Skip to main content

Advertisement

Log in

Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we propose a new reversible data-hiding method in encrypted images. The method is a vacating room after encryption (VRAE) method that attempts to achieve the error-free recovery of images. In previous VRAE methods, errors may occur in recovering images because of inaccurate predictions, so these methods cannot achieve complete reversibility. In addition, these methods have limited embedding rates. To solve these problems, the proposed method uses a linear, regression-based predictor to improve the accuracy of predictions, and it uses a prediction error map to eliminate errors caused by inaccurate predictions. By using the linear regression-based predictor and the prediction error map, the embedding rate of data embedding is improved significantly, and the original image can be recovered with no error. The experimental results showed that the embedding rate of the proposed method can be higher than 0.5 bpp, and the visual quality can be maintained at high embedding rates.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
€32.70 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (France)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate Array on RGB indicator. Int J Signal Image Process 1(3):196–204

    Google Scholar 

  2. Alanizy N, Alanizy A, Baghoza N, Al-Ghamdi M, Gutub A (2018) 3-layer PC text security via combining compression, AES cryptography 2LSB image steganography. J Res Eng Appl Sci (JREAS) 3(4):118–124

    Google Scholar 

  3. Alassaf N, Alkazemi B, Gutub A (2017) Applicable light-weight cryptography to secure medical data in IoT systems. J Res Eng Appl Sci (JREAS) 2(2):50–58

    Google Scholar 

  4. Alassaf N, Gutub A, Parah SA, Al Ghamdi M (2018) Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6801-z

  5. Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13:1147–1156

    MathSciNet  Google Scholar 

  6. Al-Ghamdi M, Al-Ghamdi M, Gutub A (2018) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6977-2

    Google Scholar 

  7. Al-Juaid N, Gutub A, Khan E (2018) Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography. Journal of Information Security and Cybercrimes Research (JISCR), Vol. 1, No. 1, Published by Naif Arab University for Security Sciences (NAUSS)

  8. Al-Otaibi NA, Gutub AA (2014) 2-Leyer security system for hiding sensitive text data on personal computers. Lecture Notes Inform Theor 2(2):151–157

    Google Scholar 

  9. Al-Otaibi NA, Gutub AA (2014) Flexible Stego-system for hiding text in images of personal computers based on user security priority. Proceedings of 2014 international conference on advanced engineering technologies (AET-2014):250–256

  10. Alsaidi A, Al-Lehaibi K, Alzahrani H, AlGhamdi M, Gutub A (2018) Compression multi-level crypto stego security of texts utilizing colored email forwarding. J Comput Sci Comput Math (JCSCM) 8(3):33–42

    Google Scholar 

  11. Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688

    Google Scholar 

  12. Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2016) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451–18472

    Google Scholar 

  13. Bas P, Filler T, Pevny T (2011) Break our steganographic system: the ins and outs of organizing BOSS. Proceedings of 13th international workshop on information hiding, Prague, Czech Republic: 59–70

  14. Caldelli R, Filippini F, Becarelli R (2010) Reversible watermarking techniques: an overview and a classification. EURASIP J Inf Secur 2010:1–19

    Google Scholar 

  15. Cao X, Du L, Wei X, Meng D, Guo X (2016) High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans Cybernet 46:1132–1143

    Google Scholar 

  16. Chen K, Chang CC (2019) High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement. J Vis Commun Image Represent 58:334–344

    Google Scholar 

  17. Coltuc D (2012) Low distortion transform for reversible watermarking. IEEE Trans Image Process 21:412–417

    MathSciNet  MATH  Google Scholar 

  18. Computer Vision Group Test Image database, Online, http://decsai.ugr.es/cvg/dbimagenes/g512.php

  19. Dragoi IC, Coanda HG, Coltuc D (2017) Improved reversible data hiding in encrypted images based on reserving room after encryption and pixel prediction. Proceedings of 25th European signal processing conference (EUSIPCO), Kos island, Greece: 2186–2190

  20. Gupta BB (2018) Computer and cyber security: principles, algorithm, applications, and perspectives. CRC Press

  21. Gupta BB, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global Publisher, USA

    Google Scholar 

  22. Gutub AA-A (2010) Pixel indicator technique for RGB image steganography. J Emerg Technol Web Intell 2(1):56–64

    Google Scholar 

  23. Gutub A, Al-Juaid N (2018) Multi-bits Stego-system for hiding text in multimedia images based on user security priority. Journal of computer hardware engineering 1(2). doi:10.63019/jche.v1i2.513, EnPress Publisher

  24. Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A (2008) Pixel indicator high capacity technique for RGB image based steganography, in WoSPA 2008-5th IEEE international workshop on signal processing and its applications

  25. Gutub A, Al-Qahtani A, Tabakh A (2009) Triple-a: secure RGB image steganography based on randomization, in computer systems and applications, AICCSA 2009. IEEE/ACS Int Conf 2009:400–403

    Google Scholar 

  26. Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78(5):5591–5619

    Google Scholar 

  27. Hong W, Chen T, Wu H (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19:199–202

    Google Scholar 

  28. Khan F, Gutub AA-A, (2007) Message concealment techniques using image based steganography. The 4th IEEE GCC Conference and Exhibition

