Skip to main content
Log in

A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction

  • Published:
Circuits, Systems, and Signal Processing Aims and scope Submit manuscript

Abstract

Reversible data hiding in encrypted images (RDHEI) is a widely used technique for privacy protection, which has been developed in many applications that require high confidentiality, authentication and integrity. Proposed RDHEI methods do not allow high embedding rate while ensuring losslessly recover the original image. Moreover, embedding computational complexity and embedding rate are not satisfactory when using public key encryption-based methods. This paper proposes a new fully reversible method based on Paillier homomorphic cryptosystem and pixel prediction. We use gradient adjust prediction to obtain redundant space in the original image and embed secret information with homomorphic operation after encryption. Experimental results show that our scheme can achieve high capacity (near 0.95 bpp) and can losslessly recover the original images with peak signal to noise ratio of +∞ and structural similarity of 1. Compared with proposed reversible data hiding algorithms, our scheme has a significant improvement in reconstructing quality, safety and capacity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. M. Alattar, Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process. 13, 1147–1156 (2004)

    Article  MathSciNet  Google Scholar 

  2. L. An, X. Gao et al., Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Trans. Image Process. 21(8), 3598–3611 (2012)

    Article  MathSciNet  Google Scholar 

  3. L. An, X. Gao, Y. Yuan, D. Tao, Robust lossless data hiding using clustering and statistical quantity histogram. Neurocomputing 77(1), 1–11 (2012)

    Article  Google Scholar 

  4. P. Bas, T. Furon, Image database of BOWS-2. (2016). http://bows2.ec-lille.fr/. Accessed 2007

  5. Brodatz Textures. (2017). http://www.ux.uis.no/~tranden/brodatz.html. Accessed 2007

  6. R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic (2008) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Computer Syst. 25(6), 599–616 (2008)

    Article  Google Scholar 

  7. X. Cao, L. Du, X. Wei, D. Meng, X. Guo, High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern. 46, 1132–1143 (2016)

    Article  Google Scholar 

  8. M.U. Celik, G. Sharma, A.M. Tekalp, E. Saber, Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 14, 253–266 (2005)

    Article  Google Scholar 

  9. C.C. Chang, C.C. Lin, C.S. Tseng, W.L. Tai, Reversible hiding in DCT-based compressed images. Inf. Sci. 177(13), 2768–2786 (2007)

    Article  Google Scholar 

  10. Y.C. Chen, C.W. Shiu, G. Horng, Encrypted signal-based reversible data hiding with public key cryptosystem. J. Vis. Commun. Image Represent. 25, 1164–1170 (2014)

    Article  Google Scholar 

  11. Z. Erkin, Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP J. Inf. Secur. 2007, 17 (2007)

    Google Scholar 

  12. X. Gao, L. An, Y. Yuan, D. Tao, X. Li, Lossless data embedding using generalized statistical quantity histogram. IEEE Trans. Circuits Syst. Video Technol. 21(8), 1061–1070 (2011)

    Article  Google Scholar 

  13. W. He, G. Xiong, K. Zhou, J. Cai, Reversible data hiding based on multilevel histogram modification and pixel value grouping. J. Vis. Commun. 40, 459–469 (2016)

    Google Scholar 

  14. W. Hong, T. Chen, H. Wu, An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19, 199–202 (2012)

    Article  Google Scholar 

  15. D. Knuth, The Art of Computer Programming, vol. 2, 3rd edn. (Addison-Wesley, Boston, 1997)

    MATH  Google Scholar 

  16. X. Li, B. Li, B. Yang, T. Zeng, General framework to histogram shifting-based reversible data hiding. IEEE Trans. Image Process. 22, 2181–2191 (2013)

    Article  MathSciNet  Google Scholar 

  17. Z. Liu, C. Pun, Reversible data-hiding in encrypted images by redundant space transfer. Inf. Sci. 433, 188–203 (2018)

    Article  MathSciNet  Google Scholar 

  18. H. Luo, F.X. Yu, Reversible data hiding based on block median preservation. Inf. Sci. 181(2), 308–328 (2011)

    Article  Google Scholar 

  19. K. Ma, W. Zhang, X. Zhao, N. Yu, F. Li, Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)

    Article  Google Scholar 

  20. B. Ou, X. Li, Pairwise prediction error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010–5021 (2013)

    Article  MathSciNet  Google Scholar 

  21. P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in Proceeding of the Advances Cryptology, EUROCRYPT99, (LNCS, 1999), vol. 1592, pp. 223–238

  22. W. Puech, M. Chaumont, O. Strauss, A reversible data hiding method for encrypted images. Electron. Imaging Int. Soc. Opt. Photonics 68191E, 68191E (2008)

    Google Scholar 

  23. P. Puteaux, W. Puech, An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forensics Secur. 13(7), 1670–1681 (2018)

    Article  Google Scholar 

  24. X. Qu, H.J. Kim, Pixel-based pixel value ordering predictor for high fidelity reversible data hiding. Signal Process. 111, 249–260 (2015)

    Article  Google Scholar 

  25. P. Rahmani, An efficient histogram-based index mapping mechanism for reversible data hiding in VQ-compressed images. Inf. Sci. 435, 224–239 (2018)

    Article  MathSciNet  Google Scholar 

  26. P. Rahmani, A reversible data hiding scheme based on prediction-error expansion using pixel-based pixel value ordering predictor, in Artificial Intelligence and Signal Processing Conference (AISP), pp. 219–223 (2017)

  27. J. Tian, Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)

    Article  Google Scholar 

  28. S. Xiang, X. Luo, Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group. IEEE Trans. Circuits Syst. Video Technol. 28, 3099–3110 (2017)

    Article  Google Scholar 

  29. X. Zhang, Reversible data hiding in encrypted image. Signal Process. Lett. IEEE 18(4), 255–258 (2011)

    Article  Google Scholar 

  30. X. Zhang, J. Long, Z. Wang, H. Cheng, Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Trans. Circuits Syst. Video Technol. 26(9), 1622–1631 (2016)

    Article  Google Scholar 

  31. W. Zhang, K. Ma, N. Yu, Reversibility improved data hiding in encrypted images. Signal Process. 94, 118–127 (2014)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Key Research and Development Program of China (No. 2016YFB0800404) and the NSF of China (U1836108, U1636112, U1636212).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kaifeng Zhao.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, J., Zhao, K. & Zhang, R. A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction. Circuits Syst Signal Process 39, 3532–3552 (2020). https://doi.org/10.1007/s00034-019-01321-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00034-019-01321-9

Keywords

Navigation