Separable Reversible Data Hiding in Encrypted Images for Remote Sensing Images
Abstract
:1. Introduction
- An intra-block pixel classification compression is proposed that combines MSB compression with differential compression and, finally, reserves hidden space to improve transmission effectiveness;
- An entropy-retained method is proposed that ensures the encrypted cover image does not increase entropy after data embedding, thereby improving transmission security;
- A marker information embedding mode that combines a forward “Z” shape and a reverse “Z” shape is proposed before and after encryption, enabling the receiver to achieve complete separability, which is beneficial for the receiver to receive cover image data and secret data with different permissions, improving receiver flexibility and data security;
- There is no need for secret data extraction, and the decrypted cover image can be recovered without distortion. Thus, complete reversibility can be achieved.
2. Related Works
2.1. MSB Processing
2.2. Data Self-Embedding
2.3. The Cover Image Decryption
3. Proposed Algorithm
3.1. Processing Steps for the Sender
3.1.1. Preprocessing
- (a)
- Auxiliary data. This includes the header data (total length of auxiliary data Laux, parameters α (2 bits), β (4 bits), m (3 bits), nf (4 bits)), CS1, CS2, MSB0, and partial Maps data.
- (b)
- Embedding direction and position. The position follows the forward “Z” shape, starting from the top lefthand corner. Embed m MSB bits in x1 and lower 7 bits in PE pixels for each group. Because the lower 7 bits in PE pixels are fixed, Laux, α, β, m, and nf must be embedded in the frontmost x2 (PE pixels).
- (c)
- Embedding process. Firstly, according to α and β, embed Maps data map1, map2, and map3 into the MSB of x2–x4. Then, for x1, directly embed m bits and then judge the MSB of x2–x4. If it is 1, embed the 7-bit data; otherwise, skip the pixel. In this way, all auxiliary data mentioned in step (a) are embedded into the cover image before encryption.
3.1.2. Encryption
3.1.3. Data Embedding
- (a)
- The data to be embedded. They contain the header data (total length L, parameters α, β, m), the remaining Maps data, and secret data S.
- (b)
- Embedding direction and position. Because the self-embedding of auxiliary data has been completed in the preprocessing stage, and some PE pixels have been used, a reverse “Z” direction processing is adopted to facilitate extraction, as shown in Figure 5. This section starts from the bottom righthand corner of the encrypted image based on the remaining Maps data. Embed m MSB bits in x1 and the lower 7 bits in PE pixels. The pixels in the two groups shown in Figure 5 belong to PE pixels, so both are embedded with the data. Similarly, L, α, β, and m must be embedded in x2 (PE).
- (c)
- Embedding process. This is similar to the self-embedding process. According to α and β, embed the remaining Maps data into the MSB bits of encrypted pixels. Then, for x1, directly embed m MSB bits and then judge the MSB of x2–x4. If it is 1, embed the data; otherwise, skip the pixel.
3.2. Processing Steps for the Receiver
3.2.1. The Receiver Only Owns the Hidden Key Kd
- (a)
- According to the MSB marker (Maps data) of x2, the header data (L, α, β, m) can be extracted from the PE pixels of x2. Then, based on these data, the length of data to be extracted, the positions of groups involved, and the pixels can be determined. Here, the header data with a fixed length are extracted from the x2 (when MSB of x2 is 1) of the first group in each block.
- (b)
- Based on the specific groups and pixel positions determined in (a), by judging the MSB marker, the pixels are divided into PE pixels and NPE pixels. Then, extract all secret data from low 7 bits of PE pixels and the high m MSB bits of x1 in the corresponding groups. According to the rules designed by the sender, except for fixed header data, the remaining data are secret data.
3.2.2. The Receiver Only Owns the Key Ke
- (a)
- The key Ke is used to directly decrypt the received image to obtain the preliminary decrypted image De1. Because the decryption operation is reversible, only the pixels embedded in the data are distorted, and other pixels can be completely restored.
- (b)
- Then, process De1 in groups of 4 pixels. The process of extracting data is the same as in Section 3.2.1, where auxiliary data are sequentially extracted. According to the formatting of the embedded data in Figure 4, the extracted data are classified into the header data (the length data Laux and parameters (α, β, m, nf)) and other stream data (CS1, CS2, MSB0).
- (c)
- Recover original pixels using auxiliary data based on De1. For PE pixels and x1, firstly, decompress the MSB stream CS2 through run length decoding to obtain the original MSBm data, and replace high m bits of x1 with MSBm to recover x1; then, based on the parameter nf, the difference compressed bitstream CS1 is decompressed and restored; next, combine x1 and CS1. Other pixels x2–x4 belonging to PE pixels within the group can be restored using the inverse process of Formula (2). For NPE pixels, use MSB0 to replace the MSB of NPE pixels to restore original values. This stage is symmetrical with the preprocessing stage, so the pixels are completely reversible without distortion.
