Reversible Data Hiding in Block Compressed Sensing Images

ETRI Journal.
2016.
Mar,
38(1):
159-163

- Received : February 27, 2014
- Accepted : September 25, 2015
- Published : March 01, 2016

Download

PDF

e-PUB

PubReader

PPT

Export by style

Share

Article

Metrics

Cited by

TagCloud

Block compressed sensing (BCS) is widely used in image sampling and is an efficient, effective technique. Through the use of BCS, an image can be simultaneously compressed and encrypted. In this paper, a novel reversible data hiding (RDH) method is proposed to embed additional data into BCS images. The proposed method is the first RDH method of its kind for BCS images. Results demonstrate that our approach performs better compared with other state-of-the-art RDH methods on encrypted images.
Proposed architecture.
X
∈ ℝ
^{n}
represent a vectorized signal of a block, and let
Y
∈ ℝ
^{m}
(
m
<
n
) be a number of linear random projections (measurements) obtained from
A
∈ ℝ
^{m×n}
must satisfy a restricted isometry property (RIP) of order
k
(
k
≪
n
). It has been shown that the entries of such a matrix can be chosen according to a Gaussian distribution
[13]
, generated using a random seed.
Figure 2
gives an illustration of CS for a block. The obtained measurement,
Y
, is denoted as a dot. Its square is less than that of the original signal,
X
. When an image is transformed into multiple measurements after BCS, the amount of data is reduced (see
Fig. 3
). Finally, the obtained measurements are assembled to form a BCS image. Thus, the size of the original image is decreased, and any content is concealed. The BCS applied here is secure due to the fact that the underlying measurement matrix used in each block is believed to be secure
[11]
.
CS performed on one block.
BCS of image.
Division of BCS image by measurements.
At the beginning of data embedding, a data hider encrypts any additional data to be embedded with a data-hiding key. It then embeds the
i
th bit of encrypted additional data into the
i
th embeddable measurement (that is, the black dots). If the bit is 0, then it does nothing; else, it replaces measurement
Y
with
Y
′ using
A
×
A
is secret.
Y
, the measurement matrix,
A
, and that
X
is
k
-sparse, we can reconstruct the original signal,
X
, approximately by solving the following
ℓ
_{1}
minimization problem
[13]
:
X
is not sparse, but it has a sparse representation in some orthonormal bases. Let
Φ
∈ ℝ
^{n×n}
denote an orthonormal matrix whose columns are the basis vectors. Then,
X
can be represented as
Φα
, where
α
is nearly
k
-sparse. Given the measurements
Y
=
AX
, the original signal
X
can be recovered by solving the following minimization problem:
Y
′, where
X
; that is, a flipped
X
.
Due to the spatial correlation of natural images, any border pixels between two unflipped blocks are smoother than those that have been flipped. Since the neighboring blocks of
X
are all unflipped (as shown in
Fig. 4
; the blocks with a white dot inside cannot be flipped by data embedding), a flipped
X
can be identified according to the following side match method.
Suppose there are four neighboring blocks around
X
. Let
p_{u,v}
denote the pixel value at position (
u
,
v
) in the block represented by
X
of size
s
_{1}
×
s
_{2}
. The fluctuation function of the block sides can then be defined as
p
_{0,v}
,
p
_{s1+1,v}
,
p
_{u,0}
, and
p
_{u,s2+1}
fall into the neighboring blocks.
Similarly, the fluctuation function of a flipped
X
can be computed from
X
.
If
f
<
f
′ which means the block sides of the recovered
X
are smoother than that of the flipped
X
, then the recovered
X
is considered unflipped, and the bit embedded in it is 0; otherwise,
X
is considered flipped during the data embedding procedure, and the bit embedded in it is then 1. Moreover,
X
can then be flipped again to obtain the final recovered signal.
At last, all the recovered signals are collected to form the recovered image, and all the extracted bits are concatenated and then decrypted using the data-hiding key to obtain the final extracted data.
X
) can be orthogonally decomposed into sparse discrete cosine transformation coefficients. The orthogonal matching pursuit is used to reconstruct the image. We set the compression ratio to be 0.8; thus, the size of the original image is decreased to 80%. The results are shown in
Fig. 5
, where (a) is the original image and (b) is the final recovered image after 2,048 bits are embedded (its PSNR value is 33.90). The embedded bits are extracted perfectly, and the recovered image is exactly the same as that obtained directly from a BCS image with no additional data embedded. For the next image, named Baboon, the settings are the same as above, and the experimental results show almost the worst case of image recovery using the proposed method. In
Fig. 6(b)
, although it seems the same as
Fig. 6(a)
, there exist 50 incorrect recovered blocks; that is, about 1.2% of the blocks have been flipped compared with the original BCS image, and the PSNR is 24.44. However, if the block is 16 × 16, then correct data-extraction and perfect image recovery can both be ensured.
Lena: (a) original image and (b) final recovered image.
Baboon: (a) original image and (b) final recovered image.
In further experiments, we randomly selected 50 natural images sized 512 × 512 from
[14]
and presented the average exacted bit-error rate comparison.
BCS is a lossy compression method, but the compression is based on blocks. Each block corresponds to one measurement, and each measurement can carry one bit of any additional data to be embedded. Similarly, in the block division–based methods
[1]
and
[6]
, which are for uncompressed images, one image block is also responsible for carrying one bit. Therefore,
[1]
,
[6]
, and the recent improved version
[7]
,
[8]
are compared with our method. For a fair comparison, the average exacted bit-error rates are computed under different embedding rates (bits per pixel (bpp)) rather than data embedding capacity (bits).
It is noticed that in
[1]
and
[6]
–
[8]
, the content owner encrypts but does not compress the original image
I
to obtain
E
(
I
), and the data hider embeds data into
E
(
I
). A user can extract data from the embedded
E
(
I
) and try to losslessly restore the original image
I
. However, in the proposed method, the original image
I
is encrypted and compressed by BCS, and from a BCS image one can only obtain an estimated version of
I
, denoted by
I
′. The data hider embeds data into the BCS image. A user can extract data from the embedded BCS image (that is, a BCS image containing embedded data) and try to restore
I
′ rather than the original image
I
. Therefore, the embedding rate of our method should be “bpp of
I
′” rather than “bpp of
I
,” but the results of the two are equal to each other.
The comparison results are shown in
Fig. 7
. When the side length of a block is set to be 32 (respectively, 16, 8), the embedding rates of Zhang’s method
[1]
and Hong and others’ method
[6]
are both 0.0010 (respectively, 0.0039, 0.0156), and it is 0.0005 (respectively, 0.0020, 0.0078) using the proposed method. Since Li and others’ methods,
[7]
and
[8]
, break the idea of block division and can achieve arbitrarily assigned embedding rates, we calculate the average extracted bit-error rates under each given embedding rate on the horizontal axis. The error rates are calculated as the ratio of the number of incorrectly recovered embedded bits to the total number of embedded bits. As shown in
Fig. 7
, it is clear that the error rates of the proposed method are significantly lower than that of
[1]
and
[6]
–
[8]
. The main reason is that the correctness of the border-concatenated pixels of the unflipped blocks can be ensured, which can help with the recovery of blocks containing any additional data, as well as with the extraction of any embedded bits. Furthermore, the proposed method shows more steady performance.
Average extracted BER comparison.
The work was supported by the National Natural Science Foundation of China (Grant Nos. 61173178, 61272043, 61302161, 61472464, 61502399, and 61572089), the Fundamental Research Funds for the Central Universities (Grant Nos. XDJK2015C077, 106112013CDJZR180005, and 106112014CDJZR185501), the Natural Science Foundation Project of Chongqing CSTC (Grant Nos. cstc2012jjA40017, cstc2013jcyjA40017, cstc2013jjB40009, and cstc2015jcyjA40039), the Key Program of the Higher Education Institutions of Henan Province (Grant No. 15A520020), the PhD Scientific Research Foundation of Henan Normal University (Grant No. qd14134), and the Science Foundation for Young Scholars of Henan Normal University (Grant No. 2014QK20).
liming@htu.edu.cn
Ming Li received his MS degree in science from the College of Physics and Information Engineering, Henan Normal University, Xinxiang, China, in 2010 and his PhD degree in engineering from the College of Computer Science, Chongqing University, China, in 2014. Since 2014, he has been with the College of Computer and Information Engineering, Henan Normal University, where he is now an associate professor. His main research interests include multimedia security, information hiding, and compressed sensing.
Corresponding Author xiaodi_cqu@hotmail.com
Di Xiao received his PhD degree in computer software and theory from Chongqing University, China, in 2005. From 2006 to 2008, he conducted postdoctoral research at Chongqing University, Chongqing, China. From 2008 to 2009, he was a visiting scholar, funded by the Chinese government, with the Department of Computer Science, New Jersey Institute of Technology, Newark, USA. Currently, he is a professor at the College of Computer Science, Chongqing University. His main research interests include image processing, chaos-based cryptography, image watermarking, and compressed sensing. He is a member of IEEE and ACM.
mishuzhang@foxmail.com
Yushu Zhang received his BS degree in science from the Department of Mathematics, North University of China, Taiyuan, China, in 2010 and his PhD degree in engineering from the College of Computer Science, Chongqing University, China, in 2014. Since 2014, he has been with the School of Electronics and Information Engineering, Southwest University, Chongqing, China, where he is now an associate professor. His main research interests include multimedia security, multimedia coding, and compressed sensing.

