uses some technologies to make space in the encrypted image, and finally uses the data hiding key to embed data in the vacated room. Zhang [14] realized data hiding through flipping the low 3 bits LSB of pixels, but there is error data extraction. Hong et al. [15][16] improved the wave function and used the correlation of pixels to reduce the error rate. To vacate the room, the LSBs of encrypted pixels were compressed with a special matrix [17]. Kim [18] used Hamming code to hide data in compressed and encrypted image blocks and introduced quantization to adjust the embedding capacity. Block encryption [19][20][21][22] was used to preserve the correlation in the encrypted image, and then traditional RDH technologies such as HS and difference expansion were designed to embed data.
In the above schemes, some methods may have error codes in data extraction or image recovery, which are not completely reversible. Some methods are completely reversible but limit the embedding capacity. Therefore, the RRBE framework was developed to improve the situation. Compared with the previous VRAE schemes, RRBE schemes are more convenient for the high embedding capacity, reversibility, and security.
Under the RRBE framework, the sender pre-processes the cover image before encryption to reserve room or generate a new image format conducive to hiding. In previous studies, classifying image blocks and pixels by using some rules is a common technical means. Ma et al. [23] classified image blocks by smoothing function calculation to reserve the LSBs of pixels in blocks. Qin et al. [24] divided image blocks according to the pre-designed threshold and reserved room by compressing some blocks’ LSB. Wu et al. [25] classified the cover image into blocks with different scales. Then, the lowest two bits of each pixel were used to vacate room. The pixels were sorted according to the predefined fixed classification mode in [26][27]. For the above methods, the adaptive classification method [23][24][25] has the advantage of mining the hidden space as much as possible but requires uncertain auxiliary information. The fixed classification methods [26][27] have fixed costs but limit the amount of hidden space. Prediction technology is also applied through high performance [28][29][30]. Most significant bit (MSB) prediction was proposed in [31][32][33][34] based on the high correlation of the adjacent pixel values of the cover image, which significantly improves the embedding capacity and the image recovery quality. Interpolation techniques [26][35][36], compression [24][37][38], and HS [39] have also been further studied and applied to encrypted images.
These schemes all use a single hider and maintain the amount of data that is always kept consistent with the size of the cover image during transmission. In addition, in recent years, some scholars have proposed multiple hiders schemes [40][41][42] based on secret sharing, which has also promoted the development of this field.
The above technologies have improved recovery quality and embedding rates. However, there may be problems with reserving room and how data embedding can be achieved after encryption.
It can be found that some problems exist in previous studies, such as the fact that the secret data cannot be extracted completely and accurately in some algorithms [14][15][16], so complete reversibility cannot be achieved. The embedding capacity needs to be improved [19][20][23][33], but the image recovery quality will be affected. The joint schemes at the receiver [14][26][27][37] and others need to process the data in order for the operation to be simple but low in flexibility; the separable schemes such as [17][18][19][20][21][22][23][24][25][33][36] are crucial to achieving independence in data extraction and image recovery but also increase the complexity. Therefore, RDH-EI is more challenging than traditional RDH. Balancing the embedding rate, the accuracy of secret data extraction, the quality of image recovery, and separability is a technical challenge.

References

  1. Alexander, G.C.; Gürcü, Ö. Adaptive to pixel value and pixel value difference irreversible spatial data hiding method using modified LSB for grayscale images. J. Inf. Secur. Appl. 2023, 70, 103314.
  2. Shi, Y.Q.; Li, X.L.; Zhang, X.P.; Wu, H.T.; Ma, B. Reversible data hiding: Advances in the past two decades. IEEE Access 2016, 4, 3210–3237.
  3. Celik, M.U.; Sharma, G.; Tekalp, A.M.; Saber, E. Lossless generalized-LSB data embedding. IEEE Trans. Image Process 2005, 14, 253–266.
