Advancements in Reversible Data Hiding for Encrypted Images

Categories: Technology

Abstract

Digital image processing is a fast-developing arena with increasing applications in science and engineering. One among the most interested field is data hiding in encoded images. The reversibility feature is used in this method. It is an improved version of Zhang’s Reversible Data Hiding method in encrypted images which is proposed already, but the only disadvantage is about bit error and robustness. Reversible data hiding embeds the data into a digitally encrypted image by changing the pixel value for secret communication and the embedded image can be improved to its original state after the removal of the secret data.

Finally, Recovery can be accomplished by examining the block smoothness.

The main target of this application is where the owner of the carrier might not want the other person, including data hider before the data hiding is performed, such as military images or confidential images. This project adopts a better scheme for measuring the smoothness of blocks and uses the Side-Match Scheme to further decrease the error rate of extracted-bits.

Get quality help now
WriterBelle
WriterBelle
checked Verified writer

Proficient in: Technology

star star star star 4.7 (657)

“ Really polite, and a great writer! Task done as described and better, responded to all my questions promptly too! ”

avatar avatar avatar
+84 relevant experts are online
Hire writer

Introduction

Reversible data hiding in images is a method that implants data in digital images by shifting the pixel principles for secret communication, and the embedded images can be re-covered to its unique state afterwards the extraction of the secret data.

Many reversible data hiding methods have been projected recently embeds data bits by expanding the difference of two consecutive pixels uses a lossless compression tech- where is the XOR operation and. Convert exclusive to create extra spaces for transfer data bits changes the bins of image histograms to leave an unfilled bin for data embedment.

Get to Know The Price Estimate For Your Paper
Topic
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Write my paper

You won’t be charged yet!

obtain the encrypted image adopts the difference expansion and histogram shifting for data embedment embeds data by shifting the histogram of prediction errors while considering the local activity of pixels to extra improve the quality of stego image. Traditionally, data hiding is used for secret communication.

In some submissions, the embedded carriers are further encrypted to prevent the transporter from being analysed to reveal the presence of the embedment. Other applications could be for when the owner of the carrier might not want the other person, including data hider, to know the content of the carrier earlier data hiding is performed, such as military images or confidential medical images. In this case, the content owner must translate the content before passing to the data hider for data embedded message and recover the original image.

Recent researchers have worked on RDH to decrease the error obtained during the process of extraction. Zhang proposed an RDH scheme which splits the encrypted image into blocks of desired sizes and embeds additional data by flipping the 3 LSB’s. Excerpts data and cover image based on the smoothness of the image block. Hong enhanced smoothness calculation and proposed side matching mechanism to decreases the number of bits incurred error. Considering the drawbacks of Zhang’s method that abandonments the four boundaries in a block and Hong’s method taking the successive pixels, Extracted-bit error rate (EER) on Liao’s method decreases monotonically with the increase in block size. We propose a method which varies from these methods in the procedure of selecting pixels during embedding and reductions error of extraction.

To encrypt the cover image report embedding is performed. The cover is successful to encrypted using the bitwise exclusive-or (XOR) operator to every bit of pixels using an encryption key.

Related Work

The lossless data embedding structure for encoded images familiarized in has two distinct versions: a combined method i.e., where the hidden data extraction and the image restoration are both done after the image was decrypted and a separate method i.e., where the hidden data can be decoded from the encrypted image, but the host image can only be restored after decryption

Let C be the encrypted form of image I. Each bit plane of C, Ct, (1 ≤ t ≤ 8) is computed as:

Ct = It ⊕ rt (1)

anywhere ⊕ is the exclusive-or operator and r is a standard pseudorandom bitstream sequence made by an encryption key.

A. The joint method of [8]

This method embeds L bits in nL pixels of the encrypted image, n ≥ 1. First nL pixels of C are selected based on a data hiding key. After an encrypted pixel C(I,,j) is chosen, the pixels that form its calculation context (Figure 1.b) cannot be selected for data embedding. A data bit is fixed by flipping the t bit of n designated pixels:

0 (∼Ct(i, j), if b = 1,

Ct(i, j) = (2) Ct(i,j),

if b = 0. where ∼ is the not operator and b ∈ {0,1} is the hidden bit.

If the user has admission to the data hiding key, the entrenched data can be extracted. The null watermarked pixels are first designated using the hiding key. For each of those pixels, I00(i, j) is made by flipping It0(i, j). Then Iˆ(i, j), the predicted value of I(i, j) (a subjective average on the prediction context), is used to determine b, the hidden bit inserted in each group of n pixels:

where. X at x >= 0

if x < 0

If b = 1, all n pixels in the current group are substituted with their corresponding I00(i, j) value, otherwise the pixels continue unchanged. Both n (the number of pixels in a group) and t (the bit plane used for data hiding) have a direct influence on the exactness of equation (4). A larger value for n recovers the precision of (4) but reduces the available space for the hidden data. Similarly, a larger value for t also advances the precision of (4), but the watermarking distortion increases.

B. The separate method of [8]

This method embeds L additional bits in L pixels (as opposed to nL pixels) selected based on the hiding key. The secret bit b is inserted directly in the host pixel C(i,j) by substituting its t bit:

A user with access to the hiding key can decode the hidden data by reading the t bits of the L selected pixels. After (3) is used to decrypt I0(i,j), the closest value to Iˆ(i,j) between I0(i,j) and I00(i,j) is selected as the original value of I(i,j).

Note that all separate lines can correctly decipher the hidden data, but the returning step remains affected by the possibility of errors. Also note that this approach requirements a larger value for t in order to compensate for the embedding in a single pixel instead of a group of n. In [8] the author recommends t ≥ 7 and adds a filtering stage after decryption in order to remove the distortions announced by the watermark. This additional riddling step draws attention to the existence of the hidden data in the encrypted image and represents a grave security risk. The proposed scheme in Section III-B does not have this drawback.

