Log in

Reversible Data Hiding in Encryption Domain based on two dimensional histogram shifting and secure encryption system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Reversible Data Hiding in Encryption Domain (RDHED) can be used in different areas such as secure remote sensing or telemedicine. Since data structure is completely changed after a reliable encryption process, custom reversible data hiding methods are not efficient to perform RDHED. In this paper, a reversible method is proposed to embed extra information in the encryption domain by designing two dimensional (2-D) error histogram. According to the proposed method, target pixels are predicted in the encryption domain to design a 2-D error histogram. The obtained histogram is shifted according to a novel pattern for data insertion. 2-D histogram shifting makes it possible to shift bins of the error histogram in various directions. This property augments embedding capacity and improves quality of directly decrypted images. To perform a secure encryption process, an improved Closed-Loop Chaotic Encryption System (CLCES) has been designed. The proposed CLCES performs a sensitive encryption process in a closed-loop system. Extensive experiments have been conducted to evaluate the performance and security of the proposed method. Obtained embedding capacity has been 0.128 bit per pixel by taking average values over 1000 test images and using least square predictor. Results confirm superiority of the proposed method in comparison with other schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Bas P, Furon T (2007) Break our watermarking system (BOWS), 2nd edn. USA, Washington, DC

    Google Scholar 

  2. Borah S, Borah B (2020) Prediction error expansion (PEE) based reversible polygon mesh watermarking scheme for regional tamper localization. Multimed Tools Appl 79:11437–11458

    Article  Google Scholar 

  3. Bouslimi D, Coatrieux G, Cozic M, Roux C (2016) Data hiding in encrypted images based on predefined watermark embedding before encryption process. Sig Process Image Commun 47:263–270

    Article  Google Scholar 

  4. Cao F, Qian X, An B (2020) Low-complexity reversible data hiding in encrypted image via MSB hierarchical coding and LSB compression. Multimed Syst 27:317–330

  5. Chang C -C, Lin C -C, Tseng C -S, Tai W -L (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177:2768–2786

    Article  Google Scholar 

  6. Chang J -C, Lu Y -Z, Wu H -L (2017) A separable reversible data hiding scheme for encrypted JPEG bitstreams. Sig Process 133:135–143

    Article  Google Scholar 

  7. Chen L S -T, Lin S -J, Lin J -C (2010) Reversible JPEG-based hiding method with high hiding-ratio. Int J Pattern Recognit Artif Intell 24:433–456

    Article  Google Scholar 

  8. Geetha R, Geetha S (2020) Embedding electronic patient information in clinical images: an improved and efficient reversible data hiding technique. Multimed Tools Appl 79:12869–12890

    Article  Google Scholar 

  9. Ghaemi A, Danyali H, Kazemi K (2020) Simple, robust and secure data hiding based on CRT feature extraction and closed-loop chaotic encryption system. J Real-Time Image Proc 18:221–232

  10. Guan B, Xu D (2020) An efficient high-capacity reversible data hiding scheme for encrypted images. J Vis Commun Image Represent 66

  11. Herbadji D, Belmeguenai A, Derouiche N, Liu H (2020) Colour image encryption scheme based on enhanced quadratic chaotic map. IET Image Process 14:40–52

    Article  Google Scholar 

  12. Hu Y, Lee H, Li J (2009) DE-based reversible data hiding with improved overflow location map. IEEE Trans Circ Syst Video Technol 19:250–260

    Article  Google Scholar 

  13. Huang D, Wang J (2020) High-capacity reversible data hiding in encrypted image based on specific encryption process. Sig Process Image Commun: Vol 80

  14. Huang F, Huang J, Shi Y (2016) New framework for reversible data hiding in encrypted domain. IEEE Trans Inf Forensics Secur 11:2777–2789

    Article  Google Scholar 

  15. Ishtiaq M, Jaffar A (2017) A novel Diamond-Mean predictor for reversible watermarking of images. J Appl Res Technol 15:524–532

    Article  Google Scholar 

  16. Jia Y, Yin Z, Zhang X, Luo Y (2019) Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Sig Process 163:238–246

    Article  Google Scholar 

  17. Jiang R, Zhou H, Zhang W, Yu N (2018) Reversible data hiding in encrypted Three-Dimensional mesh models. IEEE Trans Multimed 20:55–67

    Article  Google Scholar 

  18. Jiang L, Xu C, Wang X, Luo B, Wang H (2020) Secure outsourcing SIFT: efficient and Privacy-Preserving image feature extraction in the encrypted domain. IEEE Trans Depend Secure Comput 17:179–193

    Article  Google Scholar 

  19. Khelifi F (2018) On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain. Sig Process 143:336–345

    Article  Google Scholar 

  20. Kim H J, Sachnev V, Shi Y Q, Nam J, Choo H (2008) A novel difference expansion transform for reversible data embedding. IEEE Trans Inf Forensics Secur 3:456–465

    Article  Google Scholar 

  21. Konyar M Z, Akbulut O, Ozturk S (2020) Matrix encoding-based high-capacity and high-fidelity reversible data hiding in HEVC. Signal, Image Video Process 14:897–905

  22. Kumar R, Jung K -H (2020) Robust reversible data hiding scheme based on two-layer embedding strategy. Inf Sci 512:96–107

    Article  MathSciNet  MATH  Google Scholar 

  23. Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Sig Process 147:133–145

    Article  Google Scholar 

  24. Li T, Du B, Liang X (2020) Image encryption algorithm based on logistic and two-dimensional lorenz. IEEE Access 8:13792–13805

    Article  Google Scholar 

  25. Liu Z -L, Pun C -M (2018) Reversible data-hiding in encrypted images by redundant space transfer. Inf Sci 433-434:188–203

