[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Reversible data hiding in encrypted images has become an effective and popular way to preserve the security and privacy of users’ personal images. Recently, Xiao et al. firstly presented reversible data hiding in encrypted images with use of the modern signal processing technique compressive sensing (CS). However, the quality of decrypted image is not great enough. In this paper, a new method of separable data hiding in encrypted images are proposed by using CS and discrete fourier transform, which takes full advantage of both real and imaginary coefficients for ensuring great recovery and providing flexible payload. Compared with the original work, the proposed method can obtain better image quality when concealing the same embedding capacity. Furthermore, image decryption and data extraction are separable in the proposed method, and the secret data can be extracted relatively accurately.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Candes EJ, Tao T (2006) Near-optimal signal recovery from random projections: universal encoding strategies. IEEE Trans Inf Theory 52(12):5406–5425

    Article  MathSciNet  MATH  Google Scholar 

  2. Gong L, Liu X, Zheng F, Zhou N (2013) Flexible multiple-image encryption algorithm based on log-polar transform and double random phase encoding technique. J Mod Opt 60(13):1074–1082

    Article  Google Scholar 

  3. Hong W, Chen T, Wu H (2012) An improved reversible data hiding in encrypted images using side match. IEEE Sign Proc Lett 19(4):199–202

    Article  Google Scholar 

  4. Hussein B (1990) The fast fourier transform and its applications. Sign Proc Integrated Circuits 149–191

  5. Li M, Xiao D, Peng Z, Nan H (2014) A modified reversible data hiding in encrypted images using random diffusion and accurate prediction. Electron Telecommun Res Ins 36(2):325–328

    Google Scholar 

  6. Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28(1):21–27

    Article  MathSciNet  Google Scholar 

  7. Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding a survey. Proc IEEE Spec Issue Protect Multimed Content 87(7):1062–1078

    Google Scholar 

  8. Puech W, Chaumont M, Strauss O (2008) “A reversible data hiding method for encrypted images”. In: 367 Proceedings of Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, pp 6819E

  9. Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted JPEG bitstream. IEEE Trans Multimed 16(5):1486–1491

    Article  Google Scholar 

  10. Qin C, Chang CC, Hsu TJ (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed Tools Appl 74(15):5861–5872

    Article  Google Scholar 

  11. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164

    Article  Google Scholar 

  12. Ronald B (2003) The two-dimensional fourier transform. Fourier Anal Imaging 140–173

  13. Wang CT, Yu HF (2012) High-capacity reversible data hiding based on multi-histogram modification. Multimed Tools Appl 61(2):299–319

    Article  MathSciNet  Google Scholar 

  14. Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Sec Commun Networks 7(8):1283–1291

    Article  Google Scholar 

  15. Xiao D, Cai H, Wang Y (2015) High-capacity separable data hiding in encrypted image based on compressive sensing. Multimed Tools Appl 75(21):13779–13789

  16. Xiao D, Chen S (2014) Separable data hiding in encrypted image based on compressive sensing. Electron Lett 50(8):598–600

    Article  Google Scholar 

  17. Xiao D, Deng M, Zhu X (2015) A reversible image authentication scheme based on compressive sensing. Multimed Tools Appl 74(18):7729–7752

    Article  Google Scholar 

  18. Zhang X (2011) Reversible data hiding in encrypted images. IEEE Sign Proc Lett 18(4):255–258

    Article  Google Scholar 

  19. Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Info Foren Security 7(2):826–832

    Article  Google Scholar 

  20. Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94(1):118–127

    Article  Google Scholar 

  21. Zhang X, Qian Z, Feng G, Ren Y (2014) Efficient reversible data hiding in encrypted images. J Vis Commun Image Represent 25(2):322–328

    Article  Google Scholar 

  22. Zhou N, Pan S, Cheng S, Zhou Z (2016) Efficient image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121–133

  23. Zhou N, Yang J, Tan C, Pan S, Zhou Z (2015) Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform. Opt Commun 354:112–121

  24. Zhou N, Zhang A, Zheng F, Gong L (2014) Novel image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62:152–160

Download references

Acknowledgments

This work is supported by National Natural Science Foundation of China (Grant Nos. 61402162, 61472131, 61272546), Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20130161120004), Science and Technology Key Projects of Hunan Province (No. 2015TP1004), Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (Grant No. AGK201605).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin Liao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liao, X., Li, K. & Yin, J. Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76, 20739–20753 (2017). https://doi.org/10.1007/s11042-016-3971-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3971-4

Keywords

Navigation