RMDE / TPE

A Reversible Framework for Efficient and Secure Visual Privacy Protection

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

A Reversible Framework for Efficient and Secure Visual Privacy Protection

Direction

  • The scheme is to balance the image privacy and usability by encrypting the image while preserving the thumbnail.

Application

  • Uploading images into cloud platforms after encryption by this scheme for privacy protection.

Environment

  • Matlab
  • Python

Principle

  • Based on the block and dividing the block into two areas: the adjustment area and the embedding area.
  • The function of the adjustment area: preserving the sum of pixel values in one block by adjusting high bits of pixels.
  • The function of the embedding area: embedding the information (hight bits of pixels in the adjustment area) in order to recovery the original image when decrypting.

Details of the scheme

  1. Room-reserving

    1. distribution of the adjustment and embedding area

      • the first distribution of the block

        distribution

      • the second distribution of the image

        distribution2

      • the third distribution of the image

        distribution2

    2. method of the data hiding

      • method 0

        • paper

          High Capacity Reversible Data Hiding in Image Based on Adaptive MSB Prediction

        • key idea

          • based on the 2x2 bolck
          • using MED prediction
          • in each block, find the max shared high bits of four pixels and reverse the extra room for embedding, remaining the left up pixel origin for recovery process
        • framework

          method0-framework
        • application

          divide the image into two areas: the embedding area and the adjustment area; the adjustment area is to adjust high rho bits of each pixel in the area so the original high rho bits value of pixels in the adjustment area are embedded into the embedding area for recovery process

          • distribution 1

            the same as the first distribution of the block mentioned avove.

          • distribution 2

            A: the adjustment area

            Er: record the locate_map

            Eo: the area for embedding operation

            distribution0-2
        • experiment result

          • example: "lena" 1024x1024

          • distribution 1

            • parametric: blocksize, MSB, edge=NUM, type=0, method=0

              0-2-para
            • visual result

              0-0-8.1.380-0-16.1.380-0-32.1.380-0-64.1.38

              0-0-8.2.900-0-16.2.900-0-32.2.900-0-64.2.90

              0-0-8.3.1500-0-16.3.1500-0-32.3.1500-0-64.3.150

          • distribution 2

            • parametric: blocksize, MSB, NUM, edge=0, type=1, method=0 (NUM/blocksize must be even and blocksize-mod(NUM, blocksize) must > length of compressed locate_map)

              0-2-para
            • visual result

              0-1-8.1.300-1-16.1.1800-1-32.1.8200-1-64.1.3398

              0-1-8.2.300-1-16.2.1560-1-32.2.6900-1-64.2.2886

              0-1-8.3.300-1-16.3.1240-1-32.3.4980-1-64.3.2118

      • method 1

        • paper

          Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Bit-plane Compression

        • key idea

          • based on bit-plane operation
          • for each bit-plane, blocking into 2x2 block and rearrange the bits, then compress them
          • using MED to predict pixels
        • framework

          method1-framework
        • application

          store all information for recovery in low bit-planes and keep high bit-planes free to adjust

        • experiment result

          • example: "lena" 1024x1024

          • parametric: blocksize, NUM, MSB, type=3, method=1

          • length of stored information / total room in each channel

            • R: 3448560/ 8388608
            • G: 3861643/ 8388608
            • B: 4072728/ 8388608
          • max number of bits that can be freed: 4.12

          • visual result: the result is similar to method 3

      • method 2

        • paper

          An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling

        • key idea

          • Exploiting the spatial correlation of the whole image but not inside one block

          • using parametric binary label tree to label encrypted pixels

          • if the result of prediction value - original value in valid range, it can be labeled successfully belonging to group G1, else it belong to G2

          • using MED to prediction

        • framework

          method2-framework
        • application

          divide the image into two areas: the embedding area and the adjustment area; the adjustment area is to adjust high rho bits of each pixel in the area so the original high rho bits value of pixels in the adjustment area are embedded into the embedding area for recovery process

          • distribution 1

            0: the area that keeps unchanging

            1: the embedding area with special prediction method

            2: the embedding area with normal MED prediction method

            3: the adjustment area

            distribution2-1
          • distribution 2

            distribution2-2
          • tip

            in recovery process, we should pay attention on the order of traverse, ensuring that when recovering pixel of location (x,y), the pixels on which predictions depend have been restored.

            In order to ensure the consistency of embedding and extraction processes, the traversal order of embedding must be the same as that of extraction.

        • experiment result

          • example: "lena" 1024x1024

          • distribution 1

            • parametric: blocksize, MSB, edge=NUM, type=0, method=2

              2-1-para
            • visual result

              2-0-8.1.202-0-16.1.202-0-32.1.202-0-64.1.20

              2-0-8.2.552-0-16.2.552-0-32.2.552-0-64.2.55

              2-0-8.3.1002-0-16.3.1002-0-32.3.1002-0-64.3.100

          • distribution 2

            • parametric: blocksize, MSB, NUM, edge=0, type=1, method=2

              2-2-para
            • visual result

              2-1-8.1.522-1-8.2.452-1-8.3.35

              2-1-16.1.2202-1-16.2.1902-1-16.3.150

              2-1-32.1.9002-1-32.2.7802-1-32.3.600

              2-1-64.1.35502-1-64.2.31502-1-64.3.2500

      • method 3

        • paper

          A Recursive Reversible Data Hiding in Encrypted Images Method With a Very High Payload

        • the type of the distribution is the third distribution

        • key idea

          • predict and compress the bit-plane from MSB to LSB (if the compressed bit-plane is longer than the original one, this bit-plane and the lower bit-planes are to keep original for recovery) while keeping the LSB uncompressed.
          • using MED to prediction
        • framework

          method3-framework
        • application

          store all information for recovery in low bit-planes and keep high bit-planes free to adjust

        • experiment result

          • example: "lena" 1024x1024

          • parametric: blocksize, NUM, MSB, type=3|1, method=3

          • length of stored information / total room in each channel

            • R: 4698300 / 8388608
            • G: 5363088 / 8388608
            • B: 5677439 / 8388608
          • max number of bits that can be freed: 2.58

          • visual result

            3-8.1.283-8.1.283-8.1.283-8.1.283-8.1.403-8.1.283-8.1.283-8.1.283-8.2.64

            3-16.1.323-16.1.643-16.1.963-16.1.1283-16.1.1603-16.1.1923-16.1.2243-16.1.2563-16.2.256

            3-32.1.1283-32.1.2563-32.1.3843-32.1.5123-32.1.6403-32.1.7683-32.1.8963-32.1.10243-32.2.1024

            3-64.1.5123-64.1.10243-64.1.15363-64.1.20483-64.1.25603-64.1.30723-64.1.35843-64.1.40963-64.2.4096

  2. Encryption

    • here we use the stream encipher
  3. Adjustment

    • goal: to keep the sum of pixels in the encrypted block as approximate as the original one
  4. Permutation

    • goal: to rearrange the pixels in the same block in order to make the result of the adjustment area randomly locate in the same block for achieving the PRP security
    • here we also use a permutation key for perfectly restoration

About

A Reversible Framework for Efficient and Secure Visual Privacy Protection


Languages

Language:MATLAB 88.6%Language:Python 11.4%