  26. Liu J, Zhao K, Zhang R (2019) A fully reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel prediction. Circuits, Syst, and Signal Process 39:3532–3552

  27. Liu H, Zhao B, Huang L (2019) A remote-sensing image encryption scheme using DNA bases probability and two-dimensional logistic map. IEEE Access 7:65450–65459

    Article  Google Scholar 

  28. Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8:553–562

    Article  Google Scholar 

  29. Mansouri A, Wang X (2021) A novel one-dimensional chaotic map generator and its application in a new index representation-based image encryption scheme. Inf Sci 563:91–110

    Article  MathSciNet  Google Scholar 

  30. Mhalla A, Chateau T, Gazzah S, Amara N EB (2019) An embedded computer-vision system for multi-object detection in traffic surveillance. IEEE Trans Intell Transp Syst 20:4006–4018

    Article  Google Scholar 

  31. Njitacke Z T et al (2020) Window of multistability and its control in a simple 3D Hopfield neural network: application to biomedical image encryption. Neural Comput Appl. https://doi.org/10.1007/s00521-020-05451-zhttps://doi.org/10.1007/s00521-020-05451-z

  32. Peng F, Zhao Y, Zhang X, Long M, Pan W -Q (2020) Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting. Signal Process Image Commun 81

  33. Puteaux P, Puech W (2018) An efficient MSB Prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans Inf Forensics Secur 13:1670–1681

    Article  Google Scholar 

  34. Qian Z, Zhou H, Zhang X, Zhang W (2018) Separable reversible data hiding in encrypted JPEG bitstreams. IEEE Trans Depend Secure Comput 15:1055–1067

    Article  Google Scholar 

  35. Qin C, He Z, Luo X, Dong J (2018) Reversible data hiding in encrypted image with separable capability and high embedding capacity. Inf Sci 465:285–304

    Article  Google Scholar 

  36. Qin C, Zhang W, Cao F, Zhang X, Chang C -C (2018) Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Sig Process 153:109–122

    Article  Google Scholar 

  37. Qin C, Qian X, Hong W, Zhang X (2019) An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer. Inf Sci 487:176–192

    Article  Google Scholar 

  38. Qiu Y, Qian Z, Zeng H, Lin X, Zhang X (2020) Reversible data hiding in encrypted images using adaptive reversible integer transformation. Signal Process 167

  39. Sanivarapu P V, Rajesh K N V P S, Reddy N V R, Reddy N C S (2020) Patient data hiding into ECG signal using watermarking in transform domain. Phys Eng Sci Med 43:213–226

    Article  Google Scholar 

  40. Sayood K (2018) Chapter 7—lossless image compression, introduction to data compression, 5th edn, pp 187–220

  41. Shi Y, Li X, Zhang X, Wu H, Ma B (2016) Reversible data hiding: advances in the past two decades. IEEE Access 4:3210–3237

    Article  Google Scholar 

  42. Tamang J, et al. (2021) Dynamical properties of Ion-Acoustic waves in space plasma and its application to image encryption. IEEE Access 9:18762–18782

    Article  Google Scholar 

  43. The first edition of the USC-SIPI image database was distributed in 1977. For more information please visit: https://sipi.usc.edu/database/

  44. Tsafack N, et al. (2020) A new chaotic map with dynamic analysis and encryption application in internet of health things. IEEE Access 8:137731–137744

    Article  Google Scholar 

  45. Tsafack N, et al. (2020) A multidimensional hyperjerk oscillator: dynamics analysis, analogue and embedded systems implementation, and its application as a cryptosystem. Sensors 20. https://doi.org/10.3390/s20010083https://doi.org/10.3390/s20010083

  46. Tsafack N, et al. (2020) Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf Sci 515:191–217

    Article  Google Scholar 

  47. Unde A S, Deepthi P P (2020) Design and analysis of compressive sensing-based lightweight encryption scheme for multimedia IoT. IEEE Trans Circ Syst II: Express Briefs 67:167–171

    Google Scholar 

  48. Wang X, Shao C, Xu X, Niu X (2007) Reversible data-hiding scheme for 2-D vector maps based on difference expansion. IEEE Trans Inf Forensics Secur 2:311–320

    Article  Google Scholar 

  49. Wang Y, **e D, Gupta B B (2018) A study on the collusion security of LUT-based client-side watermark embedding. IEEE Access 6:15816–15822

    Article  Google Scholar 

  50. **ang S, Luo X (2018) Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group. IEEE Trans Circ Syst Video Technol 28:3099–3110

    Article  Google Scholar 

  51. **ao D, **ang Y, Zheng H, Wang Y (2017) Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism. J Vis Commun Image Represent 45:1–10

    Article  Google Scholar 

  52. Yi S, Zhou Y (2018) Parametric reversible data hiding in encrypted images using adaptive bit-level data embedding and checkerboard based prediction. Sig Process 150:171–182

    Article  Google Scholar 

  53. Yi S, Zhou Y (2019) Separable and reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans Multimed 21:51–64

    Article  Google Scholar 

  54. Yi S, Zhou Y, Hua Z (2018) Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Process Image Commun 64:78–88

    Article  Google Scholar 

  55. Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182

    Article  Google Scholar 

  56. Zhou J, Sun W, Dong L, Liu X, Au O C, Tang Y Y (2016) Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans Circ Syst Video Technol 26:441–452

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Habibollah Danyali.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ghaemi, A., Danyali, H. & Kazemi, K. Reversible Data Hiding in Encryption Domain based on two dimensional histogram shifting and secure encryption system. Multimed Tools Appl 81, 33731–33757 (2022). https://doi.org/10.1007/s11042-022-12493-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12493-z

Keywords

Navigation