Enhanced Reversible Data Hiding for Encrypted Image Based on Block Mean Difference Histogram Shifting and BPHST
Keywords:
Reversible Data Hiding (RDH), Encrypted Image, Histogram Shifting, Block Mean Difference, Bit Pattern Shifting Technique (BPHST), Image Recovery
Abstract
This paper proposes an improved reversible data hiding method for encrypted images, utilizing Block Prediction Histogram Shifting Technique (BPHST). Reversible data hiding (RDH) ensures both secure data embedding and complete recovery of the original image post-extraction. Our proposed BPHST approach is based on bit-level shifting and histogram manipulation of block mean differences within encrypted image segments. The method extracts the mean difference from encrypted blocks and constructs a histogram using additive homomorphic properties, allowing precise data embedding via histogram shifting. This technique ensures that data extraction is separable from image decryption by preserving the difference prediction before and after encryption. Compared to previous methods relying on sorting, prediction, and histogram adjustment, BPHST achieves better error rate management, enhanced robustness, and secure data embedding. The proposed method effectively balances high data security, imperceptibility, and reversibility, making it suitable for sensitive multimedia applications. Furthermore, BPHST demonstrates improved Peak Signal-to-Noise Ratio (PSNR) and lower Mean Squared Error (MSE), ensuring high fidelity in image recovery. This makes BPHST a promising technique for secure, reversible information hiding in encrypted images.Downloads
Download data is not yet available.
References
[1]. I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital watermarking and steganography. Morgan Kaufmann, 2007.
[2]. W. Bender, W. Butera, D. Gruhl, R. Hwang, F. J. Paiz, and S. Pogreb, “Applications for data hiding,” IBM Systems Journal, vol. 39, no. 3.4, pp. 547–568, 2000.
[3]. Huang, Fangjun, Jiwu Huang, and Yun-Qing Shi. “New framework for reversible data hiding in the encrypted domain.” IEEE Transactions on Information Forensics and Security 11, no. 12: 2777-2789, 2016.
[4]. Chandramouli, Rajarathnam, and Nasir Memon. “Analysis of LSB-based image steganography techniques.” In Proceedings 2001 international conference on image processing (Cat. No. 01CH37205), vol. 3, pp. 1019-1022. IEEE, 2001.
[5]. Varsaki, Eleni, Vassilis Fotopoulos, and A. N. Skodras. “A reversible data hiding technique embedded in the image histogram.” Hellenic Open University Journal of Informatics 1, no. 2, 2006.
[6]. Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems Video Technology, Vol. 16, No.3, 2006, pp. 354–362.
[7]. Huang, F. Huang, Y.-Q. Shi, New framework for reversible data hiding in the encrypted domain, IEEE Transactions on Information Forensics and Security 11, 2777–2789, 2016.
[8]. Ge, Haoli, Yan Chen, Zhenxing Qian, and Jianjun Wang. “A high-capacity multi-level approach for reversible data hiding in encrypted images.” IEEE Transactions on Circuits and Systems for Video Technology 29, no. 8: 2285-2295, 2018.
[9]. Xiao, Di, Yanping Xiang, Hongying Zheng, and Yong Wang. “Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism.” Journal of Visual Communication and Image Representation 45: 1-10, 2017.
[10]. Xu, Dawen, and Rangding Wang. “Separable and error-free reversible data hiding in encrypted images.” Signal Processing 123: 9-21, 2016.
[11]. Lin, Jiang-Yi, Yu Chen, Chin-Chen Chang, and Yu-Chen Hu. “Reversible Data Hiding in Encrypted Images Based on Bit-plane Block Embedding.” J. Inf. Hiding Multim. Signal Process. 10, no. 2: 408-421, 2019.
[12]. I.-J. Lai and W.-H. Tsai, “Secret-fragment-visible mosaic image–a new computer art and its application to information hiding,” IEEE Trans. Information Forensics and Security, vol. 6, no. 3, pp. 936–945, 2011.
[13]. Y. L. Lee and W.-H. Tsai, “A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible colour transformations,” IEEE Trans. Circuits Syst. & Video Technol., vol. 24, no. 4, pp. 695–703, 2014.
[14]. Yu, Chunqiang, Xianquan Zhang, Xinpeng Zhang, Guoxiang Li, and Zhenjun Tang. “Reversible data hiding with hierarchical embedding for encrypted images.” IEEE Transactions on Circuits and Systems for Video Technology 32, no. 2: 451-466, 2021.
[15]. K. Ma, W. Zhang, X. Zhao, N. Yu, F. Li, Reversible data hiding in encrypted images by reserving room before encryption, IEEE Transactions on Information Forensics and Security 8, 553–562, 2013.
[16]. Wu, Xin. “Reversible Data Hiding for Encrypted Image Based on Block Mean Difference Histogram Shifting.” In 2024 4th International Conference on Neural Networks, Information and Communication (NNICE), pp. 320-324. IEEE, 2024.
[17]. Chen, Kaimeng, Chin-Chen Chang, and C. C. Chang. “High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting.” Mathematical Biosciences and Engineering 16, no. 5: 3947-3964, 2019.
[18]. Mohammadi, Ammar, and Mohammad Ali Akhaee. “Reversible data hiding in encrypted images using histogram modification and MSBs integration.” Multimedia Tools and Applications 83, no. 2: 5229-5249, 2024.
