The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Separable High Capacity Reversible Data Hiding Algorithm for Encrypted Images

This paper presents a separable Reversible Data Hiding Algorithm for Encrypted Images (RDHEI) that consists of three phases. The encryption phase in the algorithm circularly shifts the columns in the image by a random amount, blocks the image into equal and regular blocks and maps them to irregular blocks generated based on Hilbert filling curve, and finally complements a random subset of the blocks. The embedding phase is essentially an adapted version of the modification of the prediction errors algorithm that is applied to each block in the encrypted image independently. In the decryption phase, and since the algorithm is separable, the user can extract the data only, decrypt the image only, or can perform both actions depending on the type of keys he has. When compared to a very similar and recent algorithm, performance evaluation proved the ability of the proposed algorithm in increasing the embedding capacity with reasonable quality of the directly decrypted image. In terms of the security, the analytical and quantitative assessment showed the superiority of the proposed algorithm in protecting the encrypted image.


[1] Alattar A., “Reversible Watermark Using Difference Expansion of Quads,” in Proceeding of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Motreal, pp. 377- 380, 2004.

[2] Alsaidi A., Al-Lehaibi K., Alzahrani H., AlGhamdi M., and Gutub A., “Compression Multi-Level Crypto Stego Security of Texts Utilizing Colored Email Forwarding,” Journal of Computer Science and Computational Mathematics, vol. 8, no. 3, pp. 33-42, 2018.

[3] Celik M., Sharma G., and Tekalp A., “Lossless Generalized-LSB Data Embedding,” IEEE transactions on image processing, vol. 14, no. 2, pp. 253-266, 2005.

[4] Chen G., Mao Y., and Chui C., “A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps,” Chaos, Solitons and Fractals, vol. 21, no. 3, pp. 749-761, 2004.

[5] Fridrich J., Goljan M., and Du R., “Lossless Data Embedding New Paradigm in Digital Watermarking,” Eurasip Journal on Advances in Signal Processing, vol. 2002, no. 2, pp. 1-12, 2002.

[6] Hong W., Chen T., and Shiu C., “Reversible Data Hiding for High Quality Images Using Modification of Prediction Errors,” Journal of Systems and Software, vol. 82, no. 11, pp. 1833- 1842, 2009.

[7] Hong W., Chen T., and Wu H., “An Improved Reversible Data Hiding in Encrypted Images Using Side Match,” IEEE Signal Processing Lett, vol. 19, no. 4, pp. 199-202, 2012.

[8] Kumar R. and Jung K., “Enhanced Pairwise IPVO-Based Reversible Data Hiding Scheme Using Rhombus Context,” Information Sciences, vol. 536, pp. 101-119, 2020.

[9] Long M., Zhao Y., Zhang X., and Peng F., “A Separable Reversible Data Hiding Scheme for Encrypted Images Based on Tromino Scrambling and Adaptive Pixel Value Ordering,” Signal Processing, vol. 176, pp. 107703, 2020.

[10] Li X., Li J., and Li B., “High-Fidelity Reversible Data Hiding Scheme Based on Pixel-value- ordering and Prediction-Error Expansion,” Signal Processing, vol. 93, no. 1, pp. 198-205, 2013.

[11] Ma K., Zhang W., Zhao X., Yu N., and Li F., “Reversible Data Hiding in Encrypted Images By Reserving Room Before Encryption,” IEEE Transactions on Information Forensics and security, vol. 8, no. 3, pp. 553-562, 2013.

[12] Mao Y., Chen G., and Lian S., “A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps,” International Journal of Bifurcation and chaos, vol. 14, no. 10, pp. 3613- 3624, 2003.

[13] Marawan M., AlShahwan F., Sifou F., Kartit A., and Ouhamne H., “Improving The Security of Cloud-Based Medical Image Storage,” Engineering Letters, vol. 27, no. 1, 2019.

