Abstract
In this paper, we propose a new reversible data-hiding method in encrypted images. The method is a vacating room after encryption (VRAE) method that attempts to achieve the error-free recovery of images. In previous VRAE methods, errors may occur in recovering images because of inaccurate predictions, so these methods cannot achieve complete reversibility. In addition, these methods have limited embedding rates. To solve these problems, the proposed method uses a linear, regression-based predictor to improve the accuracy of predictions, and it uses a prediction error map to eliminate errors caused by inaccurate predictions. By using the linear regression-based predictor and the prediction error map, the embedding rate of data embedding is improved significantly, and the original image can be recovered with no error. The experimental results showed that the embedding rate of the proposed method can be higher than 0.5 bpp, and the visual quality can be maintained at high embedding rates.









Similar content being viewed by others
References
Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate Array on RGB indicator. Int J Signal Image Process 1(3):196–204
Alanizy N, Alanizy A, Baghoza N, Al-Ghamdi M, Gutub A (2018) 3-layer PC text security via combining compression, AES cryptography 2LSB image steganography. J Res Eng Appl Sci (JREAS) 3(4):118–124
Alassaf N, Alkazemi B, Gutub A (2017) Applicable light-weight cryptography to secure medical data in IoT systems. J Res Eng Appl Sci (JREAS) 2(2):50–58
Alassaf N, Gutub A, Parah SA, Al Ghamdi M (2018) Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6801-z
Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13:1147–1156
Al-Ghamdi M, Al-Ghamdi M, Gutub A (2018) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6977-2
Al-Juaid N, Gutub A, Khan E (2018) Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography. Journal of Information Security and Cybercrimes Research (JISCR), Vol. 1, No. 1, Published by Naif Arab University for Security Sciences (NAUSS)
Al-Otaibi NA, Gutub AA (2014) 2-Leyer security system for hiding sensitive text data on personal computers. Lecture Notes Inform Theor 2(2):151–157
Al-Otaibi NA, Gutub AA (2014) Flexible Stego-system for hiding text in images of personal computers based on user security priority. Proceedings of 2014 international conference on advanced engineering technologies (AET-2014):250–256
Alsaidi A, Al-Lehaibi K, Alzahrani H, AlGhamdi M, Gutub A (2018) Compression multi-level crypto stego security of texts utilizing colored email forwarding. J Comput Sci Comput Math (JCSCM) 8(3):33–42
Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688
Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2016) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451–18472
Bas P, Filler T, Pevny T (2011) Break our steganographic system: the ins and outs of organizing BOSS. Proceedings of 13th international workshop on information hiding, Prague, Czech Republic: 59–70
Caldelli R, Filippini F, Becarelli R (2010) Reversible watermarking techniques: an overview and a classification. EURASIP J Inf Secur 2010:1–19
Cao X, Du L, Wei X, Meng D, Guo X (2016) High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans Cybernet 46:1132–1143
Chen K, Chang CC (2019) High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement. J Vis Commun Image Represent 58:334–344
Coltuc D (2012) Low distortion transform for reversible watermarking. IEEE Trans Image Process 21:412–417
Computer Vision Group Test Image database, Online, http://decsai.ugr.es/cvg/dbimagenes/g512.php
Dragoi IC, Coanda HG, Coltuc D (2017) Improved reversible data hiding in encrypted images based on reserving room after encryption and pixel prediction. Proceedings of 25th European signal processing conference (EUSIPCO), Kos island, Greece: 2186–2190
Gupta BB (2018) Computer and cyber security: principles, algorithm, applications, and perspectives. CRC Press
Gupta BB, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global Publisher, USA
Gutub AA-A (2010) Pixel indicator technique for RGB image steganography. J Emerg Technol Web Intell 2(1):56–64
Gutub A, Al-Juaid N (2018) Multi-bits Stego-system for hiding text in multimedia images based on user security priority. Journal of computer hardware engineering 1(2). doi:10.63019/jche.v1i2.513, EnPress Publisher
Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A (2008) Pixel indicator high capacity technique for RGB image based steganography, in WoSPA 2008-5th IEEE international workshop on signal processing and its applications
Gutub A, Al-Qahtani A, Tabakh A (2009) Triple-a: secure RGB image steganography based on randomization, in computer systems and applications, AICCSA 2009. IEEE/ACS Int Conf 2009:400–403
Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78(5):5591–5619
Hong W, Chen T, Wu H (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19:199–202
Khan F, Gutub AA-A, (2007) Message concealment techniques using image based steganography. The 4th IEEE GCC Conference and Exhibition
Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Inform Forens Sec 8:1091–1100
Li X, Li J, Li B, Yang B (2013) High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process 93:198–205
Li M, Xiao D, Zhang Y, Nan H (2015) Reversible data hiding in encrypted images using cross division and additive homomorphism. Signal Process Image Commun 39:234–248
Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21–27
Liu ZL, Pun CM (2017) Reversible data-hiding in encrypted images by redundant space transfer. Inform Sci 433:188–203
Liu WL, Leng HS, Huang CK, Chen DC (2017) A block-based division reversible data hiding method in encrypted images. Symmetry 9:308
Luo L, Chen Z, Chen M, Zeng X, Xiong Z Reversible image watermarking using interpolation technique. IEEE Trans Inform Foren Sec 5:187–193
Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inform Forensics Sec 8:553–562
MATLAB Document, Online, https://www.mathworks.com/help/stats/regress.html
Ni Z, Shi Y, Ansari N, Wei S (2003) Reversible data hiding. Proc IEEE Int Sym Circ Syst Bangkok, Thailand, 2003 2:912–915
Ni Z, Shi YQ, Ansari N, Wei S (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16:354–362
Ou B, Li X, Zhao Y, Ni R (2014) Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion. Signal Process Image Commun 29:760–772
Parvez MT, Gutub A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38(1B):127–142
Qian Z, Zhang X (2016) Reversible data hiding in encrypted image with distributed source encoding. IEEE Trans Circ Syst Video Technol 26:636–646
Qian Z, Zhang X, Feng G Reversible data hiding in encrypted images based on progressive recovery. IEEE Signal Processing Letters 23: 1672-1676
Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164
Qin C, He Z, Luo X, Dong J (2018) Reversible data hiding in encrypted image with separable capability and high embedding capacity. Inf Sci 465:285–304
Qiu Y, Qian Z, Yu L (2016) Adaptive reversible data hiding by extending the generalized integer transformation. IEEE Trans Image Process 23:130–134
Qu X, Kim HJ (2015) Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Process 111:249–260
Shi YQ, Ni Z, Zou D, Liang C (2004) lossless data hiding: fundamentals, algorithms and applications, in proceedings of IEEE international symposium on circuits and systems, Vancouver, Canada, 2004: 33–36
Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circ Syst Video Technol 19:906–910
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13:890–896
Wang X, Ding J, Pei Q (2015) A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition. Inf Sci 310:16–35
Wu X, Sun W (2014) High-capacity reversible data hiding in encrypted images by prediction error. Signal Process 104:387–400
Xiao D, Xiang Y, Zheng H, Wang Y (2017) Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism. J Vis Commun Image Represent 45:1–10
Yi S, Zhou Y (2017) Binary-block embedding for reversible data hiding in encrypted images. Signal Process 133:40–51
Yi S, Zhou Y (2019) Separable and reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans Multimed 21:51–64
Yi S, Zhou Y, Hua Z (2018) Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Process Image Commun 64:78–88
Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608
Zhang X (2011) Reversible data hiding in encrypted images. IEEE Signal Process Lett 18:255–258
Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inform Fore Sec 7:826–832
Zhang X, Qian Z, Feng G, Ren Y (2014) Efficient reversible data hiding in encrypted images. J Vis Commun Image Represent 25:322–328
Zheng Q, Wang X, Khan MK, Zhang W, Gupta BB, Guo W (2018) A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access 6:711–722
Zhou J, Sun W, Dong L, Liu X, Au OC, Tang YY (2016) Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans Circ Syst Video Technol 26(3):441–452
Acknowledgements
This paper is supported by the Natural Science Foundation of Fujian Province, China (2017 J05104, 2019H0021), the National Natural Science Foundation of China (61701191), and the Xiamen Foundation for Science and Technology (3502Z20173028).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chen, K., Chang, CC. Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map. Multimed Tools Appl 78, 31441–31465 (2019). https://doi.org/10.1007/s11042-019-07946-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-07946-x