Abstract

In this paper, we propose a separable reversible data hiding method in encrypted image (RDHEI) based on two-dimensional permutation and exploiting modification direction (EMD). The content owner uses two-dimensional permutation to encrypt original image through encryption key, which provides confidentiality for the original image. Then the data hider divides the encrypted image into a series of non-overlapping blocks and constructs histogram of adjacent encrypted pixel errors. Secret bits are embedded into a series of peak points of the histogram through EMD. Direct decryption, data extraction and image recovery can be performed separately by the receiver according to the availability of encryption key and data-hiding key. Different from some state-of-the-art RDHEI methods, visual quality of the directly decrypted image can be further improved by the receiver holding the encryption key. Experimental results demonstrate that the proposed method outperforms some state-of-the-art methods in embedding capacity and visual quality.

Highlights

  • In the era of big data, data transmission and exchange have become easier than ever before.data security is confronted with more risks [1,2]

  • A separable reversible data hiding method in encrypted image (RDHEI) method based on two-dimensional permutation and exploiting modification direction (EMD) has

  • We first design an image encryption method which consists of block permutation has been proposed

Read more

Summary

Introduction

In the era of big data, data transmission and exchange have become easier than ever before. Data security is confronted with more risks [1,2]. Image is a common form of data and suffers the same affliction. There are two effective methods to protect image data, which are image encryption and image data hiding. Image encryption converts a meaningful original image into an unrecognized one to prevent information leakage [3,4]. Different from image encryption, image data hiding modifies the pixel values of a cover image imperceptibly to embed secret data into the cover image so that the transmission of stego-image does not attract attacker’s interest [5,6,7,8,9]

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call