首页 | 官方网站   微博 | 高级检索  
     


High-capacity reversible data hiding in encrypted image based on specific encryption process
Affiliation:1. Department of Computer and Information Science, University of Macau, Macau 999078, China;2. School of Computer Science and Technology, Harbin Institute of Technology Shenzhen Graduate School, Shenzhen 518055, China;1. College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan 410082, China;2. Institute of Software, Chinese Academy of Sciences, Beijing 100190, China;3. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China;1. School of Electronics and Information Engineering, Ningbo University of Technology, Ningbo 315016, China;2. CKC Software Lab, Ningbo University, Ningbo 315211, China;1. School of Information Science and Technology, Sun Yat-sen University, Guangzhou 510006, China;2. School of Software, Sun Yat-sen University, Guangzhou 510006, China;3. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China;1. Shanghai Key Lab of Modern Optical System, and Engineering Research Center of Optical Instrument and System, Ministry of Education, University of Shanghai for Science and Technology, Shanghai 200093, China;2. School of Communication and Information Engineering, Shanghai University, Shanghai 200072, China
Abstract:This paper proposes a novel reversible data hiding method in encrypted images based on specific encryption process. In the proposed specific encryption algorithm, the stream cipher and prediction error are combined to vacate room for data embedding. After that, a permutation operation is performed on the encrypted image to improve the security. In the embedding process, we can embed a large amount of secret data in the encrypted image by pixel value expansion because most of the pixel values are less than 128 by the specific encryption process. At the receiver end, the encrypted image can be recovered from the marked encrypted image without knowing the secret data. Therefore, even if the recipient only has the encryption key, the original image will be perfectly recovered. If the recipient only has the data-hiding key, the secret data will be extracted. And if the recipient has both keys, the original image and the secret data are both available. The proposed method achieves a higher embedding capacity than that of methods based on vacating room after encryption. It does not require the image owner to perform reversible data hiding techniques on the original image, which is more convenient than methods based on reserving room before encryption. Experimental results demonstrate that the proposed method outperforms other state-of-the-art methods.
Keywords:Reversible data hiding  Encrypted image  Specific encryption process  Pixel value expansion
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号