  29. Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Inform Forens Sec 8:1091–1100

    Google Scholar 

  30. Li X, Li J, Li B, Yang B (2013) High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process 93:198–205

    Google Scholar 

  31. Li M, Xiao D, Zhang Y, Nan H (2015) Reversible data hiding in encrypted images using cross division and additive homomorphism. Signal Process Image Commun 39:234–248

    Google Scholar 

  32. Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21–27

    Google Scholar 

  33. Liu ZL, Pun CM (2017) Reversible data-hiding in encrypted images by redundant space transfer. Inform Sci 433:188–203

    MathSciNet  Google Scholar 

  34. Liu WL, Leng HS, Huang CK, Chen DC (2017) A block-based division reversible data hiding method in encrypted images. Symmetry 9:308

    Google Scholar 

  35. Luo L, Chen Z, Chen M, Zeng X, Xiong Z Reversible image watermarking using interpolation technique. IEEE Trans Inform Foren Sec 5:187–193

  36. Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inform Forensics Sec 8:553–562

    Google Scholar 

  37. MATLAB Document, Online, https://www.mathworks.com/help/stats/regress.html

  38. Ni Z, Shi Y, Ansari N, Wei S (2003) Reversible data hiding. Proc IEEE Int Sym Circ Syst Bangkok, Thailand, 2003 2:912–915

    Google Scholar 

  39. Ni Z, Shi YQ, Ansari N, Wei S (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16:354–362

    Google Scholar 

  40. Ou B, Li X, Zhao Y, Ni R (2014) Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion. Signal Process Image Commun 29:760–772

    Google Scholar 

  41. Parvez MT, Gutub A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38(1B):127–142

    Google Scholar 

  42. Qian Z, Zhang X (2016) Reversible data hiding in encrypted image with distributed source encoding. IEEE Trans Circ Syst Video Technol 26:636–646

    Google Scholar 

  43. Qian Z, Zhang X, Feng G Reversible data hiding in encrypted images based on progressive recovery. IEEE Signal Processing Letters 23: 1672-1676

    Google Scholar 

  44. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164

    Google Scholar 

  45. Qin C, He Z, Luo X, Dong J (2018) Reversible data hiding in encrypted image with separable capability and high embedding capacity. Inf Sci 465:285–304

    Google Scholar 

  46. Qiu Y, Qian Z, Yu L (2016) Adaptive reversible data hiding by extending the generalized integer transformation. IEEE Trans Image Process 23:130–134

    Google Scholar 

  47. Qu X, Kim HJ (2015) Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Process 111:249–260

    Google Scholar 

  48. Shi YQ, Ni Z, Zou D, Liang C (2004) lossless data hiding: fundamentals, algorithms and applications, in proceedings of IEEE international symposium on circuits and systems, Vancouver, Canada, 2004: 33–36

  49. Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circ Syst Video Technol 19:906–910

    Google Scholar 

  50. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13:890–896

    Google Scholar 

  51. Wang X, Ding J, Pei Q (2015) A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition. Inf Sci 310:16–35

    Google Scholar 

  52. Wu X, Sun W (2014) High-capacity reversible data hiding in encrypted images by prediction error. Signal Process 104:387–400

    Google Scholar 

  53. Xiao D, Xiang Y, Zheng H, Wang Y (2017) Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism. J Vis Commun Image Represent 45:1–10

    Google Scholar 

  54. Yi S, Zhou Y (2017) Binary-block embedding for reversible data hiding in encrypted images. Signal Process 133:40–51

    Google Scholar 

  55. Yi S, Zhou Y (2019) Separable and reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans Multimed 21:51–64

    Google Scholar 

  56. Yi S, Zhou Y, Hua Z (2018) Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Process Image Commun 64:78–88

    Google Scholar 

  57. Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608

    Google Scholar 

  58. Zhang X (2011) Reversible data hiding in encrypted images. IEEE Signal Process Lett 18:255–258

    Google Scholar 

  59. Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inform Fore Sec 7:826–832

    Google Scholar 

  60. Zhang X, Qian Z, Feng G, Ren Y (2014) Efficient reversible data hiding in encrypted images. J Vis Commun Image Represent 25:322–328

    Google Scholar 

  61. Zheng Q, Wang X, Khan MK, Zhang W, Gupta BB, Guo W (2018) A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access 6:711–722

    Google Scholar 

  62. Zhou J, Sun W, Dong L, Liu X, Au OC, Tang YY (2016) Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans Circ Syst Video Technol 26(3):441–452

    Google Scholar 

Download references

Acknowledgements

This paper is supported by the Natural Science Foundation of Fujian Province, China (2017 J05104, 2019H0021), the National Natural Science Foundation of China (61701191), and the Xiamen Foundation for Science and Technology (3502Z20173028).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Chen Chang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, K., Chang, CC. Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map. Multimed Tools Appl 78, 31441–31465 (2019). https://doi.org/10.1007/s11042-019-07946-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-07946-x

Keywords

Navigation