3.3. An Example of the Proposed Algorithm
- (a)
- Processing steps for the sender
- (b)
- Processing steps for the receiver
4. Experimental Results and Discussion
4.1. Entropy
4.2. Embedding Capacity
4.3. Decryption Quality
4.4. Tests on Other Datasets
4.5. Discussion
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Conflicts of Interest
References
- Marta, B.; Zbigniew, P. Efficient Video Watermarking Algorithm Based on Convolutional Neural Networks with Entropy-Based Information Mapper. Entropy 2023, 25, 284. [Google Scholar] [CrossRef]
- Samar, K.K.; Monalisa, S.; Raghunandan, K.R.; Sahu, A.K. Secure Reversible Data Hiding Using Block-Wise Histogram Shifting. Electronics 2023, 12, 1222. [Google Scholar] [CrossRef]
- Zhu, L.H.; Zhou, Q. A Robust lossless data hidden transmission method for satellite remote sensing image. J. Astronaut. 2015, 36, 315–323. [Google Scholar] [CrossRef]
- Araghi, T.K.; Manaf, A.A. An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. Future Gener. Comput. Syst. 2019, 101, 1223–1246. [Google Scholar] [CrossRef]
- Anggriani, K.; Chiou, S.F.; Wu, N.I.; Hwang, M.S. High imperceptible data hiding Method Based on Combination Theory for AMBTC Compressed Images. Appl. Sci. 2023, 13, 7050. [Google Scholar] [CrossRef]
- Hui, Z.; Zhou, Q. A novel high payload steganography scheme based on absolute moment block truncation coding. Multimed. Tools. Appl. 2020, 79, 24241–24264. [Google Scholar] [CrossRef]
- Zhang, X.P. Reversible data hiding in encrypted image. IEEE Signal Process Lett. 2011, 18, 255–258. [Google Scholar] [CrossRef]
- Zhang, X.P.; Qian, Z.X.; Feng, G.R.; Ren, Y. Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image Represent. 2014, 25, 322–328. [Google Scholar] [CrossRef]
- Qian, Z.X.; Zhang, X.P. Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans. Circuits Syst. Video Technol. 2016, 26, 636–646. [Google Scholar] [CrossRef]
- Panchikkil, S.; Vegesana, S.P.; Manikandan, V.M.; Donta, P.K.; Maddikunta, P.K.R.; Gadekallu, T.R. An Ensemble Learning Approach for Reversible Data Hiding in Encrypted Images with Fibonacci Transform. Electronics 2023, 12, 450. [Google Scholar] [CrossRef]
- Chi, H.X.; Chang, C.C.; Wang, X.; Lin, C.C. Hiding and Extracting Important Information in Encrypted Images by Using the Transformation of All Possible Permutations and VQ Codebook. Electronics 2022, 11, 3475. [Google Scholar] [CrossRef]
- Panchikkil, S.; Manikandan, V.M.; Zhang, Y.D. An efficient spatial transformation-based entropy retained reversible data hiding scheme in encrypted images. Optik 2022, 261, 169211. [Google Scholar] [CrossRef]
- Panchikkil, S.; Manikandan, V.M.; Zhang, Y.D.; Wang, S. A Multi-Directional Pixel-Swapping Approach (MPSA) for Entropy-Retained Reversible Data Hiding in Encrypted Images. Entropy 2023, 25, 563. [Google Scholar] [CrossRef]
- Malik, A.; He, P.S.; Wang, H.X.; Khan, A.N.; Pirasteh, S.; Abdullahi, S.M. High-capacity reversible data hiding in encrypted images using multi-layer embedding. IEEE Access 2020, 8, 148997–149010. [Google Scholar] [CrossRef]
- Xu, D.W.; Su, S.B. Reversible data hiding in encrypted images with separability and high embedding capacity. Signal Process Image Commun. 2021, 95, 116274. [Google Scholar] [CrossRef]
- Liu, Z.L.; Pun, C.M. Reversible data hiding in encrypted images using chunk encryption and redundancy matrix representation. IEEE Trans. Dependable Secur. Comput. 2020, 19, 1382–1394. [Google Scholar] [CrossRef]
- Wang, Y.M.; Cai, Z.C.; He, W.G. High capacity reversible data hiding in encrypted image based on intra-block lossless compression. IEEE Trans. Multimed. 2021, 23, 1466–1473. [Google Scholar] [CrossRef]
- Tang, Z.J.; Pang, M.Y.; Yu, C.Q.; Fan, G.; Zhang, X. Reversible data hiding for encrypted image based on adaptive prediction error coding. IET Image Process 2021, 15, 2643–2655. [Google Scholar] [CrossRef]
