Abstract
Reversible Data Hiding in Encryption Domain (RDHED) can be used in different areas such as secure remote sensing or telemedicine. Since data structure is completely changed after a reliable encryption process, custom reversible data hiding methods are not efficient to perform RDHED. In this paper, a reversible method is proposed to embed extra information in the encryption domain by designing two dimensional (2-D) error histogram. According to the proposed method, target pixels are predicted in the encryption domain to design a 2-D error histogram. The obtained histogram is shifted according to a novel pattern for data insertion. 2-D histogram shifting makes it possible to shift bins of the error histogram in various directions. This property augments embedding capacity and improves quality of directly decrypted images. To perform a secure encryption process, an improved Closed-Loop Chaotic Encryption System (CLCES) has been designed. The proposed CLCES performs a sensitive encryption process in a closed-loop system. Extensive experiments have been conducted to evaluate the performance and security of the proposed method. Obtained embedding capacity has been 0.128 bit per pixel by taking average values over 1000 test images and using least square predictor. Results confirm superiority of the proposed method in comparison with other schemes.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12493-z/MediaObjects/11042_2022_12493_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12493-z/MediaObjects/11042_2022_12493_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12493-z/MediaObjects/11042_2022_12493_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12493-z/MediaObjects/11042_2022_12493_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12493-z/MediaObjects/11042_2022_12493_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12493-z/MediaObjects/11042_2022_12493_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12493-z/MediaObjects/11042_2022_12493_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12493-z/MediaObjects/11042_2022_12493_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12493-z/MediaObjects/11042_2022_12493_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12493-z/MediaObjects/11042_2022_12493_Fig10_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12493-z/MediaObjects/11042_2022_12493_Fig11_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12493-z/MediaObjects/11042_2022_12493_Fig12_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12493-z/MediaObjects/11042_2022_12493_Fig13_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12493-z/MediaObjects/11042_2022_12493_Fig14_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12493-z/MediaObjects/11042_2022_12493_Fig15_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12493-z/MediaObjects/11042_2022_12493_Fig16_HTML.png)
Similar content being viewed by others
References
Bas P, Furon T (2007) Break our watermarking system (BOWS), 2nd edn. USA, Washington, DC
Borah S, Borah B (2020) Prediction error expansion (PEE) based reversible polygon mesh watermarking scheme for regional tamper localization. Multimed Tools Appl 79:11437–11458
Bouslimi D, Coatrieux G, Cozic M, Roux C (2016) Data hiding in encrypted images based on predefined watermark embedding before encryption process. Sig Process Image Commun 47:263–270
Cao F, Qian X, An B (2020) Low-complexity reversible data hiding in encrypted image via MSB hierarchical coding and LSB compression. Multimed Syst 27:317–330
Chang C -C, Lin C -C, Tseng C -S, Tai W -L (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177:2768–2786
Chang J -C, Lu Y -Z, Wu H -L (2017) A separable reversible data hiding scheme for encrypted JPEG bitstreams. Sig Process 133:135–143
Chen L S -T, Lin S -J, Lin J -C (2010) Reversible JPEG-based hiding method with high hiding-ratio. Int J Pattern Recognit Artif Intell 24:433–456
Geetha R, Geetha S (2020) Embedding electronic patient information in clinical images: an improved and efficient reversible data hiding technique. Multimed Tools Appl 79:12869–12890
Ghaemi A, Danyali H, Kazemi K (2020) Simple, robust and secure data hiding based on CRT feature extraction and closed-loop chaotic encryption system. J Real-Time Image Proc 18:221–232
Guan B, Xu D (2020) An efficient high-capacity reversible data hiding scheme for encrypted images. J Vis Commun Image Represent 66
Herbadji D, Belmeguenai A, Derouiche N, Liu H (2020) Colour image encryption scheme based on enhanced quadratic chaotic map. IET Image Process 14:40–52
Hu Y, Lee H, Li J (2009) DE-based reversible data hiding with improved overflow location map. IEEE Trans Circ Syst Video Technol 19:250–260
Huang D, Wang J (2020) High-capacity reversible data hiding in encrypted image based on specific encryption process. Sig Process Image Commun: Vol 80
Huang F, Huang J, Shi Y (2016) New framework for reversible data hiding in encrypted domain. IEEE Trans Inf Forensics Secur 11:2777–2789
Ishtiaq M, Jaffar A (2017) A novel Diamond-Mean predictor for reversible watermarking of images. J Appl Res Technol 15:524–532
Jia Y, Yin Z, Zhang X, Luo Y (2019) Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Sig Process 163:238–246
Jiang R, Zhou H, Zhang W, Yu N (2018) Reversible data hiding in encrypted Three-Dimensional mesh models. IEEE Trans Multimed 20:55–67
Jiang L, Xu C, Wang X, Luo B, Wang H (2020) Secure outsourcing SIFT: efficient and Privacy-Preserving image feature extraction in the encrypted domain. IEEE Trans Depend Secure Comput 17:179–193
Khelifi F (2018) On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain. Sig Process 143:336–345
Kim H J, Sachnev V, Shi Y Q, Nam J, Choo H (2008) A novel difference expansion transform for reversible data embedding. IEEE Trans Inf Forensics Secur 3:456–465
Konyar M Z, Akbulut O, Ozturk S (2020) Matrix encoding-based high-capacity and high-fidelity reversible data hiding in HEVC. Signal, Image Video Process 14:897–905
Kumar R, Jung K -H (2020) Robust reversible data hiding scheme based on two-layer embedding strategy. Inf Sci 512:96–107
Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Sig Process 147:133–145
Li T, Du B, Liang X (2020) Image encryption algorithm based on logistic and two-dimensional lorenz. IEEE Access 8:13792–13805
Liu Z -L, Pun C -M (2018) Reversible data-hiding in encrypted images by redundant space transfer. Inf Sci 433-434:188–203
Liu J, Zhao K, Zhang R (2019) A fully reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel prediction. Circuits, Syst, and Signal Process 39:3532–3552
Liu H, Zhao B, Huang L (2019) A remote-sensing image encryption scheme using DNA bases probability and two-dimensional logistic map. IEEE Access 7:65450–65459
Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8:553–562
Mansouri A, Wang X (2021) A novel one-dimensional chaotic map generator and its application in a new index representation-based image encryption scheme. Inf Sci 563:91–110
Mhalla A, Chateau T, Gazzah S, Amara N EB (2019) An embedded computer-vision system for multi-object detection in traffic surveillance. IEEE Trans Intell Transp Syst 20:4006–4018
Njitacke Z T et al (2020) Window of multistability and its control in a simple 3D Hopfield neural network: application to biomedical image encryption. Neural Comput Appl. https://doi.org/10.1007/s00521-020-05451-zhttps://doi.org/10.1007/s00521-020-05451-z
Peng F, Zhao Y, Zhang X, Long M, Pan W -Q (2020) Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting. Signal Process Image Commun 81
Puteaux P, Puech W (2018) An efficient MSB Prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans Inf Forensics Secur 13:1670–1681
Qian Z, Zhou H, Zhang X, Zhang W (2018) Separable reversible data hiding in encrypted JPEG bitstreams. IEEE Trans Depend Secure Comput 15:1055–1067
Qin C, He Z, Luo X, Dong J (2018) Reversible data hiding in encrypted image with separable capability and high embedding capacity. Inf Sci 465:285–304
Qin C, Zhang W, Cao F, Zhang X, Chang C -C (2018) Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Sig Process 153:109–122
Qin C, Qian X, Hong W, Zhang X (2019) An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer. Inf Sci 487:176–192
Qiu Y, Qian Z, Zeng H, Lin X, Zhang X (2020) Reversible data hiding in encrypted images using adaptive reversible integer transformation. Signal Process 167
Sanivarapu P V, Rajesh K N V P S, Reddy N V R, Reddy N C S (2020) Patient data hiding into ECG signal using watermarking in transform domain. Phys Eng Sci Med 43:213–226
Sayood K (2018) Chapter 7—lossless image compression, introduction to data compression, 5th edn, pp 187–220
Shi Y, Li X, Zhang X, Wu H, Ma B (2016) Reversible data hiding: advances in the past two decades. IEEE Access 4:3210–3237
Tamang J, et al. (2021) Dynamical properties of Ion-Acoustic waves in space plasma and its application to image encryption. IEEE Access 9:18762–18782
The first edition of the USC-SIPI image database was distributed in 1977. For more information please visit: https://sipi.usc.edu/database/
Tsafack N, et al. (2020) A new chaotic map with dynamic analysis and encryption application in internet of health things. IEEE Access 8:137731–137744
Tsafack N, et al. (2020) A multidimensional hyperjerk oscillator: dynamics analysis, analogue and embedded systems implementation, and its application as a cryptosystem. Sensors 20. https://doi.org/10.3390/s20010083https://doi.org/10.3390/s20010083
Tsafack N, et al. (2020) Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf Sci 515:191–217
Unde A S, Deepthi P P (2020) Design and analysis of compressive sensing-based lightweight encryption scheme for multimedia IoT. IEEE Trans Circ Syst II: Express Briefs 67:167–171
Wang X, Shao C, Xu X, Niu X (2007) Reversible data-hiding scheme for 2-D vector maps based on difference expansion. IEEE Trans Inf Forensics Secur 2:311–320
Wang Y, **e D, Gupta B B (2018) A study on the collusion security of LUT-based client-side watermark embedding. IEEE Access 6:15816–15822
**ang S, Luo X (2018) Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group. IEEE Trans Circ Syst Video Technol 28:3099–3110
**ao D, **ang Y, Zheng H, Wang Y (2017) Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism. J Vis Commun Image Represent 45:1–10
Yi S, Zhou Y (2018) Parametric reversible data hiding in encrypted images using adaptive bit-level data embedding and checkerboard based prediction. Sig Process 150:171–182
Yi S, Zhou Y (2019) Separable and reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans Multimed 21:51–64
Yi S, Zhou Y, Hua Z (2018) Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Process Image Commun 64:78–88
Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182
Zhou J, Sun W, Dong L, Liu X, Au O C, Tang Y Y (2016) Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans Circ Syst Video Technol 26:441–452
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ghaemi, A., Danyali, H. & Kazemi, K. Reversible Data Hiding in Encryption Domain based on two dimensional histogram shifting and secure encryption system. Multimed Tools Appl 81, 33731–33757 (2022). https://doi.org/10.1007/s11042-022-12493-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-12493-z