Skip to main content

Separable Multiple Bits Reversible Data Hiding in Encrypted Domain

  • Conference paper
  • First Online:
Digital Forensics and Watermarking (IWDW 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10082))

Included in the following conference series:

Abstract

This paper proposes a novel scheme of separable multiple bits reversible data hiding in encrypted domain based on LWE (Learning with Errors). Multi-band data could be embedded by recoding the redundancy of ciphertext, which does enhance the capacity of embedding data. With embedded ciphertext, the additional data can be extracted by using data-hiding key, and the original data can be recovered losslessly by using decryption key, the processes of extraction and decryption are separable. By deducing the error probability of the scheme, parameters in the scheme which directly related to the scheme’s correctness is mainly discussed, and reasonable ranges of the parameters are obtained by experiments. When analyzing the security, the probability distribution function of the embedded cipher text is deduced and the statistic features of ciphertext are analyzed, which both proved the embedded data isn’t detective. The proposed scheme is based on encryption process, so it can apply to different kinds of media vehicle. Experimental results have demonstrated that the proposed scheme can not only achieve statistical security without degrading the quality of encryption, but realize that 1bit original data can maximally load multiple-bit additional data in encrypted domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Barni, M., Kalker, T., Katzenbeisser, S.: Inspiring new research in the field of signal processing in the encrypted domain. IEEE Signal Process. Mag. 30(2), 16 (2013)

    Article  Google Scholar 

  2. Moulin, P., Koetter, R.: Data hiding codes. Proc. IEEE 93(12), 2083–2126 (2005)

    Article  Google Scholar 

  3. Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Technol. 13(8), 890–896 (2003)

    Article  Google Scholar 

  4. Dragoi, L., Coltuc, D.: Local-prediction-based difference expansion reversible watermarking. IEEE Trans. Image Process. 23(4), 1779–1790 (2014)

    Article  MathSciNet  Google Scholar 

  5. Caciula, I., Coltuc, D.: Improved control for low bit-rate reversible watermarking. In: IEEE International Conference on Acoustics Speech and Signal Processing, Florence, Italy, pp. 7425–7429 (2014)

    Google Scholar 

  6. Zhang, W., Hu, X., Li, X., et al.: Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans. Image Process. 22(7), 2775–2785 (2013)

    Article  Google Scholar 

  7. Jarali, A., Rao, J.: Unique LSB compression data hiding method. Int. J. Emerg. Sci. Eng. 2(3), 17–21 (2013)

    Google Scholar 

  8. Zhao, B., Kou, W., Li, H., et al.: Effective watermarking scheme in the encrypted domain for buyer–seller watermarking protocol. Inf. Sci. 180(23), 4672–4684 (2010)

    Article  MathSciNet  Google Scholar 

  9. Lian, S., Liu, Z., Ren, Z., et al.: Commutative encryption and watermarking in video compression. IEEE Trans. Circ. Syst. Video Technol. 17(6), 774–778 (2007)

    Article  Google Scholar 

  10. Cancellaro, M., Battisti, F., Carli, M., et al.: A commutative digital image watermarking and encryption method in the tree structured Haartransform domain. Signal Process. Image Commun. 26(1), 1–12 (2011)

    Article  Google Scholar 

  11. Xiao, Di., Chen, S.: Separable data hiding in encrypted image based on compressive sensing. Electron. Lett. 50(8), 598–600 (2014)

    Google Scholar 

  12. Kuribayashi, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Process. 14(12), 2129–2139 (2005)

    Article  Google Scholar 

  13. Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Trans. Image Process. 10(4), 643–649 (2001)

    Article  MATH  Google Scholar 

  14. Chen, J.H., Wang, C., Zhang, W.M., et al.: A secure image steganographic method in encrypted domain. J. Electron. Inf. Technol. 34(7), 1721–1726 (2012). in Chinese

    Article  Google Scholar 

  15. Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255–258 (2011)

    Article  Google Scholar 

  16. Yu, J., Zhu, G., Li, X., Yang, J.: An improved algorithm for reversible data hiding in encrypted image. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2012. LNCS, vol. 7809, pp. 384–394. Springer, Heidelberg (2013). doi:10.1007/978-3-642-40099-5_32

    Chapter  Google Scholar 

  17. Li, M., Xiao, D., Peng, Z., et al.: A modified reversible data hiding in encrypted images using random diffusion and accurate prediction. ETRI J. 36(2), 325–328 (2014)

    Article  Google Scholar 

  18. Wu, X., Sun, W.: High-capacity reversible data hiding in encrypted images by prediction error. Signal Process. 104(11), 387–400 (2014)

    Article  Google Scholar 

  19. Qian, Z., Zhang, X., Wang, S.: Reversible data hiding in encrypted JPEG bitstream. IEEE Trans. Multimedia 16(5), 1486–1491 (2014)

    Article  Google Scholar 

  20. Liao, X., Shu, C.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Representation 28(4), 21–27 (2015)

    Article  Google Scholar 

  21. Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)

    Article  Google Scholar 

  22. Regev, O.: On lattices, learning with errors, random linear codes and cryptography. J. ACM 56(6), 34 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  23. Regev, O.: The learning with errors problem (2010). http://www.cs.tau.ac.il/~odedr/papers/lwesurvey.pdf

  24. Min-Qing, Z., Yan, K., Ting-Ting, S.: Reversible steganography in encrypted domain based on LWE. J. Electron. Inf. Technol. 38(2), 354–360 (2016). in Chinese

    Google Scholar 

  25. Zhang, X., Qian, Z., Feng, G., Ren, Y.: Efficient reversible data hiding in encrypted image. J. Vis. Commun. Image Representation. 25(2), 322–328 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan Ke .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Ke, Y., Zhang, M., Liu, J. (2017). Separable Multiple Bits Reversible Data Hiding in Encrypted Domain. In: Shi, Y., Kim, H., Perez-Gonzalez, F., Liu, F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science(), vol 10082. Springer, Cham. https://doi.org/10.1007/978-3-319-53465-7_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-53465-7_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-53464-0

  • Online ISBN: 978-3-319-53465-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics