Journal on Communications ›› 2022, Vol. 43 ›› Issue (8): 219-230.doi: 10.11959/j.issn.1000-436x.2022149
• Correspondences • Previous Articles Next Articles
Youqing WU1, Wenjing MA2, Zhaoxia YIN3, Yinyin PENG4, Xinpeng ZHANG5
Revised:
2022-07-20
Online:
2022-08-25
Published:
2022-08-01
Supported by:
CLC Number:
Youqing WU, Wenjing MA, Zhaoxia YIN, Yinyin PENG, Xinpeng ZHANG. Reversible data hiding in encrypted image based on bit-plane compression of prediction error[J]. Journal on Communications, 2022, 43(8): 219-230.
[1] | 李凤华, 李晖, 贾焰 ,等. 隐私计算研究范畴及发展趋势[J]. 通信学报, 2016,37(4): 1-11. |
LI F H , LI H , JIA Y ,et al. Privacy computing:concept,connotation and its research trend[J]. Journal on Communications, 2016,37(4): 1-11. | |
[2] | 张新鹏, 殷赵霞 . 多媒体信息隐藏技术[J]. 自然杂志, 2017,39(2): 87-95. |
ZHANG X P , YIN Z X . Data hiding in multimedia[J]. Chinese Journal of Nature, 2017,39(2): 87-95. | |
[3] | 姚远志, 王锋, 严文博 ,等. 基于二维码和可逆可视水印的图像隐私保护方案[J]. 通信学报, 2019,40(11): 65-75. |
YAO Y Z , WANG F , YAN W B ,et al. Image privacy preservation scheme based on QR code and reversible visible watermarking[J]. Journal on Communications, 2019,40(11): 65-75. | |
[4] | 周志立, 王美民, 杨高波 ,等. 基于轮廓自动生成的构造式图像隐写方法[J]. 通信学报, 2021,42(9): 144-154. |
ZHOU Z L , WANG M M , YANG G B ,et al. Generative steganography method based on auto-generation of contours[J]. Journal on Communications, 2021,42(9): 144-154. | |
[5] | 陈君夫, 付章杰, 张卫明 ,等. 基于深度学习的图像隐写分析综述[J]. 软件学报, 2021,32(2): 551-578. |
CHEN J F , FU Z J , ZHANG W M ,et al. Review of image steganalysis based on deep learning[J]. Journal of Software, 2021,32(2): 551-578. | |
[6] | SHI Y Q , LI X L , ZHANG X P ,et al. Reversible data hiding:advances in the past two decades[J]. IEEE Access, 2016,4: 3210-3237. |
[7] | XU D W , WANG R D , SHI Y Q.Data hiding in encrypted H . 264/AVC video streams by codeword substitution[J]. IEEE Transactions on Information Forensics and Security, 2014,9(4): 596-606. |
[8] | XIANG S J , LI Z H . Reversible audio data hiding algorithm using noncausal prediction of alterable orders[J]. EURASIP Journal on Audio,Speech,and Music Processing, 2017,2017(1): 1-16. |
[9] | XU N , TANG J , LUO B ,et al. Separable reversible data hiding based on integer mapping and MSB prediction for encrypted 3D mesh models[J]. Cognitive Computation, 2022,14(3): 1172-1181. |
[10] | 欧博, 殷赵霞, 项世军 . 明文图像可逆信息隐藏综述[J]. 中国图象图形学报, 2022,27(1): 111-124. |
OU B , YIN Z X , XIANG S J . Overview of reversible data hiding in plaintext image[J]. Journal of Image and Graphics, 2022,27(1): 111-124. | |
[11] | YIN Z X , JI Y , LUO B . Reversible data hiding in JPEG images with multi-objective optimization[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020,30(8): 2343-2352. |
[12] | DU Y , YIN Z X , ZHANG X P . High capacity lossless data hiding in JPEG bitstream based on general VLC mapping[J]. IEEE Transactions on Dependable and Secure Computing, 2022,19(2): 1420-1433. |
[13] | YIN Z X , XIANG Y Z , QIAN Z X ,et al. Unified data hiding and scrambling method for JPEG images[C]// Pacific Rim Conference on Multimedia. Berlin:Springer, 2018: 373-383. |
[14] | HE J H , CHEN J X , LUO W Q ,et al. A novel high-capacity reversible data hiding scheme for encrypted JPEG bitstreams[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019,29(12): 3501-3515. |
[15] | QIAN Z X , XU H S , LUO X Y ,et al. New framework of reversible data hiding in encrypted JPEG bitstreams[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019,29(2): 351-362. |
