Skip to main content
Erschienen in: Pattern Analysis and Applications 1/2023

05.08.2022 | Theoretical Advances

Separable robust data hiding in encrypted image based on continuous quadrant tree and 2Bin N-nary

verfasst von: Shi Hui, Hu Baoyue, Chen Meihan, Li Yanni, Ren Yonggong

Erschienen in: Pattern Analysis and Applications | Ausgabe 1/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data hiding is a noteworthy research topic in digital technology for years. It can be used for copyright protection, authentication, content-ownership verification, and sending patient information. Focusing on how to improve the security, capacity, visual quality and robustness, a separable robust data hiding in encrypted image based on Continuous Quadrant Tree (CQT) and 2Bin N-nary is proposed. In this work, the definition of CQT, constraints of the sub-tree roots, generation and traversal of CQT are proposed for the first time. To achieve security, matrix traversal, CQT and rotation encryption are combined. When select embedding interval, a histogram preprocessing algorithm based on pixel fluctuation is presented. This paper achieves separable decryption and extraction. Experimental results demonstrate that the capacity has been improved by 50–70% compared with the similar scheme. It not only achieves high security and high visual quality, but also is robust to various attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat NiZ P, ShiY Q, AnsariN SuW (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16:354–362CrossRef NiZ P, ShiY Q, AnsariN SuW (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16:354–362CrossRef
2.
Zurück zum Zitat TsaiP HuYC, YehH L (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89:1129–1143CrossRef TsaiP HuYC, YehH L (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89:1129–1143CrossRef
3.
Zurück zum Zitat ZhangW M, HuX C, LiX L, YuN H (2013) Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans Image Process 22:2775–2785CrossRef ZhangW M, HuX C, LiX L, YuN H (2013) Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans Image Process 22:2775–2785CrossRef
5.
Zurück zum Zitat Li X, Zhang W, Gui X, Yang B (2017) Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forens. Secur 10:2016–2027 Li X, Zhang W, Gui X, Yang B (2017) Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forens. Secur 10:2016–2027
6.
Zurück zum Zitat WangJ X, MaoN X, ChenX NQ, WangC T, ShiY Q (2019) Multiple histograms based reversible data hiding by using FCM clustering. Signal Process 159:193–203CrossRef WangJ X, MaoN X, ChenX NQ, WangC T, ShiY Q (2019) Multiple histograms based reversible data hiding by using FCM clustering. Signal Process 159:193–203CrossRef
7.
Zurück zum Zitat WengS W, TanW QuB, PanJ S (2021) Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm. Inf Sci 549:13–33MathSciNetCrossRef WengS W, TanW QuB, PanJ S (2021) Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm. Inf Sci 549:13–33MathSciNetCrossRef
8.
Zurück zum Zitat LiM LiY (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190–196CrossRef LiM LiY (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190–196CrossRef
9.
Zurück zum Zitat XiongL Z, DongD P, XiaZ H, ChenX Y (2018) High-capacity reversible data hiding for encrypted multimedia data with somewhat homomorphic encryption. IEEE Access 6:60635–60644CrossRef XiongL Z, DongD P, XiaZ H, ChenX Y (2018) High-capacity reversible data hiding for encrypted multimedia data with somewhat homomorphic encryption. IEEE Access 6:60635–60644CrossRef
10.
Zurück zum Zitat Xiang S, Kim HJ, Huang J (2008) Invariant image watermarking based on statistical features in the low-frequency domain. IEEE Trans Circ Syst Video Technol 18:777–790CrossRef Xiang S, Kim HJ, Huang J (2008) Invariant image watermarking based on statistical features in the low-frequency domain. IEEE Trans Circ Syst Video Technol 18:777–790CrossRef
11.
Zurück zum Zitat ChenD GB, PengH AL, FengJ J (2010) Histogram modification based robust image watermarking approach. Int J Multimedia Intell Secur 1:153–168 ChenD GB, PengH AL, FengJ J (2010) Histogram modification based robust image watermarking approach. Int J Multimedia Intell Secur 1:153–168
12.
Zurück zum Zitat GaoX B, TaoD C, LiX L (2010) Local histogram based geometric invariant image watermarking. Signal Process 90:3256–3264CrossRef GaoX B, TaoD C, LiX L (2010) Local histogram based geometric invariant image watermarking. Signal Process 90:3256–3264CrossRef
13.
Zurück zum Zitat HeX S, ZhuT YB (2015) A geometrical attack resistant image watermarking algorithm based on histogram modification. Multidimension Syst Signal Process 26:291–306MathSciNetCrossRef HeX S, ZhuT YB (2015) A geometrical attack resistant image watermarking algorithm based on histogram modification. Multidimension Syst Signal Process 26:291–306MathSciNetCrossRef
14.
Zurück zum Zitat Wang JJ, LiG Y, XiaG E, SunZ R (2020) A separable and reversible data hiding algorithm in encrypted domain based on image interpolation space. Acta Electron Sin 48:92–100 Wang JJ, LiG Y, XiaG E, SunZ R (2020) A separable and reversible data hiding algorithm in encrypted domain based on image interpolation space. Acta Electron Sin 48:92–100
15.
