6
1486 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 16, NO. 5, AUGUST 2014 Correspondence Reversible Data Hiding in Encrypted JPEG Bitstream Zhenxing Qian, Xinpeng Zhang, and Shuozhong Wang Abstract—This correspondence proposes a framework of reversible data hiding (RDH) in an encrypted JPEG bitstream. Unlike existing RDH methods for encrypted spatial-domain images, the proposed method aims at encrypting a JPEG bitstream into a properly organized structure, and embedding a secret message into the encrypted bitstream by slightly mod- ifying the JPEG stream. We identify usable bits suitable for data hiding so that the encrypted bitstream carrying secret data can be correctly de- coded. The secret message bits are encoded with error correction codes to achieve a perfect data extraction and image recovery. The encryption and embedding are controlled by encryption and embedding keys respectively. If a receiver has both keys, the secret bits can be extracted by analyzing the blocking artifacts of the neighboring blocks, and the original bitstream perfectly recovered. In case the receiver only has the encryption key, he/she can still decode the bitstream to obtain the image with good quality without extracting the hidden data. Index Terms—Encrypted image, image recovery, information hiding, JPEG, reversible data hiding. I. INTRODUCTION Reversible data hiding (RDH) is a technique that embeds secret in- formation into a cover image in a reversible manner. On the receiving side, the hidden message can be extracted and the original image per- fectly restored. This technique is especially useful in applications such as medical and military imaging where the original image must not be altered after the embedded data are extracted [1], [2]. Unlike robust watermarking, RDH emphasizes perfect image reconstruction and data extraction, but not the robustness against malicious attacks [1], [3], [4]. This is useful, for example, in cloud storage. When a database manager tries to label the les using RDH methods, no transmission is involved, therefore no errors and attacks either. Essentially, RDH is realized by making use of redundancy in the original image. Kalker and Willems established several models for RDH, and derived the upper bounds of embedding capacity for dif- ferent applications based on the information theory [3], [4]. Fridrich et al. proposed a general RDH framework in which some room is created by lossless compression to carry embedded secret bits as Manuscript received September 10, 2013; revised December 10, 2013; ac- cepted April 02, 2014. Date of publication April 08, 2014; date of current ver- sion July 15, 2014. This work was supported in part by the Natural Science Foundation of China under Grant 61103181 , Shanghai Rising-Star Program under Grant 14QA1401900 , the Research Fund for the Doctoral Program of Higher Education of China under Grant 20113108110010 , the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning, and Shanghai Pujiang Program under Grant 13PJ1403200 . The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Shahram Shirani. The authors are with the School of Communication and Information Engi- neering, Shanghai University, Shanghai 200444, China (e-mail: zxqian@shu. edu.cn). Color versions of one or more of the gures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identier 10.1109/TMM.2014.2316154 an appendix [1]. One popular approach is the difference expansion (DE) method in which differences of pixel groups are calculated and expanded to accommodate additional bits [5]. Another is the histogram shifting (HS) that hides secret bits by shifting the histogram of pixel values [6]. Other RDH methods have been proposed to improve embedding efciency, e.g., the schemes making use of new prediction or error expansion algorithms [7]–[9], or generating RDH codes according to the theoretical expressions of RDH [10], [11]. Generally, these RDH methods are useful for embedding data into images that are open to the data-hider. In some applications, however, the image owner may be unwilling to disclose the image contents to the data-hider. For example, the patient’s private information must not be revealed to the person who embeds data into the medical image, while the original image must be perfectly recovered and the embedded data completely extracted on the receiver end. In this case, the channel provider has to append additional messages such as image metadata, notation and authentication information to the encrypted version of the original images. RDH in encrypted images is also suitable for the buyer-seller system [12]–[14]. The seller of digital multimedia content encrypts the original data and embeds an encrypted ngerprint supplied by the buyer. In this case, the seller cannot obtain the buyer’s nger- print, and the buyer cannot access the original version unless he/she makes the payment to complete the transaction. Some methods of RDH in encrypted images have been proposed. In [15], Zhang divides the encrypted image into blocks, and embeds one bit into each block by ipping three LSBs of half the pixels in the block. On the receiver side, the secret bits are extracted and the orig- inal image recovered by analyzing the uctuation of the pixel values in every decrypted block. Hong et al. improved Zhang’s method by exploiting correlation of the border between neighboring blocks, and using a side-match scheme to achieve a low error rate [16]. Zhang fur- ther proposed a separable RDH scheme for encrypted images by com- pressing the encrypted data using a source coding scheme with side information, making data extraction independent of encryption [17]. Recently, Ma et al. proposed an RDH method for encrypted images by reserving some room before encryption [18]. To do so, LSBs of some pixels are rst embedded into other pixels using a traditional RDH method, and the image is then encrypted. As a result, positions of these LSBs in the encrypted image can be used for embedding information with the data-hider. The methods in [15]–[18] are all designed for uncompressed im- ages. As JPEG is widely used, in this correspondence we propose a novel RDH framework to hide data in an encrypted JPEG bitstream. The scheme is dened to perturb the principal content of the original image while preserving the bitstream structure. The secret bits are en- coded with error correction codes and then embedded into the JPEG bit- stream. On the receiving side, blocking artifacts of neighboring blocks are used to extract the secret bits and perfectly restore the original bitstream. The rest of this paper is organized as follows. Section II briey in- troduces the framework of the proposed method. The bitstream parsing and encryption are explained in Section III followed by data hiding is- sues in Section IV. Reversibility using blocking artifacts is presented in Section V. Experiments with analysis and comparisons are given in Section VI. Section VII concludes the paper. 1520-9210 © 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Correspondence - Shuowang's Main Pageshuowangimage.com/academia/files/2014 Reversible Da… ·  · 2014-07-18Reversible Data Hiding in Encrypted JPEG Bitstream ... Xinpeng Zhang,

  • Upload
    ngonga

  • View
    217

  • Download
    0

Embed Size (px)

Citation preview

1486 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 16, NO. 5, AUGUST 2014

Correspondence

Reversible Data Hiding in Encrypted JPEG Bitstream

Zhenxing Qian, Xinpeng Zhang, and Shuozhong Wang

Abstract—This correspondence proposes a framework of reversibledata hiding (RDH) in an encrypted JPEG bitstream. Unlike existing RDHmethods for encrypted spatial-domain images, the proposed method aimsat encrypting a JPEG bitstream into a properly organized structure, andembedding a secret message into the encrypted bitstream by slightly mod-ifying the JPEG stream. We identify usable bits suitable for data hidingso that the encrypted bitstream carrying secret data can be correctly de-coded. The secret message bits are encoded with error correction codes toachieve a perfect data extraction and image recovery. The encryption andembedding are controlled by encryption and embedding keys respectively.If a receiver has both keys, the secret bits can be extracted by analyzingthe blocking artifacts of the neighboring blocks, and the original bitstreamperfectly recovered. In case the receiver only has the encryption key,he/she can still decode the bitstream to obtain the image with good qualitywithout extracting the hidden data.

Index Terms—Encrypted image, image recovery, information hiding,JPEG, reversible data hiding.

I. INTRODUCTION

Reversible data hiding (RDH) is a technique that embeds secret in-formation into a cover image in a reversible manner. On the receivingside, the hidden message can be extracted and the original image per-fectly restored. This technique is especially useful in applications suchas medical and military imaging where the original image must notbe altered after the embedded data are extracted [1], [2]. Unlike robustwatermarking, RDH emphasizes perfect image reconstruction and dataextraction, but not the robustness against malicious attacks [1], [3], [4].This is useful, for example, in cloud storage. When a database managertries to label the files using RDHmethods, no transmission is involved,therefore no errors and attacks either.Essentially, RDH is realized by making use of redundancy in the

original image. Kalker and Willems established several models forRDH, and derived the upper bounds of embedding capacity for dif-ferent applications based on the information theory [3], [4]. Fridrichet al. proposed a general RDH framework in which some room iscreated by lossless compression to carry embedded secret bits as

Manuscript received September 10, 2013; revised December 10, 2013; ac-cepted April 02, 2014. Date of publication April 08, 2014; date of current ver-sion July 15, 2014. This work was supported in part by the Natural ScienceFoundation of China under Grant 61103181 , Shanghai Rising-Star Programunder Grant 14QA1401900 , the Research Fund for the Doctoral Program ofHigher Education of China under Grant 20113108110010 , the Program forProfessor of Special Appointment (Eastern Scholar) at Shanghai Institutions ofHigher Learning, and Shanghai Pujiang Program under Grant 13PJ1403200 .The associate editor coordinating the review of this manuscript and approvingit for publication was Dr. Shahram Shirani.The authors are with the School of Communication and Information Engi-

neering, Shanghai University, Shanghai 200444, China (e-mail: [email protected]).Color versions of one or more of the figures in this paper are available online

at http://ieeexplore.ieee.org.Digital Object Identifier 10.1109/TMM.2014.2316154

an appendix [1]. One popular approach is the difference expansion(DE) method in which differences of pixel groups are calculatedand expanded to accommodate additional bits [5]. Another is thehistogram shifting (HS) that hides secret bits by shifting the histogramof pixel values [6]. Other RDH methods have been proposed toimprove embedding efficiency, e.g., the schemes making use of newprediction or error expansion algorithms [7]–[9], or generating RDHcodes according to the theoretical expressions of RDH [10], [11].Generally, these RDH methods are useful for embedding data into

images that are open to the data-hider. In some applications, however,the image owner may be unwilling to disclose the image contents tothe data-hider. For example, the patient’s private information must notbe revealed to the person who embeds data into the medical image,while the original imagemust be perfectly recovered and the embeddeddata completely extracted on the receiver end. In this case, the channelprovider has to append additional messages such as image metadata,notation and authentication information to the encrypted version ofthe original images. RDH in encrypted images is also suitable for thebuyer-seller system [12]–[14]. The seller of digital multimedia contentencrypts the original data and embeds an encrypted fingerprint suppliedby the buyer. In this case, the seller cannot obtain the buyer’s finger-print, and the buyer cannot access the original version unless he/shemakes the payment to complete the transaction.Some methods of RDH in encrypted images have been proposed.

In [15], Zhang divides the encrypted image into blocks, and embedsone bit into each block by flipping three LSBs of half the pixels in theblock. On the receiver side, the secret bits are extracted and the orig-inal image recovered by analyzing the fluctuation of the pixel valuesin every decrypted block. Hong et al. improved Zhang’s method byexploiting correlation of the border between neighboring blocks, andusing a side-match scheme to achieve a low error rate [16]. Zhang fur-ther proposed a separable RDH scheme for encrypted images by com-pressing the encrypted data using a source coding scheme with sideinformation, making data extraction independent of encryption [17].Recently, Ma et al. proposed an RDH method for encrypted images byreserving some room before encryption [18]. To do so, LSBs of somepixels are first embedded into other pixels using a traditional RDHmethod, and the image is then encrypted. As a result, positions of theseLSBs in the encrypted image can be used for embedding informationwith the data-hider.The methods in [15]–[18] are all designed for uncompressed im-

ages. As JPEG is widely used, in this correspondence we propose anovel RDH framework to hide data in an encrypted JPEG bitstream.The scheme is defined to perturb the principal content of the originalimage while preserving the bitstream structure. The secret bits are en-codedwith error correction codes and then embedded into the JPEG bit-stream. On the receiving side, blocking artifacts of neighboring blocksare used to extract the secret bits and perfectly restore the originalbitstream.The rest of this paper is organized as follows. Section II briefly in-

troduces the framework of the proposed method. The bitstream parsingand encryption are explained in Section III followed by data hiding is-sues in Section IV. Reversibility using blocking artifacts is presentedin Section V. Experiments with analysis and comparisons are given inSection VI. Section VII concludes the paper.

1520-9210 © 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

QIAN et al.: REVERSIBLE DATA HIDING IN ENCRYPTED JPEG BITSTREAM 1487

Fig. 1. Sketch of the proposed framework.

II. GENERAL FRAMEWORK

The general framework of the proposed scheme is sketched in Fig. 1.Consider the three parties in the entire workflow of encryption-embed-ding-extraction-restoration: content owner, data hider, and receiver,whose roles are described as follows.Content owner: Parse the original JPEG bitstream and encrypt the

bitstream to conceal the principal content of the original image. Anencryption key is chosen by the content owner. The encrypted bitstreammust have the same structure as the original so that it can be decodedcorrectly to give an undistorted image.Data hider: Embed the secret message into the encrypted JPEG bit-

stream. Suitable positions for data hiding are chosen, and the achiev-able embedding capacity calculated. Encode plain bits into secretbitswith error correction codes (ECC). The word plain is associated withthe original message to be transmitted, and secret corresponds to theECC-encoded and encrypted secret bits. An embedding key is used bythe data-hider for security.Receiver: Extract the secret message and recover the JPEG bit-

stream. With both the encryption key and embedding key, the secretbits are extracted and decoded into plain bits, and the original JPEGbitstream is perfectly restored. If the receiver only has the encryptionkey, an image with good quality can still be obtained approximately.

III. BITSTREAM PARSING AND ENCRYPTION

A. JPEG Bitstream Parsing

According to JPEG standard [19], an image is decomposed to a setof quantized DCT coefficients in non-overlapped blocks, andthen coded into a bitstream with entropy encoding. During entropy en-coding, the DC coefficients and the AC coefficients are handled sep-arately. The DC coefficients are coded with the Huffman codes afterusing a one-dimensional predictor. For AC coefficients, since there aremany zeros, the coefficients are efficiently encoded with the run lengthcoding (RLC). The quantization tables and Huffman/VLC coding ta-bles are defined and stored in the JPEG file header, which are vital forentropy encoding and decoding.The entropy encoded bits are structured by the Huffman codes and

the corresponding appended bits, as shown in Fig. 2, in which theHuffman code identifies the range of the coefficient magnitude and thelength of appended bits.Bitstream parsing is a part of the entropy decoding, which analyzes

the compressed bits according to the JPEG structure and the Huffmantables extracted from the JPEG file header. Suppose we have a JPEG

Fig. 2. Encoding structure for each coefficient.

bitstream obtained by compressing the original image sized .Divide into segments, each corresponding to an blockof . Details of the division can found in [19]. For the ( )-th block,

, , the encoded bits can be represented by

where , and are vectors of binary bits, thecompressed bits of the ( )-th block, the Huffman code, and

the appended bits. Here stand for the encodedbits of DC coefficients, and ( ) the bits of ACcoefficients.

B. Bitstream Encryption

We aim at encrypting a JPEG bitstream into the one that can be de-coded into an unrecognizable image directly by a JPEG decoder. Due tothe strict structure of JPEG data, any alteration on individual bit maycause the failure of decoding. Therefore, special care is taken in thepresent work to devise a JPEG encryption scheme.For that purpose, we do the encryption according to the encoding

structure by selecting and modifying the changeable bits. The encryp-tion procedure consists of two steps, encryption of the appended bitsand encryption of the quantization table.In the first step, parse the JPEG bitstream, and divide the compressed

bits in into segmentscorresponding to all blocks. Extract the vectors of all seg-ments , , , , , and concatenatethem to form a new vector,

Denote the vector as where is the numberof all appended bits.

1488 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 16, NO. 5, AUGUST 2014

Fig. 3. JPEG bitstream encryption: the left is original, and the right encrypted.

With a standard stream cipher function (e.g. RC4 or DES in CFBmode), generate a bit sequence based on an en-cryption key - to ensure that the original bits cannot be retrievedwithout the key. Calculate exclusive-or of and to generate a newsequence :

(1)

Replace all in the original bitstream with the encrypted bits .Subsequently, we encrypt the quantization tables stored in the JPEG

file header. Extract the binary bits corresponding to thequantization tables from the file header, and replace them with

, where are pseudo-ran-domly generated bits using another encryption key - , and isthe amount of the binary bits of the quantization tables.Thus, an encrypted bitstream is generated. Since the file structure

and the Huffman codes are kept unchanged, the encrypted bitstream isstill decodable. However, the contents become unrecognizable becausethe quantization tables and all the appended bits are encrypted. Fig. 3is an example of JPEG image encryption, in which (a) is the imagedecoded from the original JPEG bitstream, and (b) an unrecognizableimage decoded from the compressed bitstream.

IV. DATA HIDING IN ENCRYPTED BITSTREAM

A. Locating Appropriate Embedding Positions

When the data hider receives the encrypted bitstream , althoughhe/she does not know the contents of the original image, additionaldata can still be embedded into the image by modifying some bits of .To locate the appropriate embedding positions, the following two

selection rules are set:i) Select every other block as a candidate for data hiding, which,for example, meets the condition ( ) being an even number( , ).

ii) If all AC coefficients of a candidate block are zero, the blockshould be skipped.

An example is given in Fig. 4, in which the dark blocks are used fordata hiding, and the shaded blocks skipped. It should be noted at thispoint that, to embed data, it is unnecessary to decode the bitstreaminto an encrypted image. Nonetheless, for easy description in the fol-lowing, one might imagine there were an encrypted image decom-pressed from .Let each usable block carry one secret bit, thus the embedding

capacity of the bitstream, , is equal to the number of usable blocks.Each block corresponds to one bitstream segment. Divide into

bitstream segmentsby bitstream parsing. According to the two selection rules, us-able segments can be identified. Denote these usable segments

Fig. 4. Usable bocks in the “encrypted image”.

as . From the -th usable segment( ), the data hider extracts all appended vectors

of AC coefficients, and embeds one secret bitinto each segment.

B. Data Embedding

Before data hiding, error correction codes are used to encode theplain message bits. Assuming codes are used, a total of plainbits can be embedded into the bitstream, where

(2)

Therefore the actual number of bits embedded into the bitstream is

(3)

We call the embedding capacity, and the net capacity thatis the capacity of the plain message bits. Then, the plain bits

are encoded into ,

(4)

ECC is an error correction function. Several ECC algorithmscan be used to ensure correct extraction of the secret data, e.g.,convolutional codes, turbo codes, and Low Density Parity Check(LDPC) codes. Using an embedding key , the data hider per-mutes the ECC-encoded bits into pseudo-randomly distributed bits

.For the -th usable segment ( ), the bit is em-

bedded into the extracted . Suppose

in which each vector consists of bits. Embed the secret bitinto by

In this way, all the bits in are embedded into the usable segments.Then, a new bitstream containing secret data is generated.

QIAN et al.: REVERSIBLE DATA HIDING IN ENCRYPTED JPEG BITSTREAM 1489

Fig. 5. Evaluation of blocking artifact.

V. REVERSIBILITY USING BLOCKING ARTIFACTS

After receiving the encrypted JPEG bitstream that carries em-bedded secret bits, the receiver should reversibly extract the hiddendata and recover the original bitstream, using both the encryption andembedding keys. To this end, the blocking artifacts in the image causedby data hiding are utilized.

A. Definition of Blocking Artifact Function

During data hiding, each secret bit is embedded into one usable seg-ment by modifying some of the appended bits. Thus the correspondingAC coefficients in the usable blocks are possibly modified, which, inmost cases, may introduce blocking artifacts between a usable blockand its neighboring blocks. Here we define the blocking artifact func-tion, which will be used during data extraction and image recovery.As shown in Fig. 5, consider a data-carrying block , and its

neighbors , , , and . The blocking artifacts of canbe evaluated by

(5)

BAF is the blocking artifact function.

B. Data Extraction and Image Recovery

Having received the encrypted JPEG bitstream that carriesembedded secret bits, the receiver first decrypts the bitstreamusing the encryption keys. Random bits and

are generated with the keys - and -respectively. Next, the bitstream is parsed to extract the en-crypted bits of the quantization table from theheader, and the original bits of the quantization table recovered:

. All ap-pended bits are collected and replaced with

. Thus, a decrypted JPEG bitstream

is obtained.With the selection rules defined in Section IV, the usable segments

in can be identified. Extract the appended vectors of AC coefficients

of all usable segments. Denote the set of the corresponding appendedbits as

where . Generate a new set from byexclusive-OR:

Replace with in the decrypted bitstream to gen-erate a reference bitstream .Decompress the bitstream into an image , and into a refer-

ence image . Divide the images into blocks. Identify the us-able blocks in and , respectively, using the two selection rules de-

fined in Section IV. Denote the usable blocks as and ,. Clearly, there are only data-carrying blocks in

.Now, estimate the blocking artifacts of each data-carrying block in

using BAF. For the data-carrying block and in images

and , respectively, the blocking artifacts are and. Thus the embedded bits can be determined:

ifotherwise

Once the embedded bits are extracted, reorder these bits to pro-duce according to the embedding key . Correct the potentialerrors in using the ECC decoding algorithm to find the original se-cret bits , and extract the original plain message bits :

(6)

Finally, the original image is restored according to by replacingthe data-carrying blocks in with the corresponding blocks in . First,set the recovered image to be , and then determine the content ofall data-carrying blocks in by

if

otherwise(7)

Thus, the original image of the JPEG bitstream is perfectly restored.