- Anushiadevi, R.; Padmapriya, P.; Rayappan, J.B.B.; Amirtharajan, R. A high payload separable reversible data hiding in cipher image with good decipher image quality. J. Intell. Fuzzy Syst. 2020, 38, 6403–6414. [Google Scholar] [CrossRef]
- Li, J.X.; Liang, X.Y.; Dai, C.Y.; Xiang, S. Reversible Data Hiding Algorithm in Fully Homomorphic Encrypted Domain. Entropy 2019, 21, 625. [Google Scholar] [CrossRef]
- Ma, K.D.; Zhang, W.M.; Zhao, X.F.; Yu, N.; Li, F. Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 2013, 8, 553–562. [Google Scholar] [CrossRef]
- Qin, C.; Zhang, W.; Cao, F.; Zhang, X.; Chang, C.C. Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Process. 2018, 153, 109–122. [Google Scholar] [CrossRef]
- Tsai, Y.Y.; Liu, H.L.; Kuo, P.L.; Chan, C.S. Extending multi-msb prediction and huffman coding for reversible data hiding in encrypted HDR images. IEEE Access 2022, 10, 49347–49358. [Google Scholar] [CrossRef]
- Chen, F.; Yuan, Y.; He, H.J.; Tian, M.; Tai, H.M. Multi-msb compression based reversible data hiding scheme in encrypted images. IEEE Trans. Circuits Syst. Video Technol. 2021, 31, 905–916. [Google Scholar] [CrossRef]
- Wu, H.B.; Li, F.Y.; Qin, C.; Wei, W. Separable reversible data hiding in encrypted images based on scalable blocks. Multimed. Tools Appl. 2019, 78, 25349–25372. [Google Scholar] [CrossRef]
- Liu, R.H.; Zhou, Q. Reversible data hiding in encrypted images based on the mixed multi-bit layer embedding strategy. Appl. Sci. 2023, 13, 5696. [Google Scholar] [CrossRef]
- Qiu, Y.Q.; Cai, C.H.; Zeng, H.Q.; Feng, G.; Lin, X.D.; Qian, Z.X. Joint reversible data hiding in encrypted images with the self-correcting ability. J. Xidian Univ. 2021, 48, 107–116. [Google Scholar] [CrossRef]
- Panchikkil, S.; Manikandan, V.M.; Zhang, Y.D. A pseudo-random pixel mapping with weighted mesh graph approach for reversible data hiding in encrypted image. Multimed. Tools. Appl. 2022, 81, 16279–16307. [Google Scholar] [CrossRef]
- Li, F.Y.; Zhu, H.J.; Yu, J.; Qin, C. Double linear regression prediction based reversible data hiding in encrypted images. Multimed. Tools. Appl. 2021, 80, 2141–2159. [Google Scholar] [CrossRef]
- Puteaux, P.; Puech, W. An efficient msb prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1670–1681. [Google Scholar] [CrossRef]
- Yi, S.; Zhou, Y.C.; Hua, Z.Y. Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Process Image Commun. 2018, 64, 78–88. [Google Scholar] [CrossRef]
- Chen, K.M.; Chang, C.C. Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map. Multimed. Tools. Appl. 2019, 78, 31441–31465. [Google Scholar] [CrossRef]
- Qian, Z.X.; Zhang, X.P.; Feng, G.R. Reversible data hiding in encrypted images based on progressive recovery. IEEE Signal Process Lett. 2016, 23, 1672–1676. [Google Scholar] [CrossRef]
- Wang, J.J.; Li, G.X.; Xia, G.E.; Sun, Z.R. A separable and reversible data hiding algorithm in encrypted domain based on image interpolation space. Acta Electron. Sin. 2020, 48, 92–100. [Google Scholar] [CrossRef]
- Ge, H.L.; Chen, Y.; Qian, Z.X.; Wang, J. A high capacity multi-level approach for reversible data hiding in encrypted Images. IEEE Trans. Circuits Syst. Video Technol. 2019, 29, 2285–2295. [Google Scholar] [CrossRef]
- Xiao, D.; Wang, Y.; Xiang, T.; Bai, S. High-payload completely reversible data hiding in encrypted images by an interpolation technique. Front. Inf. Technol. Electron. Eng. 2017, 18, 1732–1743. [Google Scholar] [CrossRef]
- Weng, C.Y.; Yang, C.H. Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm. Entropy 2023, 25, 209. [Google Scholar] [CrossRef]
- Chen, B.; Lu, W.; Huang, J.W.; Weng, J.; Zhou, Y. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders. IEEE Trans. Dependable Secur. Comput. 2020, 19, 978–991. [Google Scholar] [CrossRef]
- Available online: https://captain-whu.github.io/DOTA/dataset.html (accessed on 6 December 2023).
- Available online: https://r0k.us/graphics/kodak/ (accessed on 6 December 2023).
- Available online: https://ccia.ugr.es/cvg/index2.php (accessed on 6 December 2023).
