Skip to main content
Log in

Lossless data hiding algorithm for encrypted images with high capacity

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a novel reversible data hiding algorithm for encrypted images is proposed. In encryption phase, chaotic sequence is applied to encrypt the original image. Then the least significant bits (LSBs) of pixels in encrypted image are losslessly compressed to leave place for secret data. With auxiliary bit stream, the lossless compression is realized by the Hamming distance calculation between the LSB stream and auxiliary stream. At receiving terminal, the operation is flexible, that is, it meets the requirement of separation. With the decryption key, a receiver can get access to the marked decrypted image which is similar to the original one. With data-hiding key, the receiver can successfully extract secret data from the marked encrypted image. With both keys, the receiver can get secret data and the exactly original image. Compared with existing methods, experiments show the feasibility and efficiency of the proposed method, especially in aspect of embedding capacity, embedding quality and error-free recovery with increasing payload.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-lsb data embedding. IEEE Trans Image Process 14:253–266

    Article  Google Scholar 

  2. Chen G, Zhao X, Li J (2011) A self-adaptive algorithm on image encryption. J Softw 16:1975–1982

    Article  MATH  Google Scholar 

  3. Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting Parallel Computing. IEICE Transactions on Communications E98-B(1):190–200

    Article  Google Scholar 

  4. Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos, Solitons and Fractals 29:393–399

    Article  MATH  Google Scholar 

  5. Gu Q, Yao M (2003) A research of digital image encryption based on logistic chaotic sequence. Computer Engineering and Applications 39:114–116

    Google Scholar 

  6. Hong W, Chen T-S, Wu H-Y (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Proc Letters 19:199–202

    Article  Google Scholar 

  7. Hu Y, Lee H-K, Li J (2009) De-based reversible data hiding with improved overflow location map. IEEE Trans Circuits and Systems for Video Technology 19:250–260

    Article  Google Scholar 

  8. Joong KH, Sachnev V, Qing SY, Jeho N, Nam J, Choo H-G (2008) A novel difference expansion transform for reversible data embedding. IEEE Trans Information Forensics and Security 3:456– 465

    Article  Google Scholar 

  9. Ma K, Zhang W, Zhao X (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Information Forensics and Security 8:553–562

    Article  Google Scholar 

  10. Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits and Systems for Video Technology 16:354–362

    Article  Google Scholar 

  11. P W C M, S O (2008) A reversible data hiding method for encrypted images, International Society for Optics and Photonics, San Jose, CA, USA, 68191E-68191E-9

  12. Qin C, Chang CC, Chen YC (2013) Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Process 93:2687–2695

    Article  Google Scholar 

  13. Qin C, Chang CC, Huang YH, et al. (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits and Systems for Video Technology 23:1109–1118

    Article  Google Scholar 

  14. Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of puxel differences. IEEE Trans Circuits and Systems for Video Technology 19:906–910

    Article  Google Scholar 

  15. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits and Systems for Video Technology 13:890–896

    Article  Google Scholar 

  16. Xia Z, Wang X, Sun X, Qian Wang (2015) A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Transactions on Parallel and Distributed Systems. doi:10.1109/TPDS.2015.2401003

    Google Scholar 

  17. Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos, Solitons and Fractals 24:759–765

    Article  MathSciNet  MATH  Google Scholar 

  18. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Proc Letters 18:255–258

    Article  Google Scholar 

  19. Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Information Forensics and Security 7:826–832

    Article  Google Scholar 

  20. Zhang X (2013) Commutative reversible data hiding and encryption. Security and Communication Networks 6:1396–1403

    Article  Google Scholar 

  21. Zhang W, Ma K, Yu N (2014) Reversiblility improve data hiding in encrypted images. Signal Process 94:118–127

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant Nos. 61272540,61272453 and 61232016) , the Anhui Provincial Natural Science Foundation(Grant No. 1508085MF115) and the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shuli Zheng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zheng, S., Li, D., Hu, D. et al. Lossless data hiding algorithm for encrypted images with high capacity. Multimed Tools Appl 75, 13765–13778 (2016). https://doi.org/10.1007/s11042-015-2920-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2920-y

Keywords

Navigation