Proposed Method

In this technique, the analysing of block smoothness is vital to obtain a accurate data from the data image. However, the four borders of each block do not join the calculation of block smoothness. This may decrease the rate of correctness of data extraction, especially when the block size is small. For example, for a block of size 8 8, there are 64 pixels and around 43.75% of them (28 pixels) are in the four borders. These border pixels are not employed to calculate the block smoothness, and the percentage is increased as the block size decreased.

However, extracts the embedded bits by evaluating the smoothness of a single block. However, flipping 3 LSBs of these complex blocks will not cause a significant increase in complexness. Based on these observations, this letter proposes an improved version for a better estimation of block smoothness. In the new smoothness estimation, the summation of the absolute of two neighbouring pixels is employed. Moreover, the extraction and recovery are performed starting from the most noticeable changes in smoothness to the least ones. Besides, we also adopt the side-match technique to evaluate the block smoothness by concatenating the border of recovered blocks to the unrecovered blocks. The data encryption and data embedding process is the same as [9]. Therefore, we address only the calculation of smoothness and the process of image recovery.

Calculation of Block Smoothness

The smoothness of an image block can be evaluated by calculating the absolute difference of neighbouring pixels. The larger the summation of absolute differences, the more complex the image blocks are. Therefore, we estimate the block smoothness by calculating the summation of the vertical absolute differences and horizontal absolute differences of pixels in image blocks using the following equation: were represents the pixel values located at position of a given image block of size. Equation ully exploits the absolute difference between two consecutive pixels in both vertical and horizontal directions and thus, the smoothness of blocks can be better estimated.

Data Extraction and Image Recovery Using Side Match

Let the cover image be I and the encrypted image with message embedded be I(n). firstly, the data image is taken to embed the text, and which resulted as a data image. The text or message is going to hide using of bit plane analysis i.e., 1 to 8-bit plane. Using of pixel arrangement when we give the bit plane as 1 then the text is going to hide at upper left column of data image and by giving 8th bit plane the text is going to embed at the lower right side of image.

For the 4rth level of security the data image is embedded with cover image using the serial key combination. By that it results to the encoding the cover image in zigzag manner. By the using of same serial key combination the decrypter can decrypt the transferred data of image. By the purpose of cloud computing and high official military defence purposes the size capability of encrypted data is high.

But the precaution we should taken During implementation of hiding the text in the data image and extraction of text from the same data image an in-depth analysis was carried out to prevent the complexity. During embedding the data image into the cover image and while extracting the data image from the cover object an utmost care was taken with extreme supervision to extract the data image from the cover image without any loses.

Experimental Study

We can use the image level of size 512 x 512, counting Lena, Barbara as the test image. To demonstrate the performance of the proposed method, we take Lena as an example. Fig d and e represented a compressed and encoded image of cover image (Barbara) which does not easily encode with any includer and we can see the proposed method can be recovers the original image block i.e., more accurately than the existing methods.

Table 1: Performance Comparison

Image Method EER Quality Improvement
Lena Proposed 0.02% High
Zhang's Method 0.05% Moderate
Barbara Proposed 0.01% Very High
Zhang's Method 0.04% Low

Conclusion

Reversible data hiding (RDH) is sketch more attention now-a-days because of its aptitude to recover the cover deprived of any distortion. Encryption is also used along with RDH for confidentiality protection. In the currently available approaches RDH is implemented in encrypted images by vacating space after encryption. The verified efficiency of the proposed technique can thus help reducing error while securing data at the third-party center. The proposed method can realize real reversibility, separate data extraction and great improvement on the quality of the decrypted image.

In the present systems data is embedded plain text. To increase the security some symmetric key algorithms can be used for encrypting the data to be embedded so that the encrypted data can be embedded in the image. During the first extraction at the receiver side encrypted data is retrieved at the output.

References

  1. Johnson, z. daric, s, jaidia information hiding. Steganography and watermarking – attacks and counter measures: Kluwer academic press. norwall 2000
  2. J. Tian, “Reversible data embedding using a difference expansion,” Circuits and Systems for Video Technology, IEEE Transactions on, vol. 13, no. 8, pp. 890–896, 2003.
  3. M. Celik, G. Sharma, A. Tekalp, and E. Saber, “Lossless generalized lsb data embedding,” Image Processing, IEEE Transactions on, vol. 14, no. 2, pp. 253–266, 2005.
  4. Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” Circuits and Systems for Video Technology, IEEE Transactions on, vol. 16, no. 3, pp. 354–362, 2006.
  5. D. Thodi and J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” Image Processing, IEEE Transactions on, vol. 16, no. 3, pp. 721–730, 2007.
  6. L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong, “Reversible image watermarking using interpolation technique,” Information Forensics and Security, IEEE Transactions on, vol. 5, no. 1, pp. 187–193, 2010.
  7. W. Hong, T.-S. Chen, and H.-Y. Wu, “An improved reversible data hiding in encrypted images using side match,” Signal Processing Letters, IEEE, vol. 19, no. 4, pp. 199–202, 2012.
  8. S.-W. Jung, L. T. Ha, and S.-J. Ko, “A new histogram modification based reversible data hiding algorithm considering the human visual system,” Signal Processing Letters, IEEE, vol. 18, no. 2, pp. 95–98, 2011.
Updated: Feb 21, 2024
Cite this page

Advancements in Reversible Data Hiding for Encrypted Images. (2024, Feb 21). Retrieved from https://studymoose.com/document/advancements-in-reversible-data-hiding-for-encrypted-images

Live chat  with support 24/7

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment