IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 408-413

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Reversible Data Hiding in Distributed source coding using syndromes 1

K.Srinivasa Reddy, 2 K. Subba Rao

1

2

M.Tech, SE, LBRCE, Mylavaram, [email protected] Professor, CSE, LBRCE, Mylavaram, India, [email protected]

Abstract: This work proposes a novel scheme for separable reversible data hiding in encrypted images. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. A novel reversible data hiding algorithm, which can recover the original image without any distortion from the marked image after the hidden data have been extracted, is presented in this paper. This algorithm utilizes the zero or the minimum points of the histogram of an image and slightly modifies the pixel grayscale values to embed data into the image. Lossless compression of encrypted sources can be achieved through Sepia Wolf coding. For encrypted real-world sources such as images, the key to improve the compression efficiency is how the source dependency is exploited. Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original image cover can be lossless recovered after which is embedded is extracted while protecting the image content’s as confidential. All methods used previously embed data by reversibly vacating room from the images which are been encrypted, which may cause some errors on data extraction and/or image restoration.

1. Introduction In recent years, signal processing in the encrypted domain has attracted considerable research interest. As an effective and popular means for privacy protection, encryption converts the ordinary signal into unintelligible data, so that the traditional signal processing usually takes place before encryption or after decryption. However, in some scenarios that a content owner does not trust the processing service provider, the ability to manipulate the encrypted data when keeping the plain content unrevealed is desired. For instance, when the secret data to be transmitted are encrypted, a channel provider without any knowledge of the cryptographic key may tend to compress the encrypted data due to the limited channel resource. For instance, in covert communications, the hidden data may often be irrelevant to the cover media. In authentication, however, the embedded data are closely related to the cover media. In these two types of applications, invisibility of hidden data is an important requirement. In most cases of data hiding, the cover media will experience some distortion due to data hiding and cannot be inverted back to the original media. That is, some permanent distortion has occurred to the cover media even after the hidden data have been extracted attempts on RDH in encrypted images have been made. In Zhang divided the encrypted image into several blocks. By flipping 3 LSBs of the half of pixels in each block, room can be vacated for the embedded bit. The data extraction and image recovery proceed by finding which part has been flipped in one block. This process can be realized with the help of spatial correlation in decrypted image. Hong et al. Ameliorated Zhang’s method at the decoder side by further exploiting the spatial correlation using a different estimation equation and side match technique to achieve much lower error rate. These two methods mentioned above rely on spatial correlation of original image to extract data. That is, the encrypted image should be decrypted first before data extraction. To separate the data extraction from image decryption, Zhang emptied out space for data embedding following the idea

K.Srinivasa Reddy, IJRIT

408

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 408-413

of compressing encrypted images. Compression of encrypted data can be formulated as source coding with side information at the decoder, in which the typical method is to generate the compressed data in lossless manner by exploiting the syndromes of parity-check matrix of channel codes. The method in compressed the encrypted LSBs to vacate room for additional data by finding syndromes of a parity-check matrix, and the side information used at the receiver side is also the spatial correlation of decrypted images. However, in some application scenarios, this conventional diagram needs to be revisited. Let us consider the following case Suppose Alice needs to send information to Bob, while Charlie is the network provider. Alice wants to keep the information confidential to Charlie, however the resources that she has is too limited to perform compression. So Alice just encrypts the data using a simple cipher and gets it forwarded. Charlie, as the network provider, always has the interest to reduce the data rate. That is, it is desirable for Charlie to perform compression without having access to the secret key. Johnson et al. prove in that in this case, if stream cipher is used by Alice, and Bob holds the secret key and performs joint decryption and decompression, the overall system performance can be as good as the conventional approach. That is, neither the security nor the compression efficiency will be sacrificed by performing compression in the encrypted domain.

2. Related Work In this framework, a content owner encrypts the original image using a standard cipher with an encryption key. After producing the encrypted image, the content owner hands over it to a data hider (e.g., a database manager) and the data hider can embed some auxiliary data into the encrypted image by lossless vacating some room according to a data hiding key. Then a receiver, maybe the content owner himself or an authorized third party can extract the embedded data with the data hiding key and further recover the original image from the encrypted version according to t In all methods of the encrypted8-bitgray-scaleimages are generated by encrypting every bit-planes with a stream cipher. The method in segments the encrypted image into a number of no overlapping blocks sized by each block is used to carry one additional bit. To do this, pixels in each block are pseudo-randomly divided into two sets and according to a data hiding key. If the additional bit to be embedded is 0, flip the 3 LSBs of each encrypted pixel in otherwise flip the 3 encrypted LSBs of pixels in . For data extraction and image recovery, the receiver flips all the three LSBs of pixels in to form a new decrypted block, and flips all the three LSBs of pixels in to form another new block; one of them will be decrypted to the original block. Due to spatial correlation in natural images, original block is presumed to be much smoother than interfered block and embedded bit can be extracted correspondingly. However, there is a risk of defeat of bit extraction and image recovery when divided block is relatively small much fine-detailed textures. Hong et al. reduced the error rate of Zhang’s method by fully exploiting the pixels in calculating the smoothness of each block and using side match. The extraction and recovery of blocks are performed according to the descending order of the absolute smoothness difference between two candidate blocks and recovered block scan further be used to evaluate the smoothness of unrecovered blocks, which is referred to as side match. Hang’s method in pseudo-randomly permuted and divided encrypted image into a number of groups with size. The LSB-planes of each group are compressed with a parity-check matrix and the vacated room is used to embed data.

3. Proposed Scheme The proposed scheme is made up of image encryption, data embedding and data-extraction/image-recovery phases. The content owner encrypts the original uncompressed image using an encryption key to produce an encrypted image. Then, the data-hider compresses the least significant bits (LSB) of the encrypted image using a data-hiding key to create a sparse space to accommodate the additional data. At the receiver side, the data embedded in the created space can be easily retrieved from the encrypted image containing additional data according to the datahiding key. Since the data embedding only affects the LSB, a decryption with the encryption key can result in an image similar to the original version. When using both of the encryption and data-hiding keys, the embedded additional data can be successfully extracted and the original image can be perfectly recovered by exploiting the spatial correlation in natural image.

K.Srinivasa Reddy, IJRIT

409

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 408-413

3.1Data Embedding In the data embedding phase, some parameters are embedded into a small number of encrypted pixels, and the LSB of the other encrypted pixels are compressed to create a space for accommodating the additional data and the original data at the positions occupied by the parameters. Obviously, standard RDH algorithms are the ideal operator for reserving room before encryption and can be easily applied to Framework RRBE to achieve better performance compared with techniques from Frame work VRAE. This is because in this new framework, we follow the customary idea that first lossless compresses the redundant image content (e.g., using excellent RDH techniques) and then encrypts it with respect to protecting privacy. 3.2Data Extraction and Image Recovery In this module, Extracting Data from Encrypted Images to manage and update personal information of images which are encrypted for protecting clients’ privacy, an inferior database manager may only get access to the data hiding key and have to manipulate data in encrypted domain. When the database manager gets the data hiding key, he can decrypt and extract the additional data by directly reading the decrypted version. When requesting for updating information of encrypted images, the database manager, then, updates information through LSB replacement and encrypts up dated information according to the data hiding key all over again. As the whole process is entirely operated on encrypted domain, it avoids the leakage of original content. Since data extraction is completely independent from image decryption, the order of them implies two different practical applications. 1) Case 1: Extracting Data from Encrypted Images: To manage and update personal information of images which are encrypted for protecting clients’ privacy, an inferior database manager may only get access to the data hiding key and have to manipulate data in encrypted domain. The order of data extraction before image decryption guarantees the feasibility of our work in this case. When the database manager gets the data hiding key, he can decrypt the LSB-planes of and extract the additional data by directly reading the decrypted version. When requesting for updating information of encrypted images, the database manager, then, updates information through LSB replacement and encrypts updated information according to the data hiding key all over again. As the whole process is entirely operated on encrypted domain, it avoids the leakage of original content. 2) Case 2: Extracting Data from Decrypted Images: In Case 1, both embedding and extraction of the data are manipulated in encrypted domain. On the other hand, there is a different situation that the user wants to decrypt the image first and extracts the data from the decrypted image when it is needed. The following example is an application for such scenario. Assume Alice outsourced her images to a cloud server, and the images are encrypted to protect their contents. Into the encrypted images, the cloud server marks the images by embedding some notation, including the identity of the images’ owner, the identity of the cloud server and time stamps, to manage the encrypted images. Note that the cloud server has no right to do any permanent damage to the images. Now an authorized user, Bob who has been shared the encryption key and the data hiding key, downloaded and decrypted the images. Bob hoped to get marked decrypted images, i.e., decrypted images still including the notation, which can be used to trace the source and history of the data. The order of image decryption before/without data extraction is perfectly suitable for this case. Next, we describe how to generate a marked decrypted image.

Fig: Sketch oh non-separable data hiding in encrypted image

K.Srinivasa Reddy, IJRIT

410

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 408-413

There are also a number of works on data hiding in the encrypted domain. In a buyer–seller watermarking protocol, the seller of digital multimedia product encrypts the original data using a public key, and then permutes and embeds an encrypted fingerprint provided by the buyer in the encrypted domain. After decryption with a private key, the buyer can obtain a watermarked product. This protocol ensures that the seller cannot know the buyer’s watermarked version while the buyer cannot know the original version. An anonymous fingerprinting scheme that improves the enciphering rate by exploiting the Okamoto Uchiyama encryption method has been proposed in. By introducing the composite signal representation mechanism, both the computational overhead and the large communication bandwidth due to the homomorphism public-key encryption are also significantly reduced. In another type of joint data-hiding and encryption schemes, a part of cover data is used to carry the additional message and the rest of the data are encrypted, so that both the copyright and the privacy can be protected.

4. Resolution Progressive Compression of Encrypted Images A. System Description The encoder gets the cipher text Y and decomposes it into four sub-images, namely, the 00, 01, 10 and 11 subimages. Each sub-image is a down sampled-by-two version of the encrypted image. The name of a sub-image denotes the horizontal and vertical offsets of the down sampling. The 00 sub-image is further down sampled to create multiple resolution levels. We use 00n to represent the 00 sub-image in the n-to resolution level. The 00n subimage can be lossless synthesized from the 00n+1, 01n+1, 10n+1 and 11n+1 sub-image. An example of the decomposition is illustrated. Here the image is supposed to be an encrypted one. We show it in plaintext just for a better illustration. Meanwhile, we would like to point out that the stream cipher function in only scrambles the pixel values, but does not shuffle the pixel locations. This means geometric information of the pixels is still preserved, which is leveraged by the down sampling operation. After the down sampling, each sub-image is encoded independently using Sepia-Wolf codes, and the resulting syndrome bits are transmitted from the lowest resolution to the highest. Decoding starts from the 00 sub-image of the lowest-resolution level, say, level N. We suggest transmitting the uncompressed 00N sub-image as the doped bits. Thus the 00N sub-image can be known by the decoder without ambiguity, and knowledge about the local statistics will be derived based on it. Next, other sub-images of the same resolution level are interpolated from the decrypted 00N sub-image. We call the interpolation result the SI of the plaintext. It will then be scrambled the same way as in to generate the SI of the cipher text. Since it is a one-to-one mapping between SI of the plaintext and SI of the cipher text, for the sake of clarity, we use “SI” only for the former in the rest of the paper. Meanwhile, a channel estimation module is employed to estimate the conditional probability density function (p.d.f.) of the original pixel values, given the SI. The SI, the estimated p.d.f., and the corresponding part of the key stream are fed into the SepiaWolf decoding module to decode the target sub-image. When the 01N, 10N and 11N sub-images are all decoded and decrypted, the 00N–1 sub-image can be synthesized, then the decoding iterates until the full-resolution image is reconstructed.

K.Srinivasa Reddy, IJRIT

411

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 408-413

B. Context Adaptive Interpolation The SI generation in our scheme is through interpolation. For the sake of simplicity, for any pixel in the target subimage, we only use the 4 horizontal and vertical neighbors or the 4 diagonal neighbors in the known sub-image(s) for the interpolation. Intuitively, the SI quality will be better, if the neighbors are geometrically closer to the pixel to be interpolated. Hence we use a two-step interpolation in each resolution level to improve the SI estimation. First, sub-image 11 is interpolated from sub-image 00; after sub-image 11 is decoded, we use both 00 and 11 to interpolate 01 and 10. The interpolation pattern is from which we can see another benefit of the two-step interpolation: the interpolation patterns of the two steps are isomorphic up to a scaling factor of 2 and a rotation of π/4. This simplifies the interpolator design. Real-world image data is highly non-stationary; hence it is desired to have the interpolation adapted to the local context. For example, for a pixel on an edge, it is preferable to interpolate along the edge Orientation. Similar efforts can be found in conventional lossless image compression, where the median edge detector (MED) and The gradient adaptive predictor (GAP) is two successful context adaptive predictors. However, they process the pixels in a raster-scanning order, thus cannot be directly applied to our scheme.

5. Choice of Embedding Strategy In the single-layer embedding we introduce two solutions for embedding only a small portion of messages: 1) embedding data into peak points by making use of part error sequence. 2) Searching for proper points in the histogram of all estimating errors. The comparison results are listed. The first solution performs better than the other when cover image is relatively smooth with little fine-detail regions, therefore resulting in a sharper representation in error histogram. The improvement can be as high as 2 to 4 dB at low embedding rate levels. As for textured images such as Baboon with rather flat error histogram, the second solution has a better performance of 1 to 2 dB. Note that the performance of two solutions gradually approaches the same with little difference at large embedding rate range. In this paper, we propose the first solution when peak points of estimating error sequence of cover image account for more than 20% of the whole errors; otherwise switch to the second. 5.1 Discussion on Boundary Map Boundary map in this paper is used for distinguishing between natural and pseudo boundary pixels and its size is critical to practical applicability of proposed approach. The boundary map size of six standard images. In most cases, no boundary map is needed. Even for Peppers image, the largest size is 1741 bits (with a large embedding rate 0.4 bops by adopting embedding scheme 4 rounds) and the marginal area (bits) is large enough to accommodate it.

6. Conclusions Our proposed reversible data hiding technique is able to embed about 5–80 kb into a 512× 512 ×8 grayscale image while guaranteeing the PSNR of the marked image versus the original image to be above 48 dB. In addition, this algorithm can be applied to virtually all types of images. Reversible data hiding in encrypted images is a new topic

K.Srinivasa Reddy, IJRIT

412

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 408-413

which is attracting more interest because of the privacy-preserving requirements from cloud data management. Earlier methods implement RDH in encrypted images by vacating room after encryption, as opposed to which we proposed by reserving room before encryption. In new method data hider can benefit from the extra space emptied out in previous stage to make data hiding process effortless. Our future work will focus on compression of encrypted videos, where RPC can be used for both inter-frame and intra-frame correlation learning at the decoder side. Some preliminary results can be found in.

7. References [1] M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992-3006, Oct. 2004. [2] W. Stallings, Cryptography and Network Security: Principles and Practice (3rd Edition), Englewood Cliffs, NJ: Prentice-Hall, 2003. [3] S. S. Pradhan and K. Ramchandran, “Distributed source coding using syndromes (DISCUS)”, IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 626-643, Mar. 2003. [4] J. D. Slepian and J. K. Wolf, “Noiseless coding of correlated information sources,” IEEE Trans. Inf. Theory, vol. IT-19, pp. 471-480, Jul. 1973. [5] J. Huang, Y. Q. Shi, and Y. Shi, “Embedding image watermarks in DC component,” IEEE Trans. Circuits Syst.: Video Technol., vol. 10, no. 6, pp. 974–979, Sep. 2000. [6] J. Irvine and D. Harle, Data Communications and Networks: An Engineering Approach. New York: Wiley, 2002. [7] M. M. Yeung and F. C. Mintzer, “Invisible watermarking for image verification,” Electron. Imag. vol. 7, no. 3, pp. 578–591, Jul. 1998. [8] B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423–1443, May 2001. [9] W. Zhang, B. Chen, and N. Yu, “Improving various reversible data hiding schemes via optimal codes for binary covers,” IEEE Trans. Image Process., vol. 21, no. 6, pp. 2991–3003, Jun. 2012. [10] J. Fridrich and M. Goljan, “Lossless data embedding for all image formats,” in Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol. 4675, pp. 572–583. [11] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.

K.Srinivasa Reddy, IJRIT

413

Reversible Data Hiding in Distributed source coding ...

www.ijrit.com. ISSN 2001-5569. Reversible Data Hiding in Distributed source coding using ... compression of encrypted sources can be achieved through Sepia Wolf coding. For encrypted real-world sources ..... [5] J. Huang, Y. Q. Shi, and Y. Shi, “Embedding image watermarks in DC component,” IEEE Trans. Circuits Syst.:.

974KB Sizes 6 Downloads 308 Views

Recommend Documents

Reversible Data Hiding
technique, which enables the exact recovery of the original host signal upon extraction of the ... ues in the digital representation of the host signal, e.g. overflows.

Separable Reversible Data Hiding in Encrypted Image - International ...
issues, general overview of cryptography approaches and about the different steganographic algorithms like Least. Significant Bit (LSB) algorithm. It also compares those algorithms in means of speed, accuracy and security. Keywords: Data hiding, Data

Separable Reversible Data Hiding in Encrypted Image - International ...
It also compares those algorithms in means of speed, accuracy and security. Keywords: ... reversible data hiding technique is in IPR protection, authentication, military, medical and law .... Engineering Department for their support and help.

Reversible Data Hiding in Encrypted Images by Reserving Room ...
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption..pdf. Reversible Data Hiding in Encrypted Images by Reserving Room ...

Transforms for High-Rate Distributed Source Coding
As for quantization for distributed source coding, optimal design of ... expected Lagrangian cost J = D+λ R, with λ a nonnegative real number, for high rate R.

Variable-rate distributed source coding in the presence ...
center. Three different forms of the problem are considered. The first is a variable-rate setup, in which the decoder adaptively chooses the rates at which the ...

Reversible Image Data Hiding With Contrast Enhancement ieee.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Reversible ...

Reversible Information Hiding in Encrypted Images by ... - IJRIT
That is, the encrypted image should be decrypted first before facts extraction. .... to framework RRBE to get done better operation made a comparison with techniques from ..... Note that the cloud computer has no right to do any fixed damage.

Reversible Information Hiding in Encrypted Images by ... - IJRIT
computers getting fixed supporters the idea of making shorter encrypted images .... Illustration of image partition and embedding process. ..... Video Technol., vol.

quantization and transforms for distributed source coding
senders and receivers, such that data, or noisy observations of unseen data, from one or more sources, are separately encoded by each ..... The flexible definition of rate measure is introduced to model a variety of lossless codecs for the quantizati

Reversible Watermarking for 3D Cameras: Hiding ...
DCT is applied on a small window around a pixel and the focus val- ue is calculated by accumulating ... versible data hiding technique using adaptive threshold for depth map hiding in its cover image, in section 6 we ..... by controlling the lens pos

Steganography: Data Hiding in Images
cryptography. Cryptography concentrates more on the security or encryption of data whereas. Steganography aims to defeat the knowledge of encryption of the message. Watermarking is about protecting the content in images;. Steganography is all about c

Reversible, low cost, distributed optical fiber sensor with high spatial ...
Jan 6, 2011 - optical ?ber, a probing light source, a poWer supply, a detector means, a signal ..... An alternate embodiment uses an excitation optical ?ber to.

Reversible, low cost, distributed optical fiber sensor with high spatial ...
OPTICAL FIBER SENSOR WITH HIGH. 5,577,137 A l M996 Gmger et a1'. SPATIAL RESOLUTION. 5,701,006 A. 12/1997 Schaefer. (76) Inventor: Claudio Oliveira Egalon, Los Angeles,. CA (US). (21) Appl.No.: 12/985,521. (22) Filed: Jan. 6, 2011. Related US. Patent

Detection of Data Hiding in Binary Text Images
image are identical. This property eases the detection of the existence of secret message hidden by pixel flipping technique as the flipping of many pixels will destroy the property [11] or increase the compressed data rate [2]. The other type of ima

data hiding using watermarking - International Journal of Research in ...
Asst.Professor, Dr. Babasaheb Ambedkar College of Engg. and research, ECE department,. R.T.M. Nagpur University, Nagpur,. Maharashtra, India. Samruddhi Pande1, Aishwarya Iyer2, Parvati Atalkar3 ,Chetna Sorte4 ,Bhagyashree Gardalwar 5,. Student, Dr. B

Source Coding and Digital Watermarking in Wavelet Domain
domain. We shall be discussing the DWT – advantages over DCT, .... As per Table 1, the cost of the lifting algorithm for computing the wavelet transform.

data hiding using watermarking
Digital watermarking is not a new name in the tech- nology world but there are different techniques in data hiding which are similar ... It may also be a form or type of steganography and is used for widespread use. ... does is take the content, use

Design of Optimal Quantizers for Distributed Source ...
Information Systems Laboratory, Electrical Eng. Dept. Stanford ... Consider a network of low-cost remote sensors sending data to a central unit, which may also ...

hiding crimes in cyberspace
Science Applications International Corporation, USA ..... encountered three different encryption systems. ..... key recovery agents (Corcoran 1998, Cisco 1998).