[16] | ZHANG W M , HU X C , LI X L ,et al. Recursive histogram modification:establishing equivalency between reversible data hiding and lossless data compression[J]. IEEE Transactions on Image Processing, 2013,22(7): 2775-2785. |
[17] | TIAN J . Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003,13(8): 890-896. |
[18] | NI Z C , SHI Y Q , ANSARI N ,et al. Reversible data hiding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006,16(3): 354-362. |
[19] | PUECH W , CHAUMONT M , STRAUSS O . A reversible data hiding method for encrypted images[J]. Proceedings of SPIE - The International Society for Optical Engineering, 2008,6819: 534-542. |
[20] | PUTEAUX P , ONG S Y , WONG K S ,et al. A survey of reversible data hiding in encrypted images-the first 12 years[J]. Journal of Visual Communication and Image Representation, 2021,77:103085. |
[21] | 中国图象图形学报. “数字图像/视频内容安全”前沿论坛暨专刊优秀成果分享会[R]. 2022. |
Journal of Image and Graphics. Frontier forum and excellent results sharing session of special issue on “digital image/video content security”[R]. 2022. | |
[22] | ZHANG X P . Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011,18(4): 255-258. |
[23] | HONG W , CHEN T S , WU H Y . An improved reversible data hiding in encrypted images using side match[J]. IEEE Signal Processing Letters, 2012,19(4): 199-202. |
[24] | ABHINAV A , MANIKANDAN V M , BINI A A . An improved reversible data hiding on encrypted images by selective pixel flipping technique[C]// Proceedings of 2020 5th International Conference on Devices,Circuits and Systems (ICDCS). Piscataway:IEEE Press, 2020: 294-298. |
[25] | ZHANG X P . Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2012,7(2): 826-832. |
[26] | YIN Z X , LUO B , HONG W . Separable and error-free reversible data hiding in encrypted image with high payload[J]. The Scientific World Journal,2014, 2014:604876. |
[27] | QIAN Z X , ZHANG X P . Reversible data hiding in encrypted images with distributed source encoding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016,26(4): 636-646. |
[28] | 黄梦雪, 和红杰, 陈帆 . 抵抗唯密文攻击的可分离加密域可逆信息隐藏[J]. 计算机辅助设计与图形学学报, 2020,32(6): 874-882. |
HUANG M X , HE H J , CHEN F . Separable reversible data hiding in encrypted image against ciphertext-only attack[J]. Journal of Computer-Aided Design & Computer Graphics, 2020,32(6): 874-882. | |
[29] | 王继军, 李国祥, 夏国恩 ,等. 图像插值空间完全可逆可分离密文域信息隐藏算法[J]. 电子学报, 2020,48(1): 92-100. |
WANG J J , LI G X , XIA G E ,et al. A separable and reversible data hiding algorithm in encrypted domain based on image interpolation space[J]. Acta Electronica Sinica, 2020,48(1): 92-100. | |
[30] | WANG X , CHANG C C , LIN C C . Reversible data hiding in encrypted images with block-based adaptive MSB encoding[J]. Information Sciences, 2021,567: 375-394. |
[31] | LIU Z L , PUN C M . Reversible data hiding in encrypted images using chunk encryption and redundancy matrix representation[J]. IEEE Transactions on Dependable and Secure Computing, 2022,19(2): 1382-1394. |
[32] | WANG Y M , HE W G . High capacity reversible data hiding in encrypted image based on adaptive MSB prediction[J]. IEEE Transactions on Multimedia, 2022,24: 1288-1298. |
[33] | QIN C , JIANG C Y , MO Q ,et al. Reversible data hiding in encrypted image via secret sharing based on GF (p) and GF (28)[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022,32(4): 1928-1941. |
[34] | YU C Q , ZHANG X Q , LI G X ,et al. Reversible data hiding with adaptive difference recovery for encrypted images[J]. Information Sciences, 2022,584: 89-110. |
