Abstract

Reversible data hiding in encrypted images (RDHEI) is a technology which embeds secret data into encrypted images in a reversible way. In this paper, we proposed a novel high-capacity RDHEI method which is based on the compression of prediction errors. Before image encryption, an adaptive linear regression predictor is trained from the original image. Then, the predictor is used to obtain the prediction errors of the pixels in the original image, and the prediction errors are compressed by Huffman coding. The compressed prediction errors are used to vacate additional room with no loss. After image encryption, the vacated room is reserved for data embedding. The receiver can extract the secret data and recover the image with no errors. Compared with existing approaches, the proposed method efficiently improves the embedding capacity.

Highlights

  • Reversible data hiding (RDH) is a technology that allows the reversible embedding of secret data into various carriers with no obvious distortion [1,2]

  • Methods have been proposed that allow reversible data hiding in encrypted images, which allows the cloud to embed secret data into encrypted images reversibly without image decryption

  • The proposed Reversible data hiding in encrypted images (RDHEI) methods can be classified into three categories, i.e., (1) reserving room before image encryption (RRBE), (2)

Read more

Summary

Introduction

Reversible data hiding (RDH) is a technology that allows the reversible embedding of secret data into various carriers (such as digital images, texts, and videos) with no obvious distortion [1,2]. With the development of cloud services, more and more images are being stored and addressed in the cloud instead of user terminals. This brings the problem of privacy protection for the users. Methods have been proposed that allow reversible data hiding in encrypted images, which allows the cloud (data hider) to embed secret data into encrypted images reversibly without image decryption. The proposed RDHEI methods can be classified into three categories, i.e., (1) reserving room before image encryption (RRBE), (2)

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call