Log in

Privacy-preserving data hiding with robustness based on selective encryption and matrix embedding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the increasing need for privacy-preserving, data hiding in encrypted images has attracted more attention in the data hiding area. The existing data hiding methods for encrypted images mainly focus on improving the embedding capacity. Recently, some researchers have begun to pay attention to the robustness of the data hiding in encrypted images. However, there are few robust schemes for data hiding schemes in encrypted images. This paper proposes a privacy-preserving data hiding method with robustness. We apply a selective encryption method based on discrete cosine Transformed (DCTed) sign components encryption and block-level scrambling to encrypt the original image for privacy-preserving. The secret message is embedded into DCTed amplitude components using quantization index modulation and matrix embedding. The experimental results show that not only the marked decrypted images but also the marked encrypted images have the robustness to resist JPEG compression and white Gaussian noise disturbance to some degree.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Germany)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Chang CC, Liu Y, Nguyen TS (2014) A novel turtle shell based scheme for data hiding. Proc - 2014 10th Int Conf Intell Inf hiding multimed signal process IIH-MSP 2014 89-93. https://doi.org/10.1109/IIH-MSP.2014.29

  2. Chang CC, Li CT, ShiYQ (2018) Privacy-aware reversible watermarking in cloud computing environments. IEEE Access 6:70720–70733. https://doi.org/10.1109/ACCESS.2018.2880904

    Article  Google Scholar 

  3. Chang CC, Li CT, Chen K (2019) Privacy-preserving reversible information hiding based on arithmetic of quadratic residues. IEEE Access 7:54117–54132. https://doi.org/10.1109/ACCESS.2019.2908924

    Article  Google Scholar 

  4. Chen B, Wornell GW (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47:1423–1443. https://doi.org/10.1109/18.923725

    Article  MathSciNet  MATH  Google Scholar 

  5. Chen K, Chang CC (2019) High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement. J Vis Commun Image Represent 58:334–344. https://doi.org/10.1016/j.jvcir.2018.12.023

    Article  Google Scholar 

  6. Chen S, Chang CC (2020) Reversible data hiding in encrypted images based on reversible integer transformation and Quadtree-based partition. IEEE Access 8:184199–184209. https://doi.org/10.1109/access.2020.3029420

    Article  Google Scholar 

  7. Chen S, Chang CC, Liao Q (2020) Fidelity preserved data hiding in encrypted images based on homomorphism and matrix embedding. IEEE Access 8:22345–22356. https://doi.org/10.1109/ACCESS.2020.2968577

    Article  Google Scholar 

  8. Fridrich J, Soukal D (2006) Matrix embedding for large payloads. Secur Steganography, Watermarking Multimed Contents VIII 6072:60721W. https://doi.org/10.1117/12.639933

    Article  Google Scholar 

  9. Fridrich J, SoukalD (2006) Matrix embedding for large payloads. IEEE Trans Inf Forensics Secur 1:390–395. https://doi.org/10.1109/TIFS.2006.879281

    Article  Google Scholar 

  10. Guan B, Xu D (2020) An efficient high-capacity reversible data hiding scheme for encrypted images. J Vis Commun Image Represent 66:102744. https://doi.org/10.1016/j.jvcir.2019.102744

    Article  Google Scholar 

  11. Huang D, Wang J (2020) High-capacity reversible data hiding in encrypted image based on specific encryption process. Signal Process Image Commun 80:115632. https://doi.org/10.1016/j.image.2019.115632

    Article  Google Scholar 

  12. Image Database of BOSSbase from BOSS competition. [Online]. Available: http://agents.fel.cvut.cz/stegodata

  13. Li C, Zhang Z, Wang Y, … Huang D (2015) Dither modulation of significant amplitude difference for wavelet based robust watermarking. Neurocomputing 166:404–415. https://doi.org/10.1016/j.neucom.2015.03.039

    Article  Google Scholar 

  14. Li X, Li J, Li B, YangB (2013) High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process 93:198–205. https://doi.org/10.1016/j.sigpro.2012.07.025

    Article  Google Scholar 

  15. Liu Z, Pun CM (2020) Reversible data hiding in encrypted images using chunk encryption and redundancy matrix representation. IEEE Trans Dependable Secur Comput 5971:1–1. https://doi.org/10.1109/tdsc.2020.3011838

    Article  Google Scholar 

  16. Ma K, Zhang W, Zhao X, … Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8:553–562. https://doi.org/10.1109/TIFS.2013.2248725

    Article  Google Scholar 

  17. Mao Q (2014) A fast algorithm for matrix embedding steganography. Digit Signal Process A Rev J 25:248–254. https://doi.org/10.1016/j.dsp.2013.11.001

    Article  Google Scholar 

  18. Miyazaki A, Okamoto A (2002) Analysis of watermarking systems in the frequency domain and its application to design of robust watermarking systems. IEICE Trans Fundam Electron Commun Comput Sci E85-A:117–124. https://doi.org/10.1109/icip.2001.958539

    Article  Google Scholar 

  19. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16:354–361. https://doi.org/10.1109/TCSVT.2006.869964

    Article  Google Scholar 

  20. Puech W, Chaumont M, Strauss O (2008) A reversible data hiding method for encrypted images. Secur Forensics, Steganography, Watermarking Multimed Contents X 6819:68191E. https://doi.org/10.1117/12.766754

    Article  Google Scholar 

  21. Puteaux P, Puech W (2018) An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans Inf Forensics Secur 13:1670–1681

    Article  Google Scholar 

  22. Qin C, Qian X, Hong W, Zhang X (2019) An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer. Inf Sci (Ny) 487:176–192. https://doi.org/10.1016/j.ins.2019.03.008

    Article  Google Scholar 

  23. Qiu Y, Qian Z, Zeng H et al (2020) Reversible data hiding in encrypted images using adaptive reversible integer transformation. Signal Process:167. https://doi.org/10.1016/j.sigpro.2019.107288

  24. Sae-Tang W, Fujiyoshi M, Kiya H (2019) A new copyright- and privacy-protected image trading system using a novel steganography- based visual encryption scheme. ECTI Trans Electr Eng Electron Commun 17:95–107. https://doi.org/10.37936/ecti-eec.2019171.215455

    Article  Google Scholar 

  25. Sheikh HR, Bovik AC (2006) Image information and visual quality. IEEE Trans Image Process 15:430–444. https://doi.org/10.1109/TIP.2005.859378

    Article  Google Scholar 

  26. Shiu CW, Chen YC, Hong W (2015) Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process Image Commun 39:226–233. https://doi.org/10.1016/j.image.2015.09.014

    Article  Google Scholar 

  27. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13:890–896. https://doi.org/10.1109/TCSVT.2003.815962

    Article  Google Scholar 

  28. Wang C, Zhang W, Liu J, Yu N (2012) Fast matrix embedding by matrix extending. IEEE Trans Inf Forensics Secur 7:346–350. https://doi.org/10.1109/TIFS.2011.2164907

    Article  Google Scholar 

  29. Wang W, Ye J, WangT WW (2017) Reversible data hiding scheme based on significant-bit-difference expansion. IET Image Process 11:1002–1014. https://doi.org/10.1049/iet-ipr.2017.0151

    Article  Google Scholar 

  30. Wang X, Li X, Pe IQ (2020) Independent Embedding Domain Based Two-Stage Robust Reversible Watermarking. IEEE Trans Circuits Syst Video Technol 30:2406–2417. https://doi.org/10.1109/TCSVT.2019.2915116

    Article  Google Scholar 

  31. Wang Y, Cai Z, He W (2019) A new high capacity separable reversible data hiding in encrypted images based on block selection and block-level encryption. IEEE Access 7:175671–175680. https://doi.org/10.1109/ACCESS.2019.2957143

    Article  Google Scholar 

  32. **ong L, Han X, Yang CN, Shi YQ (2021) Robust reversible watermarking in encrypted image with secure multi-party based on lightweight cryptography. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2021.3055072

  33. Yu X, Chen K, Wang Y et al (2020) Robust adaptive steganography based on generalized dither modulation and expanded embedding domain. Signal Processing:168. https://doi.org/10.1016/j.sigpro.2019.107343

  34. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18:255–258. https://doi.org/10.1109/LSP.2011.2114651

    Article  Google Scholar 

  35. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10:781–783. https://doi.org/10.1109/LCOMM.2006.060863

    Article  Google Scholar 

  36. Zhang Y, Luo X, Yang C, … Liu F (2016) A framework of adaptive steganography resisting JPEG compression and detection. Secur Commun Networks 9:2957–2971. https://doi.org/10.1002/sec.1502

    Article  Google Scholar 

  37. Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci (Ny) 181:1171–1186. https://doi.org/10.1016/j.ins.2010.11.009

    Article  Google Scholar 

  38. Zong T, **angY NI et al (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 25:717–729. https://doi.org/10.1109/TCSVT.2014.2363743

    Article  Google Scholar 

Download references

Funding

This work was supported in part by the Natural Science Foundation of Fujian Province of China under Grant: 2020J01300, 2021J011236, and in part by Engineering Research Center for ICH Digitalization and Multi-Source Information Fusion of Fujian Province University under the grant: FJ-ICH 201901.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Chen Chang.

Ethics declarations

Conflicts of interest/competing interests

The authors confirm that there are no relevant conflicts of financial or non-financial interests associated with this manuscript.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, S., Chang, CC. Privacy-preserving data hiding with robustness based on selective encryption and matrix embedding. Multimed Tools Appl 81, 33397–33417 (2022). https://doi.org/10.1007/s11042-022-13161-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13161-y

Keywords

Navigation