Skip to main content
Log in

Selective bin model for reversible data hiding in encrypted images

  • Theoretical Advances
  • Published:
Pattern Analysis and Applications Aims and scope Submit manuscript

Abstract

In tandem with the fast-growing technology, the issue of secure data transmission over the Internet has achieved increasing importance. In digital media, enclosing data in images is one of the most common methods for communicating confidential information. A novel reversible data hiding in the encrypted images scheme based on selective bin models is proposed in this paper. The scheme focuses on enhancing the embedding capacity while ensuring the security of images with the help of encryption and the proposed data hiding process. For data embedding, lossless compression is utilized and the image is classified into three bins. Then, marker bits are assigned to these bins for distinguishing between embeddable and non-embeddable regions. The proposed method shows a satisfactory embedding rate for smooth images as well as complex ones due to its selective bin approach. Also, the method is separable in nature, i.e., data extraction and image recovery can be performed independently. Furthermore, the experimental results demonstrate the strategy’s effectiveness when compared with others.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Availability of data and materials

There is no data associated with this manuscript.

References

  1. Zhu J, Huo L, Ansari MD, Ikbal MA (2021) Research on data security detection algorithm in iot based on k-means. Scal Comput Pract Exp 22(2):149–159

    Google Scholar 

  2. Nirala RK, Ansari MD (2018) In: 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC) (IEEE), pp. 70–74

  3. Gautam P, Ansari MD, Sharma SK (2019) Enhanced security for electronic health care information using obfuscation and rsa algorithm in cloud computing. Int J Inf Sec Privacy (IJISP) 13(1):59–69

    Google Scholar 

  4. Ansari MD, Gunjan VK, Rashid E (2021) In: ICCCE 2020: Proceedings of the 3rd International Conference on Communications and Cyber Physical Engineering (Springer), pp 1419–1427

  5. Shi YQ, Li X, Zhang X, Wu HT, Ma B (2016) Reversible data hiding: advances in the past two decades. IEEE Access 4:3210–3237

    Google Scholar 

  6. Ray A, Roy S (2020) Recent trends in image watermarking techniques for copyright protection: a survey. Int J Multimed Inf Retr 9(4):249–270

    Google Scholar 

  7. Puteaux P, Ong S, Wong K, Puech W (2021) A survey of reversible data hiding in encrypted images-the first 12 years. J Vis Commun Image Represent 77:103085

    Google Scholar 

  8. Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125–135

    Google Scholar 

  9. Xu D, Wang R, Shi YQ (2016) An improved scheme for data hiding in encrypted h. 264/avc videos. J Vis Commun Image Represent 36:229–242

    Google Scholar 

  10. Xu D, Wang R, Zhu Y (2017) Tunable data hiding in partially encrypted h. 264/avc videos. J Vis Commun Image Represent 45:34–45

    Google Scholar 

  11. Barton JM (1997) Method and apparatus for embedding authentication information within digital data. Unit States Patent 5(646):997

    ADS  Google Scholar 

  12. Fridrich J, Goljan M, Du R (2002) Lossless data embedding-new paradigm in digital watermarking. EURASIP J Adv Signal Proc 2002(2):1–12

    Google Scholar 

  13. Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-lsb data embedding. IEEE Trans Image Proc 14(2):253–266

    ADS  Google Scholar 

  14. Celik MU, Sharma G, Tekalp AM (2006) Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans Image Proc 15(4):1042–1049

    ADS  Google Scholar 

  15. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890–896

    Google Scholar 

  16. Lee CC, Wu HC, Tsai CS, Chu YP (2008) Adaptive lossless steganographic scheme with centralized difference expansion. Patt Recognit 41(6):2097–2106

    ADS  Google Scholar 

  17. Hsiao JY, Chan KF, Chang JM (2009) Block-based reversible data embedding. Signal Proc 89(4):556–569

    Google Scholar 

  18. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16(3):354–362

    Google Scholar 

  19. Coatrieux G, Pan W, Cuppens-Boulahia N, Cuppens F, Roux C (2012) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inf Forens Secur 8(1):111–120

    Google Scholar 

  20. Kim S, Qu X, Sachnev V, Kim HJ (2018) Skewed histogram shifting for reversible data hiding using a pair of extreme predictions. IEEE Trans Circ Syst Video Technol 29(11):3236–3246

    Google Scholar 

  21. Fu Z, Gong M, Long G, Gan Z, Chai X, Lu Y (2022) Efficient capacity-distortion reversible data hiding based on combining multipeak embedding with local complexity. Appl Intell pp 1–21

  22. Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forens Secur 8(3):553–562

