Abstract

Separable Reversible Data Hiding in Encryption Image (RDH-EI) has become widely used in clinical and military applications, social cloud and security surveillance in recent years, contributing significantly to preserving the privacy of digital images. Aiming to address the shortcomings of recent works that directed to achieve high embedding rate by compensating image quality, security, reversible and separable properties, we propose a two-tuples coding method by considering the intrinsic adjacent pixels characteristics of the carrier image, which have a high redundancy between high-order bits. Subsequently, we construct RDH-EI scheme by using high-order bits compression, low-order bits combination, vacancy filling, data embedding and pixel diffusion. Unlike the conventional RDH-EI practices, which have suffered from the deterioration of the original image while embedding additional data, the content owner in our scheme generates the embeddable space in advance, thus lessening the risk of image destruction on the data hider side. The experimental results indicate the effectiveness of our scheme. A ratio of 28.91% effectively compressed the carrier images, and the embedding rate increased to 1.753 bpp with a higher image quality, measured in the PSNR of 45.76 dB.

Highlights

  • In recent years, the problem of information security has become increasingly prominent, and privacy has attracted much attention

  • This paper presents an Reversible Data Hiding in Encryption Image (RDH-EI) scheme with two-tuples coding that aimed to improve the low embedding rate and security level of recent Vacating Room by Encryption (VRBE)-based Reversible Data Hiding (RDH)-EI schemes

  • Our RDH-EI scheme consists of five processes: high-order bits compression with two-tuples coding method, low-order bits combination, vacancy filling, data embedding, and pixel diffusion

Read more

Summary

Introduction

The problem of information security has become increasingly prominent, and privacy has attracted much attention. Unlike traditional RDH practices, the content owners of clinical, military, security, and social cloud services providers are urged to hide the sensitive details of original images, leading to the birth of Reversible Data Hiding in Encryption Image (RDH-EI) [9]. The rule of thumb is that the embedded sensitive data must not affect the process of accurately recovering encrypted medical images [5,10,11] Otherwise, it may cause misdiagnosis, ineffective treatment and resulting in unimaginable severe effects. The naïve approach passes the user’s data hiding key to the cloud service providers to decrypt the encrypted image It will incur the disclosure of user privacy.

RDH-EI and Related Works
Coding Structure of the Encrypted Image
Calculate the High-Order Bits and Low-Order Bits of the Image Setup
High-Order Bits Compression with Two-Tuples Coding Method
Compressed Redundancy Space-Filling Bits
Pixel Diffusion
Embedding Additional Data
Embedded Capacity
Experimental Results
Correlation Analysis
Comparison of the Proposed RDH-EI with Related Works
Complexity Analysis
Security Analysis
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call