[14] Ni Z., Shi Y., Ansari N., and Su W., “Reversible Data Hiding,” IEEE Transactions on Circuits and Systems for video technology, vol. 16, no. 3, pp. 354-362, 2006.

[15] Puech W., Chaumont M., and Strauss O., “A Reversible Data Hiding Method for Encrypted Images,” in Proceeding of the Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, pp. 534-542, 2008. Separable High Capacity Reversible Data Hiding Algorithm for Encrypted Images 821

[16] Shi Y., Li X., Zhang X., Wu H., and Ma B., “Reversible Data Hiding: Advances in the Past Two Decades,” IEEE Access, vol. 4, pp. 3210- 3237, 2016.

[17] Shiu C., Chen Y., and Hong W., “Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy,” KSII Transactions on Internet and Information Systems, vol. 13, no. 2, pp. 1020-1042, 2019.

[18] The USC-SIPI Image Database

[Online]. Available: http://sipi.usc.edu/database, Last Visited 2021.

[19] Thahab A., “A Novel Secure Video Steganography Technique Using Temporal Lifted Wavelet Transform and Human Vision Properties,” The International Arab Journal for Information Technology, vol. 17, no. 2, pp. 147- 153, 2020.

[20] Wang W., “A Reversible Data Hiding Algorithm Based on Bidirectional Difference Expansion,” Multimedia Tools and Applications, vol. 79, no. 9, pp. 890- 896, 2020.

[21] Waterloo Image Repository

[Online]. Available: http://links.uwaterloo.ca/Repository.html, Last Visited, 2021.

[22] Xu C., Zhang Y., and Gu Z., “A Novel Color Image Encryption Method Based on Sequence Cross Transformation and Chaotic Sequences,” Engineering Letters, vol. 28, no. 4, 2020.

[23] Zhang X., “Reversible Data Hiding in Encrypted Image,” IEEE Signal Processing Letters, vol. 18, no. 4, pp. 255-258, 2011.

[24] Zhang X., Qian Z., Feng G., and Ren Y., “Efficient Reversible Data Hiding in Encrypted Images,” Journal of Visual Communication and Image Representation, vol. 25, no. 2, pp. 322-328, 2014. Iyad Jafar received the B.S. degree in Electrical Engineering from The University of Jordan in 2001, the M.Sc. degree in Electrical Engineering from the Illinois Institute of Technology in 2004, and the Ph.D. degree in Computer Engineering from Wayne State University in 2008. He is currently working as a professor and acting chair in the Department of Computer Engineering at the University of Jordan. His research interests are in signal and image processing, pattern recognition, and computer networks. Khalid Darabkh Received the PhD degree in Computer Engineering from the University of Alabama in Huntsville in 2007 with honors. He is currently a professor in the Computer Engineering Department at the University of Jordan. He authored and co-authored of at least a hundred eighty highly esteemed research articles. He is among World’s Top 2% Scientists List compiled by Stanford University in 2020 and 2021. He serves on the Editorial Board of Telecommunication Systems, published by Springer, Computer Applications in Engineering Education, published by John Wiley & Sons, and Journal of High Speed Networks, published by IOS Press. Additionally, he serves as a TPC member of highly reputable IEEE conferences such as GLOBECOM, ICC, LCN, VTC- Fall, PIMRC, ISWCS, ATC, ICT, and IAEAC. He is engaged in research mainly on Internet of things, Software-defined networks, vehicular networks, flying ad-hoc networks, Fog networking, Full duplex cognitive radio networks, queuing systems and networks, multimedia transmission, channel coding, steganography and watermarking, as well as innovative and interactive learning environments. Fahed Jubair graduated from Purdue University in 2014 with a Ph.D. degree in Electrical and Computer Engineering. He received his B.Sc. degree from the University of Jordan in 2007. Dr. Jubair is currently an assistant professor of Computer Engineering at the University of Jordan. His main research interests include optimizing compilers, parallel computing, heuristic algorithms, and machine learning.