Reversible Data Hiding in Encrypted Images Using Reservoir Computing-Based Data Fusion Strategy

IF 11.1 1区 工程技术 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC IEEE Transactions on Circuits and Systems for Video Technology Pub Date : 2024-09-12 DOI:10.1109/TCSVT.2024.3459024
Xiao Jiang;Yiyuan Xie;Yushu Zhang;Yichen Ye;Fang Xu;Lili Li;Ye Su;Zhuang Chen
{"title":"Reversible Data Hiding in Encrypted Images Using Reservoir Computing-Based Data Fusion Strategy","authors":"Xiao Jiang;Yiyuan Xie;Yushu Zhang;Yichen Ye;Fang Xu;Lili Li;Ye Su;Zhuang Chen","doi":"10.1109/TCSVT.2024.3459024","DOIUrl":null,"url":null,"abstract":"Reversible data hiding in encrypted image (RDHEI) is a powerful security technology that aims to hide data into the encrypted image without any distortions of data extraction and image recovery. Most existing RDHEI methods using vacated room-based data embedding algorithms face challenges in improving embedding capacity and security. In this paper, we develop a novel data hiding strategy via fusion based on reservoir computing (RC) system, upon which a new RDHEI scheme is further proposed. In the proposed scheme, the original image is first encrypted by the stream cipher-based encryption algorithm using the secret keys generated by an optical chaotic system. Then, by means of the RC system, the generated encrypted image can be fused with the secret data to produce the final masked image. Unlike the existing data embedding algorithms based on vacating rooms, the RC-based fusion strategy allows for hiding secret data comparable to the volume of the cover image into the encrypted image so that a higher embedding capacity can be greatly afforded. Moreover, the proposed strategy involves a chaotic transformation via the reservoir of RC system during data hiding, producing a masked image that is completely different from the encrypted image, thus the security is greatly enhanced. Experimental results show the contributions in improving the embedding capacity and security, and also demonstrate the superiority of the proposed scheme compared to some existing RDHEI methods.","PeriodicalId":13082,"journal":{"name":"IEEE Transactions on Circuits and Systems for Video Technology","volume":"35 1","pages":"684-697"},"PeriodicalIF":11.1000,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Circuits and Systems for Video Technology","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/10679220/","RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Reversible data hiding in encrypted image (RDHEI) is a powerful security technology that aims to hide data into the encrypted image without any distortions of data extraction and image recovery. Most existing RDHEI methods using vacated room-based data embedding algorithms face challenges in improving embedding capacity and security. In this paper, we develop a novel data hiding strategy via fusion based on reservoir computing (RC) system, upon which a new RDHEI scheme is further proposed. In the proposed scheme, the original image is first encrypted by the stream cipher-based encryption algorithm using the secret keys generated by an optical chaotic system. Then, by means of the RC system, the generated encrypted image can be fused with the secret data to produce the final masked image. Unlike the existing data embedding algorithms based on vacating rooms, the RC-based fusion strategy allows for hiding secret data comparable to the volume of the cover image into the encrypted image so that a higher embedding capacity can be greatly afforded. Moreover, the proposed strategy involves a chaotic transformation via the reservoir of RC system during data hiding, producing a masked image that is completely different from the encrypted image, thus the security is greatly enhanced. Experimental results show the contributions in improving the embedding capacity and security, and also demonstrate the superiority of the proposed scheme compared to some existing RDHEI methods.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用基于蓄水池计算的数据融合策略在加密图像中进行可逆数据隐藏
加密图像中的可逆数据隐藏(rdhi)是一种强大的安全技术,旨在将数据隐藏到加密图像中,而不会对数据提取和图像恢复造成任何扭曲。现有的基于空房间的数据嵌入算法在提高嵌入容量和安全性方面面临挑战。本文提出了一种基于储层计算(RC)系统的融合数据隐藏策略,并在此基础上进一步提出了一种新的RDHEI方案。该方案首先利用光混沌系统生成的密钥对原始图像进行基于流密码的加密算法加密。然后,通过RC系统,将生成的加密图像与秘密数据融合,生成最终的掩码图像。与现有的基于空房间的数据嵌入算法不同,基于rc的融合策略允许将与封面图像体积相当的秘密数据隐藏到加密图像中,从而可以大大提供更高的嵌入容量。此外,该策略在数据隐藏过程中通过RC系统的存储库进行混沌变换,产生与加密图像完全不同的掩膜图像,从而大大提高了安全性。实验结果表明,该方案在提高嵌入容量和安全性方面做出了贡献,并且与现有的一些RDHEI方法相比,也证明了该方案的优越性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
13.80
自引率
27.40%
发文量
660
审稿时长
5 months
期刊介绍: The IEEE Transactions on Circuits and Systems for Video Technology (TCSVT) is dedicated to covering all aspects of video technologies from a circuits and systems perspective. We encourage submissions of general, theoretical, and application-oriented papers related to image and video acquisition, representation, presentation, and display. Additionally, we welcome contributions in areas such as processing, filtering, and transforms; analysis and synthesis; learning and understanding; compression, transmission, communication, and networking; as well as storage, retrieval, indexing, and search. Furthermore, papers focusing on hardware and software design and implementation are highly valued. Join us in advancing the field of video technology through innovative research and insights.
期刊最新文献
TinySplat: Feedforward Approach for Generating Compact 3D Scene Representation GSCodec Studio: A Modular Framework for Gaussian Splat Compression Syntax Element Encryption for H.265/HEVC Using Chaotic Map-Based Coefficient Scrambling Scheme Learning Confidence-Aware Prototypes for Weakly-Supervised Video Anomaly Detection Learned Point Cloud Attribute Compression With Cross-Scale Point Transformer and Geometry-Aware Context Prediction Entropy Model
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1