Abstract
With the increasing need for privacy-preserving, data hiding in encrypted images has attracted more attention in the data hiding area. The existing data hiding methods for encrypted images mainly focus on improving the embedding capacity. Recently, some researchers have begun to pay attention to the robustness of the data hiding in encrypted images. However, there are few robust schemes for data hiding schemes in encrypted images. This paper proposes a privacy-preserving data hiding method with robustness. We apply a selective encryption method based on discrete cosine Transformed (DCTed) sign components encryption and block-level scrambling to encrypt the original image for privacy-preserving. The secret message is embedded into DCTed amplitude components using quantization index modulation and matrix embedding. The experimental results show that not only the marked decrypted images but also the marked encrypted images have the robustness to resist JPEG compression and white Gaussian noise disturbance to some degree.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13161-y/MediaObjects/11042_2022_13161_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13161-y/MediaObjects/11042_2022_13161_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13161-y/MediaObjects/11042_2022_13161_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13161-y/MediaObjects/11042_2022_13161_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13161-y/MediaObjects/11042_2022_13161_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13161-y/MediaObjects/11042_2022_13161_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13161-y/MediaObjects/11042_2022_13161_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13161-y/MediaObjects/11042_2022_13161_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-13161-y/MediaObjects/11042_2022_13161_Fig9_HTML.png)
Similar content being viewed by others
References
Chang CC, Liu Y, Nguyen TS (2014) A novel turtle shell based scheme for data hiding. Proc - 2014 10th Int Conf Intell Inf hiding multimed signal process IIH-MSP 2014 89-93. https://doi.org/10.1109/IIH-MSP.2014.29
Chang CC, Li CT, ShiYQ (2018) Privacy-aware reversible watermarking in cloud computing environments. IEEE Access 6:70720–70733. https://doi.org/10.1109/ACCESS.2018.2880904
Chang CC, Li CT, Chen K (2019) Privacy-preserving reversible information hiding based on arithmetic of quadratic residues. IEEE Access 7:54117–54132. https://doi.org/10.1109/ACCESS.2019.2908924
Chen B, Wornell GW (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47:1423–1443. https://doi.org/10.1109/18.923725
Chen K, Chang CC (2019) High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement. J Vis Commun Image Represent 58:334–344. https://doi.org/10.1016/j.jvcir.2018.12.023
Chen S, Chang CC (2020) Reversible data hiding in encrypted images based on reversible integer transformation and Quadtree-based partition. IEEE Access 8:184199–184209. https://doi.org/10.1109/access.2020.3029420
Chen S, Chang CC, Liao Q (2020) Fidelity preserved data hiding in encrypted images based on homomorphism and matrix embedding. IEEE Access 8:22345–22356. https://doi.org/10.1109/ACCESS.2020.2968577
Fridrich J, Soukal D (2006) Matrix embedding for large payloads. Secur Steganography, Watermarking Multimed Contents VIII 6072:60721W. https://doi.org/10.1117/12.639933
Fridrich J, SoukalD (2006) Matrix embedding for large payloads. IEEE Trans Inf Forensics Secur 1:390–395. https://doi.org/10.1109/TIFS.2006.879281
Guan B, Xu D (2020) An efficient high-capacity reversible data hiding scheme for encrypted images. J Vis Commun Image Represent 66:102744. https://doi.org/10.1016/j.jvcir.2019.102744
Huang D, Wang J (2020) High-capacity reversible data hiding in encrypted image based on specific encryption process. Signal Process Image Commun 80:115632. https://doi.org/10.1016/j.image.2019.115632
Image Database of BOSSbase from BOSS competition. [Online]. Available: http://agents.fel.cvut.cz/stegodata
Li C, Zhang Z, Wang Y, … Huang D (2015) Dither modulation of significant amplitude difference for wavelet based robust watermarking. Neurocomputing 166:404–415. https://doi.org/10.1016/j.neucom.2015.03.039
Li X, Li J, Li B, YangB (2013) High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process 93:198–205. https://doi.org/10.1016/j.sigpro.2012.07.025
Liu Z, Pun CM (2020) Reversible data hiding in encrypted images using chunk encryption and redundancy matrix representation. IEEE Trans Dependable Secur Comput 5971:1–1. https://doi.org/10.1109/tdsc.2020.3011838
