616Accesses
35Citations
Abstract
In this paper, a novel reversible data hiding algorithm for encrypted images is proposed. In encryption phase, chaotic sequence is applied to encrypt the original image. Then the least significant bits (LSBs) of pixels in encrypted image are losslessly compressed to leave place for secret data. With auxiliary bit stream, the lossless compression is realized by the Hamming distance calculation between the LSB stream and auxiliary stream. At receiving terminal, the operation is flexible, that is, it meets the requirement of separation. With the decryption key, a receiver can get access to the marked decrypted image which is similar to the original one. With data-hiding key, the receiver can successfully extract secret data from the marked encrypted image. With both keys, the receiver can get secret data and the exactly original image. Compared with existing methods, experiments show the feasibility and efficiency of the proposed method, especially in aspect of embedding capacity, embedding quality and error-free recovery with increasing payload.
This is a preview of subscription content,log in via an institution to check access.
Access this article
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Price includes VAT (Japan)
Instant access to the full article PDF.





Similar content being viewed by others
References
Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-lsb data embedding. IEEE Trans Image Process 14:253–266
Chen G, Zhao X, Li J (2011) A self-adaptive algorithm on image encryption. J Softw 16:1975–1982
Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting Parallel Computing. IEICE Transactions on Communications E98-B(1):190–200
Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos, Solitons and Fractals 29:393–399
Gu Q, Yao M (2003) A research of digital image encryption based on logistic chaotic sequence. Computer Engineering and Applications 39:114–116
Hong W, Chen T-S, Wu H-Y (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Proc Letters 19:199–202
Hu Y, Lee H-K, Li J (2009) De-based reversible data hiding with improved overflow location map. IEEE Trans Circuits and Systems for Video Technology 19:250–260
Joong KH, Sachnev V, Qing SY, Jeho N, Nam J, Choo H-G (2008) A novel difference expansion transform for reversible data embedding. IEEE Trans Information Forensics and Security 3:456– 465
Ma K, Zhang W, Zhao X (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Information Forensics and Security 8:553–562
Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits and Systems for Video Technology 16:354–362
P W C M, S O (2008) A reversible data hiding method for encrypted images, International Society for Optics and Photonics, San Jose, CA, USA, 68191E-68191E-9
Qin C, Chang CC, Chen YC (2013) Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Process 93:2687–2695
Qin C, Chang CC, Huang YH, et al. (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits and Systems for Video Technology 23:1109–1118
Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of puxel differences. IEEE Trans Circuits and Systems for Video Technology 19:906–910
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits and Systems for Video Technology 13:890–896
Xia Z, Wang X, Sun X, Qian Wang (2015) A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Transactions on Parallel and Distributed Systems. doi:10.1109/TPDS.2015.2401003
Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos, Solitons and Fractals 24:759–765
Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Proc Letters 18:255–258
Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Information Forensics and Security 7:826–832
Zhang X (2013) Commutative reversible data hiding and encryption. Security and Communication Networks 6:1396–1403
Zhang W, Ma K, Yu N (2014) Reversiblility improve data hiding in encrypted images. Signal Process 94:118–127
Acknowledgments
This work is supported by the National Natural Science Foundation of China (Grant Nos. 61272540,61272453 and 61232016) , the Anhui Provincial Natural Science Foundation(Grant No. 1508085MF115) and the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD).
Author information
Authors and Affiliations
School of Computer and Information, Hefei University of Technology, Hefei, 230009, China
Shuli Zheng, Dandan Li & Donghui Hu
Computer School, Wuhan University, Wuhan, 430072, China
Dengpan Ye & Lina Wang
Jiangsu Network Monitoring Engineering Center, Nanjing University of Information Science and Technology, Nanjing, 210044, China
Jinwei Wang
- Shuli Zheng
You can also search for this author inPubMed Google Scholar
- Dandan Li
You can also search for this author inPubMed Google Scholar
- Donghui Hu
You can also search for this author inPubMed Google Scholar
- Dengpan Ye
You can also search for this author inPubMed Google Scholar
- Lina Wang
You can also search for this author inPubMed Google Scholar
- Jinwei Wang
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toShuli Zheng.
Rights and permissions
About this article
Cite this article
Zheng, S., Li, D., Hu, D.et al. Lossless data hiding algorithm for encrypted images with high capacity.Multimed Tools Appl75, 13765–13778 (2016). https://doi.org/10.1007/s11042-015-2920-y
Received:
Revised:
Accepted:
Published:
Issue Date:
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative