Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 9803519, 12 pages
https://doi.org/10.1155/2018/9803519
Research Article

Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain

1College of Computer and Information Engineering, Henan Normal University, Xinxiang 453007, China
2School of Automation Science and Electrical Engineering, Beihang University, Beijing 100191, China
3China National Digital Switching System Engineering and Technological R&D Center, Zhengzhou 450002, China
4College of Computer Science, Chongqing University, Chongqing 400044, China
5Beijing Advanced Innovation Center for Big Data and Brain Computing, Beihang University, Beijing 100191, China
6Beijing Advanced Innovation Center for Big Date-Based Precision Medicine, Beihang University, Beijing 100083, China

Correspondence should be addressed to Yang Li; nc.ude.aaub@gnayil

Received 24 July 2017; Revised 10 October 2017; Accepted 16 January 2018; Published 14 February 2018

Academic Editor: Bruce M. Kapron

Copyright © 2018 Ming Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. X. Liao, J. Yin, and S. Guo, “Medical JPEG image steganography based on preserving inter-block dependencies,” Computers Electrical Engineering, 2017. View at Publisher · View at Google Scholar
  2. X. Liao, Z. Qin, and L. Ding, “Data embedding in digital images using critical functions,” Signal Processing: Image Communication, vol. 58, pp. 146–156, 2017. View at Publisher · View at Google Scholar · View at Scopus
  3. M. Wu, H. Yu, and B. Liu, “Data hiding in image and video: Part II - Designs and applications,” IEEE Transactions on Image Processing, vol. 12, no. 6, pp. 696–705, 2003. View at Publisher · View at Google Scholar · View at Scopus
  4. B. Feng, W. Lu, and W. Sun, “Secure binary image steganography based on minimizing the distortion on the texture,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, article no. A3, pp. 243–255, 2015. View at Publisher · View at Google Scholar · View at Scopus
  5. X. Liao, G. Chen, and J. Yin, “Content-adaptive steganalysis for color images,” Security and Communication Networks, vol. 9, no. 18, pp. 5756–5763, 2016. View at Publisher · View at Google Scholar · View at Scopus
  6. M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized-LSB data embedding,” IEEE Transactions on Image Processing, vol. 14, no. 2, pp. 253–266, 2005. View at Publisher · View at Google Scholar · View at Scopus
  7. X. Liao, K. Li, and J. Yin, “Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform,” Multimedia Tools and Applications, vol. 76, no. 20, pp. 20739–20753, 2017. View at Publisher · View at Google Scholar · View at Scopus
  8. G. Bhatnagar, “Robust covert communication using high capacity watermarking,” Multimedia Tools and Applications, vol. 76, no. 3, pp. 3783–3807, 2017. View at Publisher · View at Google Scholar · View at Scopus
  9. B. Ma and Y. Q. Shi, “A reversible data hiding scheme based on code division multiplexing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 9, pp. 1914–1927, 2016. View at Publisher · View at Google Scholar · View at Scopus
  10. S. A. Parah, J. A. Sheikh, A. M. Hafiz, and G. M. Bhat, “A secure and robust information hiding technique for covert communication,” International Journal of Electronics, vol. 102, no. 8, pp. 1253–1266, 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. F. Chen, K.-w. Wong, X. Liao, and T. Xiang, “Period distribution of generalized discrete Arnold cat map,” Theoretical Computer Science, vol. 552, pp. 13–25, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. Y. Zhang, J. Zhou, F. Chen et al., “Embedding cryptographic features in compressive sensing,” Neurocomputing, vol. 205, pp. 472–480, 2016. View at Publisher · View at Google Scholar · View at Scopus
  13. Y. Zhang, J. Zhou, F. Chen et al., “A block compressive sensing based scalable encryption framework for protecting significant image regions,” International Journal of Bifurcation and Chaos, vol. 26, no. 11, Article ID 1650191, 2016. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Kanso and M. Ghebleh, “An algorithm for encryption of secret images into meaningful images,” Optics and Lasers in Engineering, vol. 90, pp. 196–208, 2017. View at Publisher · View at Google Scholar · View at Scopus
  15. X. Chai, Z. Gan, Y. Chen, and Y. Zhang, “A visually secure image encryption scheme based on compressive sensing,” Signal Processing, vol. 134, pp. 35–51, 2017. View at Publisher · View at Google Scholar · View at Scopus
  16. L. Kamstra and H. J. Heijmans, “Reversible data embedding into images using wavelet techniques and sorting,” IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2082–2090, 2005. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  17. J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890–896, 2003. View at Publisher · View at Google Scholar · View at Scopus
  18. X. Liao and C. Shu, “Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels,” Journal of Visual Communication and Image Representation, vol. 28, pp. 21–27, 2015. View at Publisher · View at Google Scholar · View at Scopus
  19. M. Li and Y. Li, “Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding,” Signal Processing, vol. 130, pp. 190–196, 2017. View at Publisher · View at Google Scholar · View at Scopus
  20. M. Li, D. Xiao, Y. Zhang, and H. Nan, “Reversible data hiding in encrypted images using cross division and additive homomorphism,” Signal Processing: Image Communication, vol. 39, pp. 234–248, 2015. View at Publisher · View at Google Scholar · View at Scopus
  21. Y. Zhang, L. Y. Zhang, J. Zhou, L. Liu, F. Chen, and X. He, “A review of compressive sensing in information security field,” IEEE Access, vol. 4, pp. 2507–2519, 2016. View at Publisher · View at Google Scholar · View at Scopus
  22. D. Xiao, H. Cai, Y. Wang, and S. Bai, “High-capacity separable data hiding in encrypted image based on compressive sensing,” Multimedia Tools and Applications, vol. 75, no. 21, pp. 13779–13789, 2016. View at Publisher · View at Google Scholar · View at Scopus
  23. M. Yamaç, Ç. Dikici, and B. Sankur, “Hiding data in compressive sensed measurements: A conditionally reversible data hiding scheme for compressively sensed measurements,” Digital Signal Processing, vol. 48, pp. 188–200, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  24. G. Hua, Y. Xiang, and G. Bi, “When compressive sensing meets data hiding,” IEEE Signal Processing Letters, vol. 23, no. 4, pp. 473–477, 2016. View at Publisher · View at Google Scholar · View at Scopus
  25. M. Li, D. Xiao, and Y. Zhang, “Reversible data hiding in block compressed sensing images,” ETRI Journal, vol. 38, no. 1, pp. 159–163, 2016. View at Publisher · View at Google Scholar · View at Scopus
  26. Y. Rachlin and R. D. Baron, “The secrecy of compressed sensing measurements,” in Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing, pp. 813–817, IEEE, Urbana, Ill, USA, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  27. A. Orsdemir, H. O. Altun, G. Sharma, and M. F. Bocko, “On the security and robustness of encryption via compressed sensing,” in Proceedings of the IEEE Military Communications Conference (MILCOM '08), pp. 1–7, San Diego, Calif, USA, November 2008. View at Publisher · View at Google Scholar · View at Scopus
  28. J. A. Tropp, “Greed is good: algorithmic results for sparse approximation,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 50, no. 10, pp. 2231–2242, 2004. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  29. A.-V. Diaconu, “Circular inter-intra pixels bit-level permutation and chaos-based image encryption,” Information Sciences, vol. 355-356, pp. 314–327, 2016. View at Publisher · View at Google Scholar · View at Scopus