VI. EXPERIMENTAL RESULTS

All images used in the experiments are standard gray-scale imagessized . We compress these into JPEG bitstreams using dif-ferent quality factors. LDPC codes are used for error correction usingthe parity-check matrix proposed in [20] to generate LDPC codes, inwhich , and the belief propagation algorithm is used inLDPC decoding. Details of the LDPC algorithm can be found in [21].Fig. 6 gives an example where (a) is the original JPEG image with

a quality factor , and (b) is an encrypted image carrying secretdata, which contains 1980 secret bits ( ) obtained from 750message bits using LDPC codes. The image in (c) is decrypted fromthe received bitstream using the encryption keys - and - .

1490 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 16, NO. 5, AUGUST 2014

Fig. 6. Encryption and image recovery: (a) orginal JPEG image, (b) encryptedimage carrying secret data, (c) decrypted, and (d) recovered.

TABLE IEMBEDDING CAPACITY (BITS) OF JPEG BITSTREAM FOR ERROR-FREE

EXTRACTION WHEN QUALITY FACTOR EQUALS 80, 50, AND 20, RESPECTIVELY

PSNR of (c) is 38.0 dB with respect to (a). After extracting the em-bedded 750 message bits from (c), the original image is perfectly re-covered as shown in (d), which is identical to (a).Table I lists embedding capacities (in bits) of the tested JPEG

images, using quality factors 80, 50, and 20, respectively. The em-bedding capacity and the net capacity are calculated according to

of the LDPC codes, which is chosen for each image to guaranteethat no error occurs in the extracted message. The number of usableblocks changes corresponding to different quality factors. The largerthe quality factor, the more blocks are usable for data hiding. Netcapacity of JPEG bitstream is always limited by image compressionand encryption. Nonetheless, this level of payload is sufficient formany practical applications, e.g., labeling a sized imageusing dozens of characters, or hiding several hundred authenticationbits for image protection.When using blocking artifacts for data extraction, error may happen

in the judgment. Fig. 7 shows accuracy of extracting bits from the bit-stream carrying secret data, corresponding to different quality factors.

TABLE IIEMBEDDING CAPACITY (BITS) OFIMAGES WITH DIFFERENT RDH METHODS

Fig. 7. Accuracy of extracted hidden data using blocking artifacts before errorcorrection, corresponding to different quality factors.

Fig. 8. Quality of decrypted images at different JPEG quality factors.

In most cases, extraction accuracy is close to 0.9, indicating small errorprobability of data extraction. These errors can be eliminated by LDPCdecoding, thus showing effectiveness of using blocking artifacts in thedata extraction.If the receiver does not have the embedding key, but possesses the

encryption keys only, the image can still be decrypted from the en-crypted bitstream, naturally with some distortion. Fig. 8 shows PSNRof the decrypted image corresponding to different JPEG quality fac-tors. It is observed that, compared to the original JPEG image, qualityof the decrypted image is good, and the higher the factor, the betterthe quality of decrypted image.Because the reversible data hiding methods for encrypted JPEG bit-

stream are very rare, we compare the proposed method with some re-versible data hiding methods for plaintext-JPEG or encrypted-uncom-pressed images. We use the quality factor 80 for image compression.Experimental results of the approaches are listed in Table II. Capacityof the proposed method is close to those in the methods [15] and [16]that were developed for reversibly hiding data into the encrypted dataof uncompressed images. Method [22] has the variable capacity forJPEG images, which is better than the proposed method. However, theJPEG images used in [22] are in plaintext form, and the file sizes aresignificant enlarged when the payloads are high.

QIAN et al.: REVERSIBLE DATA HIDING IN ENCRYPTED JPEG BITSTREAM 1491

VII. CONCLUSIONS

In this correspondence, we propose an RDH framework for en-crypted JPEG bitstream. The original JPEG bitstream is properlyencrypted to hide the image content with the bitstream structurepreserved. The secret message bits are encoded with ECC and em-bedded into the encrypted bitstream by modifying the appended bitscorresponding to the AC coefficients. By using the encryption andembedding keys, the receiver can extract the embedded data and per-fectly restore the original image. When the embedding key is absent,the original image can be approximately recovered with satisfactoryquality without extracting the hidden data.We propose to encode the plain data bits with ECC such that pre-

cise data extraction and image restoration can be achieved. In the ex-periments, we use the LDPC codes as an example. Other ECC algo-rithms may also be used. The proposed framework is also applicableto JPEG-LS and JPEG 2000 with slight modification of the encryptionand embedding schemes according to the respective coding-decodingalgorithms. Future work aims at extending this scheme to robust wa-termarking schemes for encrypted and compressed images.