I. Introduction

Reversible data hiding (RDH) is a technology that embeds a secret message into a cover image in a reversible manner. In recent years, to protect the privacy of a cover image during an RDH process, attentions have been drawn to the research of RDH in encrypted images. In
[1]
, Zhang proposed an RDH method for use with an image that has been fully encrypted using a standard stream cipher. Given such an encrypted image, we first divide it into several blocks. Then, by flipping the three least significant bits (LSBs) of every eight in each pixel for half of the pixels in each block, additional data can be embedded. Data extraction and image recovery is then carried out through a determination of which pixels have been flipped within each block. To separate data extraction from image decryption, Zhang
[2]
emptied out space for data embedding based on an idea for compressing encrypted images
[3]
,
[4]
.
Ma and others
[5]
proposed an RDH method for encrypted images, and within this method, space meant for data embedding is reserved prior to any image encryption. In the methods of
[2]
–
[5]
, an extra processing step (that is, image compression) is required. Zhang’s method
[1]
is a classical block division–based method — one that was improved upon later by
[6]
–
[8]
. However, the extracted bit-error rate of the improved methods in
[6]
–
[8]
is still unsatisfactory. In addition, an encrypted image cannot be compressed — a fact that can result in high communication overheads.
By using compressed sensing (CS)
[9]
, both compression
[10]
and encryption
[11]
can be achieved simultaneously. For natural image sampling, block compressed sensing (BCS)
[12]
is widely used for its high computing speed and ease of implementation. BCS images may have broader application prospects compared with stream cipher–encrypted images due to the fact that the communication overhead of BCS images is lower. However, so far, there has been no RDH method proposed for BCS images. Therefore, we offer a solution to this kind of application in this paper.
II. Proposed Method

As illustrated in
Fig. 1
, an original image is first sampled by a content owner using BCS to obtain a BCS image according to a Gaussian measurement matrix generated from a secret seed. Then, additional data can be embedded into the obtained BCS image by a data hider in accordance with a data-hiding key. When the receiver possesses both the data-hiding key and the secret seed (both of which are required to generate a measurement matrix), then the image can be recovered and any embedded data may be extracted at the same time.
PPT Slide

Lager Image

- 1. BCS

At the initial stage of our proposed architecture, an original image is divided into non-overlapping blocks, each of which is of the same size. For each block, let
(1) Y=AX.

The measurement matrix
PPT Slide

Lager Image

- 2. Data Embedding

In
Fig. 3
, each dot (measurement) corresponds to an image block. To embed data into a BCS image, we first divide the measurements into two categories — embeddable and un-embeddable. In
Fig. 4
, the measurements denoted by the black dots are used for data embedding, and the white dots are set to be un-embeddable. Here, we assume that one dot can carry one bit, and the number of bits of any additional data is smaller than that of the black dots. Obviously, the embedding capacity varies with the block size.
PPT Slide

Lager Image

PPT Slide

Lager Image

(2) Y ′ =A× 255 → −Y,

where
255 →

denotes a block in which the values of its pixels are all set to be 255. It is noted that only the result of
255 →

can be known to the data hider. The measurement matrix
- 3. Data Extraction and Image Recovery

Knowing the measurements,
(3) minimize ||X| | 1 s.t. Y=AX.

For natural images, the original signal
(4) minimize ||α| | 1 s.t. Y=AΦα.