  4. Zhang, T.C.; Weng, S.W.; Wu, Z.J.; Lin, J.; Hong, W. Adaptive encoding based lossless data hiding method for VQ compressed images using tabu search. Inf. Sci. 2022, 602, 128–142.
  5. Abbasi, R.; Xu, L.X.; Amin, F.; Luo, B. Efficient lossless compression based reversible data hiding using multilayered n-bit localization. Secur. Commun. Netw. 2019, 2019, 8981240.
  6. He, W.G.; Xiong, G.Q.; Wang, Y.M. Reversible data hiding based on multi-predictor and adaptive expansion. IET Image Process 2022, 16, 888–899.
  7. Mehbodniya, A.; Douraki, B.; Webber, J.L.; Alkhazaleh, H.A.; Elbasi, E.; Dameshghi, M.; Zitar, R.A.; Abualigah, L. Multi-layer reversible data hiding based on the difference expansion method using multilevel thresholding of host images based on the slime mould algorithm. Processes 2022, 10, 858.
  8. Nguyen, T.S.; Huynh, V.T.; Vo, P.H. A novel reversible data hiding algorithm based on enhanced reduced difference expansion. Symmetry 2022, 14, 1726.
  9. He, W.; Cai, Z. Reversible data hiding based on dual pairwise prediction-error expansion. IEEE Trans. Image Process 2021, 30, 5045–5055.
  10. Bai, Y.Q.; Jiang, G.Y.; Zhu, Z.J.; Xu, H.Y.; Song, Y. Reversible data hiding scheme for high dynamic range images based on multiple prediction error expansion. Signal Process Image Commun. 2021, 91, 116084.
  11. Hung, C.C.; Lin, C.C.; Wu, H.C.; Lin, C.Y. A study on reversible data hiding technique based on three-dimensional prediction-error histogram modification and a multi-layer perceptron. Appl. Sci. 2022, 12, 2502.
  12. Wang, Y.M.; Xiong, G.Q.; He, W.G. High-capacity reversible data hiding in encrypted images based on pixel-value-ordering and histogram shifting. Expert. Syst. Appl. 2023, 211, 118600.
  13. Weng, S.W.; Tan, W.L.; Ou, B.; Pan, J.S. Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm. Inform. Sci. 2021, 549, 13–33.
  14. Zhang, X.P. Reversible data hiding in encrypted image. IEEE Signal Process Lett. 2011, 18, 255–258.
  15. Hong, W.; Chen, T.S.; Wu, H.Y. An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett. 2012, 19, 199–202.
  16. Liao, X.; Shu, C.W. Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image R. 2015, 28, 21–27.
  17. Zhang, X.P. Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 2012, 7, 826–832.
  18. Kim, C. Separable reversible data hiding in encrypted AMBTC images using Hamming code. Appl. Sci. 2022, 12, 8225.
  19. Chen, M.K.; Chang, C.C. High-capacity separable reversible data hiding method in encrypted images based on block-level encryption and Huffman compression coding. Connect. Sci. 2021, 33, 975–994.
  20. Wang, Y.M.; Cai, Z.C.; He, W.G. High capacity reversible data hiding in encrypted image based on intra-block lossless compression. IEEE Trans. Multimed. 2021, 23, 1466–1473.
  21. Ge, H.L.; Chen, Y.; Qian, Z.X.; Wang, J.J. A High Capacity Multi-Level Approach for reversible data hiding in encrypted images. IEEE Trans. Circuits Syst. Video Technol. 2019, 29, 2285–2295.
  22. Xu, D.W.; Su, S.B. Reversible data hiding in encrypted images with separability and high embedding capacity. Signal Process Image Commun. 2021, 95, 116274.
  23. Ma, K.D.; Zhang, W.M.; Zhao, X.F.; Yu, N.H.; Li, F.H. Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 2013, 8, 553–562.
  24. Qin, C.; Zhang, W.; Cao, F.; Zhang, X.P.; Chang, C.C. Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Process 2018, 153, 109–122.