Ma K, Zhang W, Zhao X, … Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8:553–562. https://doi.org/10.1109/TIFS.2013.2248725
Mao Q (2014) A fast algorithm for matrix embedding steganography. Digit Signal Process A Rev J 25:248–254. https://doi.org/10.1016/j.dsp.2013.11.001
Miyazaki A, Okamoto A (2002) Analysis of watermarking systems in the frequency domain and its application to design of robust watermarking systems. IEICE Trans Fundam Electron Commun Comput Sci E85-A:117–124. https://doi.org/10.1109/icip.2001.958539
Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16:354–361. https://doi.org/10.1109/TCSVT.2006.869964
Puech W, Chaumont M, Strauss O (2008) A reversible data hiding method for encrypted images. Secur Forensics, Steganography, Watermarking Multimed Contents X 6819:68191E. https://doi.org/10.1117/12.766754
Puteaux P, Puech W (2018) An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans Inf Forensics Secur 13:1670–1681
Qin C, Qian X, Hong W, Zhang X (2019) An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer. Inf Sci (Ny) 487:176–192. https://doi.org/10.1016/j.ins.2019.03.008
Qiu Y, Qian Z, Zeng H et al (2020) Reversible data hiding in encrypted images using adaptive reversible integer transformation. Signal Process:167. https://doi.org/10.1016/j.sigpro.2019.107288
Sae-Tang W, Fujiyoshi M, Kiya H (2019) A new copyright- and privacy-protected image trading system using a novel steganography- based visual encryption scheme. ECTI Trans Electr Eng Electron Commun 17:95–107. https://doi.org/10.37936/ecti-eec.2019171.215455
Sheikh HR, Bovik AC (2006) Image information and visual quality. IEEE Trans Image Process 15:430–444. https://doi.org/10.1109/TIP.2005.859378
Shiu CW, Chen YC, Hong W (2015) Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process Image Commun 39:226–233. https://doi.org/10.1016/j.image.2015.09.014
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13:890–896. https://doi.org/10.1109/TCSVT.2003.815962
Wang C, Zhang W, Liu J, Yu N (2012) Fast matrix embedding by matrix extending. IEEE Trans Inf Forensics Secur 7:346–350. https://doi.org/10.1109/TIFS.2011.2164907
Wang W, Ye J, WangT WW (2017) Reversible data hiding scheme based on significant-bit-difference expansion. IET Image Process 11:1002–1014. https://doi.org/10.1049/iet-ipr.2017.0151
Wang X, Li X, Pe IQ (2020) Independent Embedding Domain Based Two-Stage Robust Reversible Watermarking. IEEE Trans Circuits Syst Video Technol 30:2406–2417. https://doi.org/10.1109/TCSVT.2019.2915116
Wang Y, Cai Z, He W (2019) A new high capacity separable reversible data hiding in encrypted images based on block selection and block-level encryption. IEEE Access 7:175671–175680. https://doi.org/10.1109/ACCESS.2019.2957143
**ong L, Han X, Yang CN, Shi YQ (2021) Robust reversible watermarking in encrypted image with secure multi-party based on lightweight cryptography. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2021.3055072
Yu X, Chen K, Wang Y et al (2020) Robust adaptive steganography based on generalized dither modulation and expanded embedding domain. Signal Processing:168. https://doi.org/10.1016/j.sigpro.2019.107343
Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18:255–258. https://doi.org/10.1109/LSP.2011.2114651
Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10:781–783. https://doi.org/10.1109/LCOMM.2006.060863
Zhang Y, Luo X, Yang C, … Liu F (2016) A framework of adaptive steganography resisting JPEG compression and detection. Secur Commun Networks 9:2957–2971. https://doi.org/10.1002/sec.1502
Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci (Ny) 181:1171–1186. https://doi.org/10.1016/j.ins.2010.11.009
Zong T, **angY NI et al (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 25:717–729. https://doi.org/10.1109/TCSVT.2014.2363743
Funding
This work was supported in part by the Natural Science Foundation of Fujian Province of China under Grant: 2020J01300, 2021J011236, and in part by Engineering Research Center for ICH Digitalization and Multi-Source Information Fusion of Fujian Province University under the grant: FJ-ICH 201901.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest/competing interests
The authors confirm that there are no relevant conflicts of financial or non-financial interests associated with this manuscript.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chen, S., Chang, CC. Privacy-preserving data hiding with robustness based on selective encryption and matrix embedding. Multimed Tools Appl 81, 33397–33417 (2022). https://doi.org/10.1007/s11042-022-13161-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13161-y