Reversible Data Hiding in Encrypted Image
Reversible Data Hiding in Encrypted Image
Abstract—This work proposes a novel reversible data hiding does not know the original image content. For example, when
scheme for encrypted image. After encrypting the entire data of medical images have been encrypted for protecting the patient
an uncompressed image by a stream cipher, the additional data privacy, a database administrator may aim to embed the personal
can be embedded into the image by modifying a small proportion
of encrypted data. With an encrypted image containing additional information into the corresponding encrypted images. It may be
data, one may firstly decrypt it using the encryption key, and the also hopeful that the original content can be recovered without
decrypted version is similar to the original image. According to any error after decryption and retrieve of additional message at
the data-hiding key, with the aid of spatial correlation in natural receiver side. That means a reversible data hiding scheme for
image, the embedded data can be successfully extracted and the encrypted image is desirable.
original image can be perfectly recovered.
In some existing joint data-hiding and encryption schemes,
Index Terms—Image encryption, image recovery, reversible data a part of cover data is used to carry the additional message and
hiding.
the rest data are encrypted. For example [7], the intra-prediction
mode, motion vector difference and signs of DCT coefficients
I. INTRODUCTION are encrypted, while a watermark is embedded into the ampli-
tudes of DCT coefficients. In [8], the cover data in higher and
Manuscript received December 13, 2010; revised January 26, 2011; accepted A sketch of the proposed scheme is given in Fig. 1. A content
February 06, 2011. Date of publication February 14, 2011; date of current owner encrypts the original uncompressed image using an en-
version February 28, 2011. This work was supported by the Natural Science
cryption key to produce an encrypted image, and then a data-
Foundation of China (61073190, 60872116, and 60832010), the Shanghai
Rising-Star Program (10QH14011), and the Key Scientific Research Project of hider embeds additional data into the encrypted image using
Shanghai Education Committee (10ZZ59). The associate editor coordinating a data-hiding key though he does not know the original con-
the review of this manuscript and approving it for publication was Prof. H.
tent. With an encrypted image containing additional data, a re-
Vicky Zhao.
The author is with the School of Communication and Information ceiver may firstly decrypt it using the encryption key, and the
Engineering, Shanghai University, Shanghai 200072, China (e-mail: decrypted version is similar to the original image. According to
[email protected]).
the data-hiding key, he can further extract the embedded data
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org. and recover the original image from the decrypted version. The
Digital Object Identifier 10.1109/LSP.2011.2114651 detailed procedures are as follows.
and (5)
(2)
(3) That means the three decrypted LSB must be different from the
original LSB. In this case:
where are determined by an encryption key using a stan-
dard stream cipher. Then, are concatenated orderly as the (7)
encrypted data. A number of secure stream cipher methods can
be used here to ensure that anyone without the encryption key, So, the sum of decimal values of three decrypted LSB and three
such as a potential attacker or the data hider, cannot obtain any original LSB must be seven. The average energy of errors be-
information about original content from the encrypted data. tween the decrypted and original gray values is
Fig. 2. (a) Original Lena, (b) its encrypted version, and (c) a decrypted version
Fig. 3. Blocks of incorrect bit-extraction with the cover Lena and .
containing embedded data.
interfered due to the LSB flip operation. For the two blocks sized
by , define a function to measure the fluctuation in them
(10)
III. EXPERIMENTAL RESULTS of bit extraction and image recovery rises. Fig. 3 indicates the
The test image Lena sized 512 512 shown in Fig. 2(a) was blocks of incorrect bit-extraction when the original cover Lena
used as the original cover in the experiment. After image en- and were used, and most of the blocks are in texture
cryption, the 8 encrypted bits of each pixel are converted into a area due to the weak spatial correlation. Fig. 4 shows the ex-
gray value to generate an encrypted image shown in Fig. 2(b). tracted-bit error rate with respect to block sizes when four test
Then, we embedded 256 bits into the encrypted image by using images Lena, Man, Lake and Baboon sized 512 512 were used
the side length of each block . The decrypted image is as the original covers. These covers are standard test images
given as Fig. 2(c), and the values of PSNR caused by data em- and freely available in many image databases. Here, the ex-
bedding is 37.9 dB, which is imperceptible and verifies the the- tracted-bit error rate is equivalent to the rate of unsuccessful
oretical analysis in (9). At last, the embedded data were success- block recovery. It can be seen that the smoother the cover image,
fully extracted and the original image was perfectly recovered the better is the performance of data extraction and image re-
from the decrypted image. covery. When the side length of block is not less than 32, for
In the proposed scheme, the smaller the block size, the more most cover images, all the embedded bits can be correctly ex-
additional data can be embedded. However, the risk of defeat tracted and the original image can be successfully recovered.
258 IEEE SIGNAL PROCESSING LETTERS, VOL. 18, NO. 4, APRIL 2011