[35] | MA K D , ZHANG W M , ZHAO X F ,et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013,8(3): 553-562. |
[36] | CAO X C , DU L , WEI X X ,et al. High capacity reversible data hiding in encrypted images by patch-level sparse representation[J]. IEEE Transactions on Cybernetics, 2016,46(5): 1132-1143. |
[37] | PUTEAUX P , PUECH W . An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images[J]. IEEE Transactions on Information Forensics and Security, 2018,13(7): 1670-1681. |
[38] | CHEN K M , CHANG C C . High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement[J]. Journal of Visual Communication and Image Representation, 2019,58: 334-344. |
[39] | 吴友情, 张睿灵, 汤进 ,等. 定长编码和哈夫曼编码的密文域可逆信息隐藏[J]. 中国图象图形学报, 2022,27(1): 277-288. |
WU Y Q , ZHANG R L , TANG J ,et al. Reversible data hiding in encrypted images based on joint fixed-length coding and Huffman coding[J]. Journal of Image and Graphics, 2022,27(1): 277-288. | |
[40] | YI S , ZHOU Y C . Separable and reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2019,21(1): 51-64. |
[41] | YIN Z X , XIANG Y Z , ZHANG X P . Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding[J]. IEEE Transactions on Multimedia, 2020,22(4): 874-884. |
[42] | GUAN B , XU D W . An efficient high-capacity reversible data hiding scheme for encrypted images[J]. Journal of Visual Communication and Image Representation, 2020,66:102744. |
[43] | MOHAMMADI A , NAKHKASH M , AKHAEE M A . A high-capacity reversible data hiding in encrypted images employing local difference predictor[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020,30(8): 2366-2376. |
[44] | PUTEAUX P , PUECH W . A recursive reversible data hiding in encrypted images method with a very high payload[J]. IEEE Transactions on Multimedia, 2021,23: 636-650. |
[45] | CHEN F , YUAN Y , HE H J ,et al. Multi-MSB compression based reversible data hiding scheme in encrypted images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021,31(3): 905-916. |
[46] | YIN Z X , SHE X M , TANG J ,et al. Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement[J]. Signal Processing, 2021,187:108146. |
[47] | WENG S W , ZHANG C Y , ZHANG T C ,et al. High capacity reversible data hiding in encrypted images using SIBRW and GCC[J]. Journal of Visual Communication and Image Representation, 2021,75:102932. |
[48] | 吴友情, 郭玉堂, 汤进 ,等. 基于自适应哈夫曼编码的密文图像可逆信息隐藏算法[J]. 计算机学报, 2021,44(4): 846-858. |
WU Y Q , GUO Y T , TANG J ,et al. Reversible data hiding in encrypted images using adaptive Huffman encoding strategy[J]. Chinese Journal of Computers, 2021,44(4): 846-858. | |
[49] | 佘晓萌, 杜洋, 马文静 ,等. 基于像素预测和块标记的图像密文图像可逆信息隐藏[J]. 计算机研究与发展,2021:doi.org/10.7544/issn1000-1239.20210495. |
SHE X M , DU Y , MA W J ,et al. Reversible data hiding in encrypted images based on pixel prediction and block labeling[J]. Journal of Computer Research and Development,2021:doi.org/10.7544/issn1000-1239.20210495. | |
[50] | 周旭, 吴福虎, 陈志立 ,等. 密文域高嵌入率图像全位面可逆数据隐藏[J]. 中国图象图形学报, 2021,26(5): 1147-1156. |
ZHOU X , WU F H , CHEN Z L ,et al. All bit planes reversible data hiding for images with high-embedding-rate in ciphertext field[J]. Journal of Image and Graphics, 2021,26(5): 1147-1156. | |
[51] | YU C Q , ZHANG X Q , ZHANG X P ,et al. Reversible data hiding with hierarchical embedding for encrypted images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022,32(2): 451-466. |
[52] | HUA Z Y , WANG Y X , YI S ,et al. Reversible data hiding in encrypted images using cipher-feedback secret sharing[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021,32(8): 4968-4982. |