[19]. Xu, D., Chen, K., Wang, R., & Su, S. (2018). Separable reversible data hiding in encrypted images based on two‐dimensional histogram modification. Security and Communication Networks, (1), 1734961, 2018.
[20]. Tang, Zhenjun, Shijie Xu, Dengpan Ye, Jinyan Wang, Xianquan Zhang, and Chuanqiang Yu. “Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image.” Journal of Real-Time Image Processing 16: 709-724, 2019.
[2]. W. Bender, W. Butera, D. Gruhl, R. Hwang, F. J. Paiz, and S. Pogreb, “Applications for data hiding,” IBM Systems Journal, vol. 39, no. 3.4, pp. 547–568, 2000.
[3]. Huang, Fangjun, Jiwu Huang, and Yun-Qing Shi. “New framework for reversible data hiding in the encrypted domain.” IEEE Transactions on Information Forensics and Security 11, no. 12: 2777-2789, 2016.
[4]. Chandramouli, Rajarathnam, and Nasir Memon. “Analysis of LSB-based image steganography techniques.” In Proceedings 2001 international conference on image processing (Cat. No. 01CH37205), vol. 3, pp. 1019-1022. IEEE, 2001.
[5]. Varsaki, Eleni, Vassilis Fotopoulos, and A. N. Skodras. “A reversible data hiding technique embedded in the image histogram.” Hellenic Open University Journal of Informatics 1, no. 2, 2006.
[6]. Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems Video Technology, Vol. 16, No.3, 2006, pp. 354–362.
[7]. Huang, F. Huang, Y.-Q. Shi, New framework for reversible data hiding in the encrypted domain, IEEE Transactions on Information Forensics and Security 11, 2777–2789, 2016.
[8]. Ge, Haoli, Yan Chen, Zhenxing Qian, and Jianjun Wang. “A high-capacity multi-level approach for reversible data hiding in encrypted images.” IEEE Transactions on Circuits and Systems for Video Technology 29, no. 8: 2285-2295, 2018.
[9]. Xiao, Di, Yanping Xiang, Hongying Zheng, and Yong Wang. “Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism.” Journal of Visual Communication and Image Representation 45: 1-10, 2017.
[10]. Xu, Dawen, and Rangding Wang. “Separable and error-free reversible data hiding in encrypted images.” Signal Processing 123: 9-21, 2016.
[11]. Lin, Jiang-Yi, Yu Chen, Chin-Chen Chang, and Yu-Chen Hu. “Reversible Data Hiding in Encrypted Images Based on Bit-plane Block Embedding.” J. Inf. Hiding Multim. Signal Process. 10, no. 2: 408-421, 2019.
[12]. I.-J. Lai and W.-H. Tsai, “Secret-fragment-visible mosaic image–a new computer art and its application to information hiding,” IEEE Trans. Information Forensics and Security, vol. 6, no. 3, pp. 936–945, 2011.
[13]. Y. L. Lee and W.-H. Tsai, “A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible colour transformations,” IEEE Trans. Circuits Syst. & Video Technol., vol. 24, no. 4, pp. 695–703, 2014.
[14]. Yu, Chunqiang, Xianquan Zhang, Xinpeng Zhang, Guoxiang Li, and Zhenjun Tang. “Reversible data hiding with hierarchical embedding for encrypted images.” IEEE Transactions on Circuits and Systems for Video Technology 32, no. 2: 451-466, 2021.
[15]. K. Ma, W. Zhang, X. Zhao, N. Yu, F. Li, Reversible data hiding in encrypted images by reserving room before encryption, IEEE Transactions on Information Forensics and Security 8, 553–562, 2013.
[16]. Wu, Xin. “Reversible Data Hiding for Encrypted Image Based on Block Mean Difference Histogram Shifting.” In 2024 4th International Conference on Neural Networks, Information and Communication (NNICE), pp. 320-324. IEEE, 2024.
[17]. Chen, Kaimeng, Chin-Chen Chang, and C. C. Chang. “High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting.” Mathematical Biosciences and Engineering 16, no. 5: 3947-3964, 2019.
[18]. Mohammadi, Ammar, and Mohammad Ali Akhaee. “Reversible data hiding in encrypted images using histogram modification and MSBs integration.” Multimedia Tools and Applications 83, no. 2: 5229-5249, 2024.
[19]. Xu, D., Chen, K., Wang, R., & Su, S. (2018). Separable reversible data hiding in encrypted images based on two‐dimensional histogram modification. Security and Communication Networks, (1), 1734961, 2018.
[20]. Tang, Zhenjun, Shijie Xu, Dengpan Ye, Jinyan Wang, Xianquan Zhang, and Chuanqiang Yu. “Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image.” Journal of Real-Time Image Processing 16: 709-724, 2019.
Published
2025-07-07
How to Cite
Mehra, J., Jha, A., & Maheshwar, K. (2025). Enhanced Reversible Data Hiding for Encrypted Image Based on Block Mean Difference Histogram Shifting and BPHST. International Journal of Advanced Computer Technology, 14(2), 12-22. Retrieved from http://www.ijact.org/index.php/ijact/article/view/157
Section
Articles