    Google Scholar 

  23. Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Proc 94:118–127

    Google Scholar 

  24. Cao X, Du L, Wei X, Meng D, Guo X (2015) High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans Cybernet 46(5):1132–1143

    Google Scholar 

  25. Nguyen TS, Chang CC, Chang WC (2016) High capacity reversible data hiding scheme for encrypted images. Signal Proc: Image Commun 44:84–91

    Google Scholar 

  26. Puteaux P, Puech W (2017) High-capacity reversible data hiding in encrypted images using msb prediction. Electron Imag 2017(7):10–15

    Google Scholar 

  27. Wu X, Chen B, Weng J (2016) Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer. J Vis Commun Image Represent 41:58–64

    Google Scholar 

  28. Shiu CW, Chen YC, Hong W (2015) Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Proc: Image Commun 39:226–233

    Google Scholar 

  29. Malik A, Wang HX, Chen Y, Khan AN (2020) A reversible data hiding in encrypted image based on prediction-error estimation and location map. Multimed Tools Appl pp 1–24

  30. Yang CH, Weng CY, Chen JY (2022) High-fidelity reversible data hiding in encrypted image based on difference-preserving encryption. Soft Comput 26(4):1727–1742

    Google Scholar 

  31. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Proc Lett 18(4):255–258

    ADS  Google Scholar 

  32. Zhang X (2011) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forens Secur 7(2):826–832

    Google Scholar 

  33. Zhou J, Sun W, Dong L, Liu X, Au OC, Tang YY (2015) Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans Circ Syst Video Technol 26(3):441–452

    Google Scholar 

  34. Qian Z, Zhang X, Ren Y, Feng G (2016) Block cipher based separable reversible data hiding in encrypted images. Multimed Tools Appl 75(21):13749–13763

    Google Scholar 

  35. Agrawal S, Kumar M (2017) Mean value based reversible data hiding in encrypted images. Optik 130:922–934

    ADS  Google Scholar 

  36. Xiong L, Xu Z, Shi YQ (2018) An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidimen Syst Signal Proc 29(3):1191–1202

    MathSciNet  Google Scholar 

  37. Ren H, Niu S, Wang X (2019) Reversible data hiding in encrypted images using pob number system. IEEE Access 7:149527–149541

    Google Scholar 

  38. Shah M, Zhang W, Hu H, Dong X, Yu N (2019) Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem. IET Image Proc 13(10):1705–1713

    Google Scholar 

  39. Agarwal R, Kumar M (2020) in International Conference on Computer Vision and Image Processing (Springer), pp. 99–112

  40. Wang Y, Xiong G, He W (2023) High-capacity reversible data hiding in encrypted images based on pixel-value-ordering and histogram shifting. Expert Syst Appl 211:118600

    Google Scholar 

  41. Anushiadevi R, Amirtharajan R (2023) Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram. J Inf Secur Appl 72:103407

    Google Scholar 

  42. Kumar R, Kumar N, Jung KH (2020) I-pvo based high capacity reversible data hiding using bin reservation strategy. Multimed Tools Appl 79:22635–22651

    Google Scholar 

  43. Weng CY, Weng HY, Huang CT (2022) High-fidelity reversible data hiding based on pvo and median preserving. J Supercomput 78(6):8367–8388

    Google Scholar 

  44. Agarwal R, Kumar M (2021) Block-wise reversible data hiding in encrypted domain using svd. Optik 247:168010

    ADS  Google Scholar 

  45. Ren H, Niu S (2021) Separable reversible data hiding in homomorphic encrypted domain using pob number system. Multimed Tool Appl pp 1–27

  46. Tsai CS, Zhang YS, Weng CY (2022) Separable reversible data hiding in encrypted images based on paillier cryptosystem. Multimed Tool Appl 81(13):18807–18827

    Google Scholar 

  47. http://decsai.ugr.es/cvg/dbimagenes/g512.php

  48. Wu Y, Noonan JP, Agaian S et al (2011) Npcr and uaci randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Select Areas Telecommun (JSAT) 1(2):31–38

    Google Scholar 

  49. Anushiadevi R, Praveenkumar P, Rayappan JBB, Amirtharajan R (2021) Uncover the cover to recover the hidden secret-a separable reversible data hiding framework. Multimed Tools Appl 80(13):19695–19714

    Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

R. Agarwal and M. Kumar helped in conception/design of the work and critical revision of the article. Agarwal and S. Ahmed done data analysis and interpretation and drafting the article.

Corresponding author

Correspondence to Manoj Kumar.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Agarwal, R., Ahmed, S. & Kumar, M. Selective bin model for reversible data hiding in encrypted images. Pattern Anal Applic 27, 21 (2024). https://doi.org/10.1007/s10044-024-01220-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10044-024-01220-z

Keywords

Navigation