Image | Original Entropy | Entropy after Encryption | Change 1 | Entropy after Data Embedding | Change 2 | Change 3 |
---|---|---|---|---|---|---|
Figure 7a | 5.40 | 7.99 | 2.59 | 7.98 | 2.58 | 0.01 |
Figure 7b | 6.05 | 7.99 | 1.94 | 7.98 | 1.93 | 0.01 |
Figure 7c | 6.20 | 7.99 | 1.79 | 7.98 | 1.78 | 0.01 |
Figure 7d | 5.93 | 7.99 | 2.06 | 7.98 | 2.05 | 0.01 |
Figure 7e | 5.06 | 7.99 | 2.93 | 7.97 | 2.91 | 0.02 |
Figure 7f | 7.12 | 7.99 | 0.87 | 7.99 | 0.87 | 0.00 |
m | 1 | 2 | 3 | 4 | |
---|---|---|---|---|---|
β | |||||
1 | 0.008 | 0.015 | 0.006 | 0.002 | |
4 | 0047 | 0.093 | 0.070 | 0.058 | |
8 | 0.101 | 0.200 | 0.160 | 0.133 | |
12 | 0.152 | 0.302 | 0.252 | 0.212 | |
16 | 0.205 | 0.407 | 0.341 | 0.281 |
Parameter α | EC/bpp | Decryption Quality/dB | SSIM |
---|---|---|---|
1 | 0.140 | inf | 1 |
2 | 0.187 | inf | 1 |
3 | 0.234 | inf | 1 |
Parameter β | EC/bpp | Decryption Quality/dB | SSIM |
---|---|---|---|
1 | 0.051 | inf | 1 |
4 | 0.234 | inf | 1 |
8 | 0.479 | inf | 1 |
12 | 0.722 | inf | 1 |
16 | 0.969 | inf | 1 |
Parameter T | EC/bpp | Decryption Quality/dB | SSIM |
---|---|---|---|
1 | 0.969 | inf | 1 |
3 | 1.809 | inf | 1 |
7 | 2.234 | inf | 1 |
15 | 1.866 | inf | 1 |
Parameter T | EC/bpp | Decryption Quality/dB | SSIM |
---|---|---|---|
1 | 1.780 | inf | 1 |
3 | 2.428 | inf | 1 |
7 | 2.345 | inf | 1 |
15 | 1.777 | inf | 1 |
Image | (a) | (b) | (c) | (d) | (e) | (f) | Average |
---|---|---|---|---|---|---|---|
EC/bpp | 2.23 | 2.43 | 2.40 | 2.24 | 3.73 | 1.37 | 2.40 |
Image | (a) | (b) | (c) | (d) | (e) | (f) | Average |
---|---|---|---|---|---|---|---|
EC/bpp | 2.22 | 2.04 | 1.46 | 2.26 | 1.69 | 0.74 | 1.74 |
Algorithms | RRBE | Separability | Lossless Decryption | Self-Embedding before Encryption |
---|---|---|---|---|
Bit layer compression. [8] | × | × | × | × |
Distributed source encoding. [9] | × | √ | × | × |
Adaptive prediction error coding. [18] | × | × | × | × |
Block classification + prediction. [22] | × | √ | × | × |
Dynamic multi-layer embedding. [26] | √ | √ | × | × |
Pre-classification + interpolation prediction + error correction. [27] | × | × | × | √ |
Pre-classification + mapping. [28] | √ | √ | × | × |
MSB prediction + error correction. [30] | √ | √ | × | × |
Interpolation estimation + MSB flipping. [36] | √ | × | × | × |
The proposed algorithm. | √ | √ | √ | √ |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Liu, R.; Zhou, Q.; Liu, J.; Zhang, Y.; Hui, Z.; Zhang, X. Separable Reversible Data Hiding in Encrypted Images for Remote Sensing Images. Entropy 2023, 25, 1632. https://doi.org/10.3390/e25121632
Liu R, Zhou Q, Liu J, Zhang Y, Hui Z, Zhang X. Separable Reversible Data Hiding in Encrypted Images for Remote Sensing Images. Entropy. 2023; 25(12):1632. https://doi.org/10.3390/e25121632
Chicago/Turabian StyleLiu, Ruihua, Quan Zhou, Juanni Liu, Yi Zhang, Zheng Hui, and Xuejiao Zhang. 2023. "Separable Reversible Data Hiding in Encrypted Images for Remote Sensing Images" Entropy 25, no. 12: 1632. https://doi.org/10.3390/e25121632
APA StyleLiu, R., Zhou, Q., Liu, J., Zhang, Y., Hui, Z., & Zhang, X. (2023). Separable Reversible Data Hiding in Encrypted Images for Remote Sensing Images. Entropy, 25(12), 1632. https://doi.org/10.3390/e25121632