In the case of modified measurements,
(5) Y ′ =A× 255 → −Y =A× 255 → −A×X =A×( 255 → −X),

the recovered signal should be
255 →

−
(6) f= ∑ v=1 s 2 (| p 0,v − p 1,v |+| p s 1 ,v − p s 1 +1,v |) + ∑ u=1 s 1 (| p u,0 − p u,1 |+| p u, s 2 − p u, s 2 +1 |),

where
(7) f ′ = ∑ v=1 s 2 (| p 0,v − p ¯ 1,v |+| p ¯ s 1 ,v − p s 1 +1,v |) + ∑ u=1 s 1 (| p u,0 − p ¯ u,1 |+| p ¯ u, s 2 − p u, s 2 +1 |),

where
p ¯ u,v

denotes a flipped pixel value of
III. Experimental Results

A standard test image, named Lena and of size 512 × 512, is tested first. Assume the size of a divided block to be 8 × 8. Then, the original signal of the block (that is,
PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

IV. Conclusion

The first ever RDH method for BCS images is proposed in this paper. Experiments show that the proposed method can outperform existing RDH methods in encrypted images.
BIO

Zhang X.
2011
“Reversible Data Hiding in Encrypted Image,”
IEEE Signal Process. Lett.
18
(4)
255 -
258
** DOI : 10.1109/LSP.2011.2114651**

Zhang X.
2012
“Separable Reversible Data Hiding in Encrypted Image,”
IEEE Trans. Inf. Forensics Security
7
(2)
826 -
832
** DOI : 10.1109/TIFS.2011.2176120**

Liu W.
2010
“Efficient Compression of Encrypted Grayscale Images,”
IEEE Trans. Image Process.
19
(4)
1097 -
1102
** DOI : 10.1109/TIP.2009.2038773**

Zhang X.
2014
“Efficient Reversible Data Hiding in Encrypted Images,”
J. Vis. Commun. Image Representation
25
(2)
322 -
328
** DOI : 10.1016/j.jvcir.2013.11.001**

Ma K.
2013
“Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption,”
IEEE Trans. Inf. Forensics Security
8
(3)
553 -
562
** DOI : 10.1109/TIFS.2013.2248725**

Hong W.
,
Chen T.-S.
,
Wu H.-Y.
2012
“An Improved Reversible Data Hiding in Encrypted Images Using Side Match,”
IEEE Signal Process. Lett.
19
(4)
199 -
202
** DOI : 10.1109/LSP.2012.2187334**

Li M.
2014
“A Modified Reversible Data Hiding in Encrypted Images Using Random Diffusion and Accurate Prediction,”
ETRI J.
36
(2)
325 -
328
** DOI : 10.4218/etrij.14.0213.0449**

Li M.
2015
“Improved Reversible Data Hiding for Encrypted Images Using Full Embedding Strategy,”
Electron. Lett.
51
(9)
690 -
691
** DOI : 10.1049/el.2014.4476**

Donoho D.L.
2006
“Compressed Sensing,”
IEEE Trans. Inf. Theory
52
(4)
1289 -
1306
** DOI : 10.1109/TIT.2006.871582**

Gao Z.
2013
“Image Representation Using Block Compressive Sensing for Compression Applications,”
J. Vis. Commun. Image Representation
24
(7)
885 -
894
** DOI : 10.1016/j.jvcir.2013.06.006**

Rachlin Y.
,
Baron D.
“The Secrecy of Compressed Sensing Measurements,”
Annual Allerton Conf. Commun., Contr. Comput.
Urbana-Champaign, IL, USA
Sept. 23–26, 2008
813 -
817

Gan L.
“Block Compressed Sensing of Natural Images,”
Int. Conf. Digital Signal Process.
Cardiff, UK
July 1–4, 2007
403 -
406

Eldar Y.C.
,
Kutyniok G.
2012
“Compressed Sensing: Theory and Applications,”
Cambridge University Press
NY, USA
226 -
232

Rodríguez-Sánchez R.
2014
Miscellaneous Gray Level Images (512×512)
Computer Vision Group. University of Granada
http://decsai.ugr.es/cvg/dbimagenes/g512.php

Citing 'Reversible Data Hiding in Block Compressed Sensing Images
'

@article{ HJTODO_2016_v38n1_159}
,title={Reversible Data Hiding in Block Compressed Sensing Images}
,volume={1}
, url={http://dx.doi.org/10.4218/etrij.16.0114.0242}, DOI={10.4218/etrij.16.0114.0242}
, number= {1}
, journal={ETRI Journal}
, publisher={Electronics and Telecommunications Research Institute}
, author={Li, Ming
and
Xiao, Di
and
Zhang, Yushu}
, year={2016}
, month={Mar}