  25. Wu, H.B.; Li, F.Y.; Qin, C.; Wei, W.W. Separable reversible data hiding in encrypted images based on scalable blocks. Multimed. Tools Appl. 2019, 78, 25349–25372.
  26. Qiu, Y.Q.; Cai, C.H.; Zeng, H.Q.; Feng, G.; Lin, X.D.; Qian, Z.X. Joint reversible data hiding in encrypted images with the self-correcting ability. J. Xidian Univ. 2021, 48, 107–116.
  27. Panchikkil, S.; Manikandan, V.M.; Zhang, Y.D. A pseudo-random pixel mapping with weighted mesh graph approach for reversible data hiding in encrypted image. Multimed. Tools Appl. 2022, 81, 16279–16307.
  28. Li, F.Y.; Zhu, H.J.; Yu, J.; Qin, C. Double linear regression prediction based reversible data hiding in encrypted images. Multimed. Tools Appl. 2020, 80, 2141–2159.
  29. Motomura, R.; Imaizumi, S.; Kiya, H. A reversible data hiding method with prediction-error expansion in compressible encrypted images. Appl. Sci. 2022, 12, 9418.
  30. Yi, S.; Zhou, Y.C.; Hua, Z.Y. Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Process Image Commun. 2018, 64, 78–88.
  31. Puteaux, P.; Puech, W. An efficient msb prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1670–1681.
  32. Tasi, Y.Y.; Liu, H.L.; Kuo, P.L.; Chan, C.H. Extending multi-msb prediction and huffman coding for reversible data hiding in encrypted HDR images. IEEE Access 2022, 10, 49347–49358.
  33. Yi, P.Y.; Yin, Z.X.; Qian, Z.X. Reversible data hiding in encrypted images with two-msb prediction. In Proceedings of the 2018 IEEE International Work-shop on Information Forensics and Security (WIFS), Hong Kong, China, 11–13 December 2018.
  34. Wang, D.W.; Zhang, X.Q.; Yu, C.Q.; Tang, Z.J. Reversible data hiding in encrypted image based on multi-msb embedding strategy. Appl. Sci. 2020, 10, 2058.
  35. Xiao, D.; Wang, Y.; Xiang, T.; Bai, S. High-payload completely reversible data hiding in encrypted images by an interpolation technique. Front. Inf. Technol. Electron. Eng. 2017, 18, 1732–1743.
  36. Wang, J.J.; Li, G.X.; Xia, G.E.; Sun, Z.R. A separable and reversible data hiding algorithm in encrypted domain based on image interpolation space. Acta Electron. Sin. 2020, 48, 92–100.
  37. Chen, F.; Yuan, Y.; He, H.J.; Tian, M.; Tai, H.M. Multi-msb compression based reversible data hiding scheme in encrypted images. IEEE Trans. Circuits Syst. Video Technol. 2021, 31, 905–916.
  38. Singh, O.P.; Singh, A.K. Data hiding in encryption–compression domain. Complex Intell. Syst. 2021, 1–14.
  39. Kittawi, N.; Al-haj, A. Reversible data hiding using bit flipping and histogram shifting. Multimed. Tools Appl. 2022, 81, 12441–12458.
  40. Chen, Y.C.; Hung, T.H.; Hsieh, S.H.; Shiu, C.W. A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms. IEEE Trans. Inf. Forensics Secur. 2019, 14, 3332–3343.
  41. Weng, C.Y.; Yang, C.H. Reversible data hiding in encrypted image using multiple data-hiders sharing algorithm. Entropy 2023, 25, 209.
  42. Chen, B.; Lu, W.; Huang, J.; Weng, J.; Zhou, Y. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders. IEEE Trans. Dependable Secur. Comput. 2022, 19, 978–991.
More
Information
Contributors MDPI registered users' name will be linked to their SciProfiles pages. To register with us, please refer to https://encyclopedia.pub/register : ,
View Times: 286
Revisions: 3 times (View History)
Update Date: 24 May 2023
1000/1000
Video Production Service