Reversible Data Hiding in Encrypted Images Combined with Chaotic System Based on Pixel Prediction and Bit Plane Compression

Yijia Dai, Ka Cheng Choi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Chaotic systems have various advantages, such as unpredictability, non-periodicity, and so on. The algorithm for encrypting digital images using chaotic systems has a large key space, sensitive initial values, and fast encryption speed. Therefore, in this paper, we propose a reversible data hiding in encrypted images (RDHEI) combined with a chaotic system. The algorithm introduced the SHA-256 method to generate the initial value of the chaotic system and the key of RDHEI by manipulating the plaintext image. Moreover, the chaotic system is used to further encrypt the encrypted image after the data hiding in the RDHEI process. The improvement enhances the sensitivity and security of the key and strengthens the image encryption. The experimental results evaluated by histogram, information entropy, correlation of neighboring pixel points, and other indicators show that the proposed algorithm has comparable performance with state-of-the-art and has more intense encryption.

Original languageEnglish
Title of host publicationProceedings of the 15th International Conference on Digital Image Processing, ICDIP 2023
PublisherAssociation for Computing Machinery
ISBN (Electronic)9798400708237
DOIs
Publication statusPublished - 19 May 2023
Event15th International Conference on Digital Image Processing, ICDIP 2023 - Nanjing, China
Duration: 19 May 202322 May 2023

Publication series

NameACM International Conference Proceeding Series

Conference

Conference15th International Conference on Digital Image Processing, ICDIP 2023
Country/TerritoryChina
CityNanjing
Period19/05/2322/05/23

Keywords

  • SHA-256
  • chaotic system
  • encrypted image
  • encryption
  • reversible data hiding

Fingerprint

Dive into the research topics of 'Reversible Data Hiding in Encrypted Images Combined with Chaotic System Based on Pixel Prediction and Bit Plane Compression'. Together they form a unique fingerprint.

Cite this