REFERENCES[1] J. Fridrich and M. Goljan, “Lossless data embedding for all image for-

mats,” in Proc. SPIE Proc. Photonics West, Electronic Imaging, Secu-rity and Watermarking of Multimedia Contents, San Jose, CA, USA,Jan. 2002, vol. 4675, pp. 572–583.

[2] V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.-Q. Shi, “Reversiblewatermarking algorithm using sorting and prediction,” IEEE Trans.Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul. 2009.

[3] T. Kalker and F.M.Willems, “Capacity bounds and code constructionsfor reversible data-hiding,” in Proc. 14th Int. Conf. Digital Signal Pro-cessing (DSP2002), 2002, pp. 71–76.

[4] F. M. Willems and T. Kalker, “Coding theorems for reversible embed-ding,” DIMACS Series in Discrete Mathematics and Theoretical Com-puter Science, vol. 66, pp. 61–78, 2004.

[5] J. Tian, “Reversible data embedding using a difference expansion,”IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896,Aug. 2003.

[6] Z. Ni, Y. Shi, and N. Ansari et al., “Reversible data hiding,” IEEETrans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006.

[7] D.M. Thodi and J. J. Rodriguez, “Expansion embedding techniques forreversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3,pp. 721–730, Mar. 2007.

[8] L. Luo et al., “Reversible imagewatermarking using interpolation tech-nique,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187–193,Mar. 2010.

[9] X. L. Li, B. Yang, and T. Y. Zeng, “Efficient reversible watermarkingbased on adaptive prediction-error expansion and pixel selection,”IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Dec.2011.

[10] X. Zhang, “Reversible data hiding with optimal value transfer,” IEEETrans. Multimedia, vol. 15, no. 2, pp. 316–325, 2013.

[11] W. Zhang, B. Chen, and N. Yu, “Improving various reversible datahiding schemes via optimal codes for binary covers,” IEEE Trans.Image Process., vol. 21, no. 6, pp. 2991–3003, Jun. 2012.

[12] N. Memon and P. W. Wong, “A buyer-seller watermarking protocol,”IEEE Trans. Image Process., vol. 10, no. 4, pp. 643–649, Apr. 2001.

[13] M. Deng, T. Bianchi, A. Piva, and B. Preneel, “An efficient buyer-sellerwatermarking protocol based on composite signal representation,” inProc. 11th ACM Workshop Multimedia and Security, 2009, pp. 9–18.

[14] S. Lian, Z. Liu, Z. Ren, and H. Wang, “Commutative encryption andwatermarking in video compression,” IEEE Trans. Circuits Syst. VideoTechnol., vol. 17, no. 6, pp. 774–778, Jun. 2007.

[15] X. Zhang, “Reversible data hiding in encrypted images,” IEEE SignalProcess. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.

[16] W. Hong, T. Chen, and H. Wu, “An improved reversible data hiding inencrypted images using side match,” IEEE Signal Process. Lett., vol.19, no. 4, pp. 199–202, Apr. 2012.

[17] X. Zhang, “Separable reversible data hiding in encrypted image,” IEEETrans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.

[18] K. Ma, W. Zhang, and X. Zhao et al., “Reversible data hiding in en-crypted images by reserving room before encryption,” IEEE Trans. Inf.Forensics Security, vol. 8, no. 3, pp. 553–562, 2013.

[19] Int. Telecommunication Union, “CCITT Recommendation T.81, Infor-mation Technology-Digital Compression and Coding of Continuous-tone Still Images-Requirements and Guidelines,” 1992.

[20] D. Varodayan, A. Aaron, and B. Girod, “Rate-adaptive codes fordistributed source coding,” Signal Process., vol. 86, no. 11, pp.3123–3130, 2006.

[21] W. E. Ryan, “An introduction to LDPC codes,” in CRC Handbook forCoding and Signal Processing for Recoding Systems, B. Vasic, Ed.Boca Raton, FL, USA: CRC, 2004.

[22] G. Xuan, Y. Q. Shi, and Z. Ni et al., “Reversible data hiding for JPEGimages based on histogram pairs,” in Image Analysis and Recogni-tion. Berlin, Germany: Springer, 2007, pp. 715–727.