Zurück zum Zitat Wang S, Cui C, Niu XM (2017) A novel DIBR 3D image watermarking algorithm resist to geometrical attacks. Chin J Electron 26:1184–1193CrossRef Wang S, Cui C, Niu XM (2017) A novel DIBR 3D image watermarking algorithm resist to geometrical attacks. Chin J Electron 26:1184–1193CrossRef
16.
Zurück zum Zitat Yue Z, Li ZC, Yang XY, You FC, Liu FP (2020) A histogram-based 2Bin M-ary image digital watermarking algorithm. Acta Electron Sin 48:531–537 Yue Z, Li ZC, Yang XY, You FC, Liu FP (2020) A histogram-based 2Bin M-ary image digital watermarking algorithm. Acta Electron Sin 48:531–537
17.
Zurück zum Zitat Zong TR, Xiang Y, Natgunanathan I (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 25:717–729CrossRef Zong TR, Xiang Y, Natgunanathan I (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 25:717–729CrossRef
18.
Zurück zum Zitat Feng BW, Weng J, Lu W (2017) Improved algorithms for robust histogram shape-based image watermarking. International Workshop on Digital Watermarking. Springer, Berlin, pp 275–289 Feng BW, Weng J, Lu W (2017) Improved algorithms for robust histogram shape-based image watermarking. International Workshop on Digital Watermarking. Springer, Berlin, pp 275–289
19.
Zurück zum Zitat Pan HL, Lei YM, Jian C (2018) Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP J Image Video Process 1:142–152CrossRef Pan HL, Lei YM, Jian C (2018) Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP J Image Video Process 1:142–152CrossRef
20.
Zurück zum Zitat Dua M, Kumar A, Garg A (2022) Multiple image encryption approach using non linear chaotic map and cosine transformation. Int J Inf Technol 14(3):1627–1641 Dua M, Kumar A, Garg A (2022) Multiple image encryption approach using non linear chaotic map and cosine transformation. Int J Inf Technol 14(3):1627–1641
21.
Zurück zum Zitat Wadi SM, Zainal N (2013) Rapid encryption method based on AES algorithm for grey scale HD image encryption. Procedia Technol 11(3):51–56CrossRef Wadi SM, Zainal N (2013) Rapid encryption method based on AES algorithm for grey scale HD image encryption. Procedia Technol 11(3):51–56CrossRef
22.
Zurück zum Zitat Wu JJ, Liu ZJ, Wang JC (2021) A compact image encryption system based on Arnold transformation. Multimedia Tools Appl 80(6):2647–2661CrossRef Wu JJ, Liu ZJ, Wang JC (2021) A compact image encryption system based on Arnold transformation. Multimedia Tools Appl 80(6):2647–2661CrossRef
23.
Zurück zum Zitat Zhu G, Zhang X (2008) Mixed image element encryption algorithm based on an elliptic curve cryptosystem. J Electron Imaging 17(2):023007CrossRef Zhu G, Zhang X (2008) Mixed image element encryption algorithm based on an elliptic curve cryptosystem. J Electron Imaging 17(2):023007CrossRef
24.
Zurück zum Zitat Yuan X, Zhang LH, Chen J (2019) Multiple-image encryption scheme based on ghost imaging of Hadamard matrix and spatial multiplexing. Appl Phys B 125:174CrossRef Yuan X, Zhang LH, Chen J (2019) Multiple-image encryption scheme based on ghost imaging of Hadamard matrix and spatial multiplexing. Appl Phys B 125:174CrossRef
25.
Zurück zum Zitat Lv XP, Liao XF, Yang B (2018) Bit-level plane image encryption based on coupled map lattice with timevarying delay. Mod Phys Lett B 32(10):1850124CrossRef Lv XP, Liao XF, Yang B (2018) Bit-level plane image encryption based on coupled map lattice with timevarying delay. Mod Phys Lett B 32(10):1850124CrossRef
26.
Zurück zum Zitat Gan ZH, Chai XL, Yuan K (2018) A novel image encryption algorithm based on LFT based S-boxes and chaos. Multimed Tools Appl 77(7):8759–8783CrossRef Gan ZH, Chai XL, Yuan K (2018) A novel image encryption algorithm based on LFT based S-boxes and chaos. Multimed Tools Appl 77(7):8759–8783CrossRef
27.
Zurück zum Zitat Wang X, Li Z (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng 115:107–118CrossRef Wang X, Li Z (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng 115:107–118CrossRef
28.
Zurück zum Zitat Wang XY, Lin SJ, Li Y (2021) Bit-level image encryption algorithm based on BP neural network and gray code. Multimedia Tools Appl 80:11655–11670CrossRef Wang XY, Lin SJ, Li Y (2021) Bit-level image encryption algorithm based on BP neural network and gray code. Multimedia Tools Appl 80:11655–11670CrossRef
29.
Zurück zum Zitat Nandy N, Banerjee D, Pradhan C (2021) Color image encryption using DNA based cryptography. Int J Inf Technol 13:533–540 Nandy N, Banerjee D, Pradhan C (2021) Color image encryption using DNA based cryptography. Int J Inf Technol 13:533–540
30.
Zurück zum Zitat Hanis S, Amutha R (2019) A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95:421–432CrossRef Hanis S, Amutha R (2019) A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95:421–432CrossRef
Metadaten
Titel
Separable robust data hiding in encrypted image based on continuous quadrant tree and 2Bin N-nary
verfasst von
Shi Hui
Hu Baoyue
Chen Meihan
Li Yanni
Ren Yonggong
Publikationsdatum
05.08.2022
Verlag
Springer London
Erschienen in
Pattern Analysis and Applications / Ausgabe 1/2023
Print ISSN: 1433-7541
Elektronische ISSN: 1433-755X
DOI
https://doi.org/10.1007/s10044-022-01096-x

Weitere Artikel der Ausgabe 1/2023

Pattern Analysis and Applications 1/2023 Zur Ausgabe

Premium Partner