• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
She Xiaomeng, Du Yang, Ma Wenjing, Yin Zhaoxia. Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Block Labeling[J]. Journal of Computer Research and Development, 2022, 59(9): 2089-2100. DOI: 10.7544/issn1000-1239.20210495
Citation: She Xiaomeng, Du Yang, Ma Wenjing, Yin Zhaoxia. Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Block Labeling[J]. Journal of Computer Research and Development, 2022, 59(9): 2089-2100. DOI: 10.7544/issn1000-1239.20210495

Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Block Labeling

Funds: This work was supported by the National Natural Science Foundation of China (61872003, 62172001, 61502009).
More Information
  • Published Date: August 31, 2022
  • Reversible data hiding in encrypted images (RDHEI) is an effective technology that can embed additional data after image encryption, extract data error-free and recover images losslessly. It can not only achieve information transmission, but also ensure the security of the transmission carrier. Therefore, with the development of cloud computing and the growing demand for privacy protection, RDHEI has been widely concerned in recent years. In this paper, a RDHEI algorithm based on pixel prediction and block labeling is proposed. The proposed algorithm focuses on how to achieve high embedding capacity and complete reversibility while ensuring security. In the preprocessing step, the median edge predictor is used to calculate the prediction error. Different from the previous algorithms, the proposed algorithm uses the most significant bit to represent the sign of the prediction errors, and the rest of bit planes represent the absolute values of the prediction errors. The prediction error bit planes are divided into several non-overlapping blocks and these blocks are labeled adaptively. The label map with sparse feature can be compressed effectively via arithmetic coding. In the encryption step, the encryption key is used to generate a pseudo-random matrix to encrypt the original image. In the data hiding step, different methods are used to embed additional data for different types of blocks. Finally, according to the corresponding key, the additional data can be extracted error-free and the original image can be recovered losslessly. Experimental results show that, the proposed algorithm can not only ensure the security and reversibility, but also improve the embedding capacity significantly compared with the state-of-art RDHEI algorithms.
  • Related Articles

    [1]Lü Wanli, Tang Yun, Yin Zhaoxia, Luo Bin. Reversible Data Hiding for 3D Mesh Model in Encrypted Domain Based on Vertex Partition and Coordinate Standardization[J]. Journal of Computer Research and Development, 2024, 61(6): 1536-1544. DOI: 10.7544/issn1000-1239.202221040
    [2]Yang Yaolin, He Hongjie, Chen Fan, Yuan Changqi. Reversible Data Hiding of Image Encryption Based on Prediction Error Adaptive Coding[J]. Journal of Computer Research and Development, 2021, 58(6): 1340-1350. DOI: 10.7544/issn1000-1239.2021.20200172
    [3]Yan Shu, Chen Fan, He Hongjie. Reversible Data Hiding in Encrypted Image Based on Neighborhood Prediction Using XOR-Permutation Encryption[J]. Journal of Computer Research and Development, 2018, 55(6): 1211-1221. DOI: 10.7544/issn1000-1239.2018.20170295
    [4]Ke Yan, Zhang Minqing, Su Tingting. A Novel Multiple Bits Reversible Data Hiding in Encrypted Domain Based on R-LWE[J]. Journal of Computer Research and Development, 2016, 53(10): 2307-2322. DOI: 10.7544/issn1000-1239.2016.20160444
    [5]Gong Daofu, Liu Fenlin, Luo Xiangyang. A Variable-Payload Self-Embedding Fragile Watermarking Algorithm for Image[J]. Journal of Computer Research and Development, 2014, 51(11): 2505-2512. DOI: 10.7544/issn1000-1239.2014.20130440
    [6]Shi Hui, Li Mingchu. Safe Variable-Capacity Self-Recovery Watermarking Scheme[J]. Journal of Computer Research and Development, 2014, 51(8): 1715-1726. DOI: 10.7544/issn1000-1239.2014.20130232
    [7]Guo Chi, Wang Lina, Li Yu, Zhou Furong. Study on Network Cascading Failures Based on Load-Capacity Model[J]. Journal of Computer Research and Development, 2012, 49(12): 2529-2538.
    [8]Zeng Xiao, Chen Zhenyong, Chen Ming, and Xiong Zhang. Reversible Data Hiding Using Full-Context Prediction and Error Expansion[J]. Journal of Computer Research and Development, 2010, 47(9): 1595-1603.
    [9]Gao Xiang, Zhang Longbing, Hu Weiwu. A CapacityShared Heterogeneous CMP Cache[J]. Journal of Computer Research and Development, 2008, 45(5): 877-885.
    [10]Yang Dezhi, Huang Hua, Zhang Jiangang, Xu Lu. BWFS: A Distributed File System with Large Capacity, High Throughput and High Scalability[J]. Journal of Computer Research and Development, 2005, 42(6): 1028-1033.
  • Cited by

    Periodical cited type(1)

    1. 王栓奇,庞红彪,杨顺昆,孟令中,刘钊. 基于多智能体的指挥控制软件可靠性建模仿真方法. 火力与指挥控制. 2024(05): 124-129 .

    Other cited types(0)

Catalog

    Article views (188) PDF downloads (110) Cited by(1)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return