پنهان‌نگاری معکوس‌پذیر در تصاویر رمز‌شده با استفاده از همبستگی پیکسل‌های مجاور و کدبندی حسابی

نوع مقاله : مقاله پژوهشی

نویسندگان

دانشکده مهندسی برق و کامپیوتر، دانشگاه یزد، یزد، ایران

چکیده

این مقاله روشی در پنهان نگاری معکوس پذیر در تصویر رمز شده را معرفی می کند که از همبستگی پیکسل های مجاور در تصویر بهره می برد. در روش پیشنهادی، تصویر اصلی می تواند با الگوریتم رمز دلخواه رمز شود. بیت هایی با ارزش بیشتر در پیکسل های تصویر به منظور ایجاد فضای خالی برای پنهان نگاری بیت های داده به کار گرفته می شوند. در این رویکرد تصویر به قالب‌های مجزا تقسیم و مرکزی ترین پیکسل در هر قالب به عنوان پیکسل مبنا در نظر گرفته می شود. خطای پیش بینی بین شدت پیکسل مبنا و شدت پیکسل های دیگر در قالب محاسبه و پیش بینی محلی نامیده می شود. این خطا به منظور بدست آوردن یک ویژگی از ظرفیت ذخیره هر قالب تحلیل می گردد. ویژگی های محاسبه شده برای تمام قالب ها توسط کدبندی حسابی، فشرده و ویژگی های فشرده شده به همراه بیت های داده در تصویر تعبیه می شوند. در گیرنده در ابتدا ویژگی های فشرده شده استخراج، سپس نافشردهشده و به منظور بازیابی بدون اتلاف تصویر اصلی و استخراج بیت های داده به کار گرفته می شوند. نتایج آزمایش تایید می کند که روش پیشنهادی روش های جدید در این زمینه را بهبود می دهد.

کلیدواژه‌ها

موضوعات


عنوان مقاله [English]

Reversible Data Hiding in Encrypted Images using Correlation of Neighboring Pixels and Arithmetic Coding

نویسندگان [English]

  • A. Mohammadi
  • M. Nakhkash
Faculty of Electrical and Computer Engineering, Yazd University, Yazd, Iran
چکیده [English]

This paper presents a reversible data hiding method in encrypted image that employs correlation of neighboring pixels in the image. In the proposed method, original image may be encrypted by desire encryption algorithm. More significant bits of the pixels in the image are exploited to vacate room for embedding data bits. In the approach, image is divided into separated blocks and most central pixel of each block is considered as reference one. The prediction error between the intensity of other pixels and reference one is calculated and denoted local prediction. This error is analyzed determining a feature of block embedding capacity. Calculated features for all blocks are compressed employing arithmetic coding and embedded in the image along with data bits. At the recipient, at first, compressed features are extracted, then they are uncompressed and used to lossless reconstruction of the original image and extraction of the data bits. Experimental results confirm that the proposed algorithm outperforms state of the art ones.

کلیدواژه‌ها [English]

  • Encrypted image
  • Correlation
  • Prediction error
  • Reversible data hiding
  • Arithmetic coding
[1] Y.-Q. Shi, X. Li, X. Zhang, H.-T. Wu, and B. Ma, “Reversible data hiding: advances in the past two decades,” IEEE Access, vol. 4, pp. 3210-3237, 2016.
[2] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890-896, Aug. 2003.
[3] Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, Mar. 2006.
[4] T. Kalker, and F. M. Willems, “Capacity bounds and constructions for reversible data-hiding,” in Proc. International Conference on Digital Signal Processing , Santorini, Greece, Greece, 2002, pp. 71-76.
[5] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y. Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 7, pp. 989-999, Jul. 2009.
[6] X. Li, W. Zhang, X. Gui, and B. Yang, “A novel reversible data hiding scheme based on two-dimensional difference-histogram modification,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 7, pp. 1091-1100, Jul. 2013.
[7] C.-H. Yang, and M.-H. Tsai, “Improving histogram-based reversible data hiding by interleaving predictions,” IET Image Processing, vol. 4, no. 4, pp. 223-234, Aug. 2010.
[8] X. Li, B. Yang, and T. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Transactions on Image Processing, vol. 20, no. 12, pp. 3524-3533, Dec. 2011.
[9] P. Tsai, Y.-C. Hu, and H.-L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, vol. 89, no. 6, pp. 1129-1143, Jun. 2009.
[10] S. Xiang, and X. Luo, “Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 28, no. 11, pp. 3099-3110, Nov. 2018.
[11] K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 3, pp. 553-562, Mar. 2013.
[12] Z. Yin, Y. Xiang, and X. Zhang, “Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding,” IEEE Transactions on Multimedia, Aug. 2019.
[13] Y.-C. Chen, T.-H. Hung, S.-H. Hsieh, and C.-W. Shiu, “A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 12, pp. 3332-3343, Dec. 2019.
[14] X. Zhang, J. Long, Z. Wang, and H. Cheng, “Lossless and reversible data hiding in encrypted images with public-key cryptography,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 26, no. 9, pp. 1622-1631, Sep. 2016.
[15] X. Cao, L. Du, X. Wei, D. Meng, and X. Guo, “High capacity reversible data hiding in encrypted images by patch-level sparse representation,” IEEE Transactions on Cybernetics, vol. 46, no. 5, pp. 1132-1143, May, May 2016.
[16] C.-W. Shiu, Y.-C. Chen, and W. Hong, “Encrypted image-based reversible data hiding with public key cryptography from difference expansion,” Signal Processing: Image Communication, vol. 39, pp. 226-233, Nov. 2015.
[17] P. Puteaux, and W. Puech, “An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 7, pp. 1670-1681, Jul. 2018.
[18] S. Yi, and Y. Zhou, “Separable and reversible data hiding in encrypted images using parametric binary tree labeling,” IEEE Transactions on Multimedia, vol. 21, no. 1, pp. 51-64, Jan. 2019.
[19] D. Xu, and R. Wang, “Separable and error-free reversible data hiding in encrypted images,” Signal Processing, vol. 123, pp. 9-21, Jun. 2016.
[20] Z. Yin, B. Luo, and W. Hong, “Separable and error-free reversible data hiding in encrypted image with high payload,” The Scientific World Journal, vol. 2014, Apr. 2014.
[21] W. Zhang, K. Ma, and N. Yu, “Reversibility improved data hiding in encrypted images,” Signal Processing, vol. 94, no. 1, pp. 118-127, Jan. 2014.
[22] F. Huang, J. Huang, and Y.-Q. Shi, “New framework for reversible data hiding in encrypted domain,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 12, pp. 2777-2789, Dec. 2016.
[23] H. Ge, Y. Chen, Z. Qian, and J. Wang, “A high capacity multi-level approach for reversible data hiding in encrypted images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 8, pp. 2285 - 2295, Aug. 2019.
[24] X. Zhang, “Commutative reversible data hiding and encryption,” Security and Communication Networks, vol. 6, no. 11, pp. 1396-1403, 2013.
[25] X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 7, no. 2, pp. 826-832, Apr. 2012.
[26] J. Zhou, W. Sun, L. Dong, X. Liu, O. C. Au, and Y. Y. Tang, “Secure reversible image data hiding over encrypted domain via key modulation,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 26, no. 3, pp. 441-452, Mar. 2016.
[27] Z. Qian, and X. Zhang, “Reversible data hiding in encrypted images with distributed source encoding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 26, no. 4, pp. 636-646, Apr. 2016.
[28] X. Zhang, “Reversible data hiding in encrypted image,” IEEE Signal Processing Letters, vol. 18, no. 4, pp. 255-258, Apr. 2011.
[29] W. Hong, T.-S. Chen, and H.-Y. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Processing Letters, vol. 19, no. 4, pp. 199-202, Apr. 2012.
[30] X. Wu, and W. Sun, “High-capacity reversible data hiding in encrypted images by prediction error,” Signal Processing, vol. 104, pp. 387-400, Nov. 2014.