[53] | YIN Z X , PENG Y Y , XIANG Y Z . Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression[J]. IEEE Transactions on Dependable and Secure Computing, 2022,19(2): 992-1002. |
[54] | WEINBERGER M J , SEROUSSI G , SAPIRO G . LOCO-I:a low complexity,context-based,lossless image compression algorithm[C]// Proceedings of Data Compression Conference-DCC’96. Piscataway:IEEE Press, 1996: 140-149. |
[55] | QU L F , HE H J , CHEN F . On the security of block permutation and co-XOR in reversible data hiding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022,32(3): 920-932. |
[56] | BAS P , FILLER T , PEVNY T , . Break our steganographic system:the ins and outs of organizing BOSS[C]// International Workshop on Information Hiding. Berlin:Springer, 2011: 59-70. |
[57] | BAS P , FURON T . Image database of BOWS-2[R]. 2017. |
[1] | Xiaoni DU, Xiangyu WANG, Lifang LIANG, Kaibin LI. Quantum cryptanalysis of lightweight block cipher Piccolo [J]. Journal on Communications, 2023, 44(6): 175-182. |
[2] | Zhen ZHENG, Yingjian YAN, Juesong CAI, Yanjiang LIU. Non-specific TVLA method based on two-sample KS test [J]. Journal on Communications, 2023, 44(5): 137-147. |
[3] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[4] | Dacheng ZHOU, Hongchang CHEN, Weizhen HE, Guozhen CHENG, Hongchao HU. Research on multidimensional dynamic defense strategy for microservice based on deep reinforcement learning [J]. Journal on Communications, 2023, 44(4): 50-63. |
[5] | Ming TANG, Yifan HU. Load-to-store: exploit the time leakage of store buffer transient window [J]. Journal on Communications, 2023, 44(4): 64-77. |
[6] | Wei LI, Chun LIU, Dawu GU, Wenqian SUN, Jianning GAO, Mengyang QIN. Statistical ineffective fault analysis of the lightweight authenticated cipher algorithm Saturnin-Short [J]. Journal on Communications, 2023, 44(4): 167-175. |
[7] | Yuling LIU, Cuilin WANG, Zhangjie FU. Generative text steganography method based on emotional expression in semantic space [J]. Journal on Communications, 2023, 44(4): 176-186. |
[8] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[9] | Wei FAN, Cheng PENG, Dali ZHU, Yuqing WANG. Research on intrusion response strategy based on static Bayesian game in mobile edge computing network [J]. Journal on Communications, 2023, 44(2): 70-81. |
[10] | Dongyan HUANG, Kun LI. Research on multi-address time-based blockchain covert communication method [J]. Journal on Communications, 2023, 44(2): 148-159. |
[11] | Shufen ZHANG, Yanling DONG, Jingcheng XU, Haoshi WANG. AdaBoost algorithm based on target perturbation [J]. Journal on Communications, 2023, 44(2): 198-209. |
[12] | Shengbao WANG, Xin ZHOU, Kang WEN, Bosen WENG. Tripartite authenticated key exchange protocol for smart grid [J]. Journal on Communications, 2023, 44(2): 210-218. |
[13] | Yiliang HAN, Kaiyang GUO, Riming WU, Kai LIU. Attribute-based encryption scheme against key abuse based on OBDD access structure from lattice [J]. Journal on Communications, 2023, 44(1): 75-88. |
[14] | Chao XIA, Yaqi LIU, Qingxiao GUAN, Xin JIN, Yanshuo ZHANG, Shengwei XU. Steganalysis of JPEG images using non-linear residuals [J]. Journal on Communications, 2023, 44(1): 142-152. |
[15] | Xiaodong FU, Xinxin QI, Li LIU, Wei PENG, Jiaman DING, Fei DAI. Detecting and preventing collusion attack in DPoS based on power index [J]. Journal on Communications, 2022, 43(12): 123-133. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|