Reversible data hiding in encrypted image based on key-controlled balanced Huffman coding

被引:1
|
作者
Yang, Yaolin [1 ]
Chen, Fan [2 ]
Tai, Heng-Ming [3 ]
He, Hongjie [1 ]
Qu, Lingfeng [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 611756, Peoples R China
[2] Southwest Jiaotong Univ, Sch Comp & Artificial Intelligence, Chengdu 611756, Peoples R China
[3] Univ Tulsa, Dept Elect & Comp Engn, Tulas, OK 74104 USA
基金
中国国家自然科学基金;
关键词
Reversible data hiding; Encrypted images; Huffman coding; Key-controlled; Balanced;
D O I
10.1016/j.jisa.2024.103833
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To achieve privacy protection and effective management in cloud computing, and solve the problem of existing reversible data hiding in encrypted image (RDH-EI) algorithms being unable to resist existing various attacks, an RDH-EI algorithm based on key-controlled balanced Huffman coding (KBHC) is proposed. The novelty lies in KBHC and variable-length bit scrambling. KBHC possesses non-preset, balanced, and key-controlled characteristics, providing the proposed algorithm with high capacity and enhanced security. The non-preset allows coding tables to be adaptively generated based on prediction error maps, resulting in shorter encoded streams for higher embedding capacity. The balanced characteristic is achieved by adjusting the subtrees, so that the balance rate in the encoded stream is 0.014, and can also reach 0.065 for particularly smooth images, achieving uniform distribution of the encoded stream, thereby improving the ability to resist statistical analysis attacks. The random key controls the leaf nodes scrambling in the Huffman tree, which realizes the variability of the encoded stream and avoids the potential security risks caused by timestamp reconstruction, laying the foundation to achieve differential attack security. Variable-length bit scrambling determines the pseudo-random extension length and scrambling sequence by both the encryption key and coding table information, effectively resists brute force attacks and ensures up to 100 % difference rate between scrambling sequences generated in each run. Experimental results demonstrate that compared to several RDH-EI methods, the proposed algorithm achieves higher embedding capacity and security under acceptable complexity. The average embedding rate of three databases reaches 3.897 bpp, and the proposed algorithm effectively resists statistical analysis attacks, COA, KPA, and differential attack.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Reversible data hiding with differential compression in encrypted image
    Tang, Zhenjun
    Xu, Shijie
    Yao, Heng
    Qin, Chuan
    Zhang, Xianquan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (08) : 9691 - 9715
  • [42] Reversible Data Hiding in Highly Secured Encrypted Image
    Devi, T. Arumuga Maria
    Sabitha, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (07): : 59 - 62
  • [43] Reversible data hiding with differential compression in encrypted image
    Zhenjun Tang
    Shijie Xu
    Heng Yao
    Chuan Qin
    Xianquan Zhang
    Multimedia Tools and Applications, 2019, 78 : 9691 - 9715
  • [44] Separable reversible data hiding in encrypted halftone image
    Kim, Cheonshik
    Shin, Dongkyoo
    Leng, Lu
    Yang, Ching-Nung
    DISPLAYS, 2018, 55 : 71 - 79
  • [45] Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation
    Zhou, Jiantao
    Sun, Weiwei
    Dong, Li
    Liu, Xianming
    Au, Oscar C.
    Tang, Yuan Yan
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2016, 26 (03) : 441 - 452
  • [46] Reversible data hiding in encrypted medical DICOM image
    Ping Kong
    Di Fu
    Xinran Li
    Chuan Qin
    Multimedia Systems, 2021, 27 : 303 - 315
  • [47] An Improved Method for Reversible Data Hiding in Encrypted Image
    Liu, Yuling
    Liu, Zuhong
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 24 - 34
  • [48] Reversible data hiding in encrypted medical DICOM image
    Kong, Ping
    Fu, Di
    Li, Xinran
    Qin, Chuan
    MULTIMEDIA SYSTEMS, 2021, 27 (03) : 303 - 315
  • [49] Automatic Classifier Based Reversible Image Transformation for Reversible Data Hiding in Encrypted Images
    Shaji, C.
    Sam, I. Shatheesh
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 714 - 720
  • [50] Encrypted signal-based reversible data hiding with public key cryptosystem
    Chen, Yu-Chi
    Shiu, Chih-Wei
    Horng, Gwoboa
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) : 1164 - 1170