..............................
            ..............................
            ..............................
            
Separable High Capacity Reversible Data Hiding Algorithm for Encrypted Images
        
        This paper presents a separable Reversible  Data Hiding Algorithm for Encrypted Images (RDHEI) that consists of 
three phases. The encryption phase in the algorithm circularly shifts the columns in the image by a random amount, blocks the 
image  into  equal  and  regular  blocks  and  maps  them  to  irregular  blocks  generated  based  on  Hilbert  filling  curve,  and  finally 
complements a random subset  of the blocks. The embedding phase  is essentially an adapted version of the modification of the 
prediction  errors  algorithm  that  is  applied  to  each  block  in  the  encrypted  image  independently.  In  the  decryption  phase,  and 
since  the  algorithm  is  separable,  the  user  can  extract  the  data  only,  decrypt  the  image  only,  or  can  perform  both  actions 
depending on the type of keys he has. When compared to a very similar and recent algorithm, performance evaluation proved 
the  ability  of  the  proposed  algorithm  in  increasing  the  embedding  capacity  with  reasonable  quality  of  the  directly  decrypted 
image. In terms of the security, the analytical and quantitative assessment showed the superiority of the proposed algorithm in 
protecting the encrypted image.    
            [1] Alattar A., “Reversible Watermark Using Difference Expansion of Quads,” in Proceeding of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Motreal, pp. 377- 380, 2004.
[2] Alsaidi A., Al-Lehaibi K., Alzahrani H., AlGhamdi M., and Gutub A., “Compression Multi-Level Crypto Stego Security of Texts Utilizing Colored Email Forwarding,” Journal of Computer Science and Computational Mathematics, vol. 8, no. 3, pp. 33-42, 2018.
[3] Celik M., Sharma G., and Tekalp A., “Lossless Generalized-LSB Data Embedding,” IEEE transactions on image processing, vol. 14, no. 2, pp. 253-266, 2005.
[4] Chen G., Mao Y., and Chui C., “A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps,” Chaos, Solitons and Fractals, vol. 21, no. 3, pp. 749-761, 2004.
[5] Fridrich J., Goljan M., and Du R., “Lossless Data Embedding New Paradigm in Digital Watermarking,” Eurasip Journal on Advances in Signal Processing, vol. 2002, no. 2, pp. 1-12, 2002.
[6] Hong W., Chen T., and Shiu C., “Reversible Data Hiding for High Quality Images Using Modification of Prediction Errors,” Journal of Systems and Software, vol. 82, no. 11, pp. 1833- 1842, 2009.
[7] Hong W., Chen T., and Wu H., “An Improved Reversible Data Hiding in Encrypted Images Using Side Match,” IEEE Signal Processing Lett, vol. 19, no. 4, pp. 199-202, 2012.
[8] Kumar R. and Jung K., “Enhanced Pairwise IPVO-Based Reversible Data Hiding Scheme Using Rhombus Context,” Information Sciences, vol. 536, pp. 101-119, 2020.
[9] Long M., Zhao Y., Zhang X., and Peng F., “A Separable Reversible Data Hiding Scheme for Encrypted Images Based on Tromino Scrambling and Adaptive Pixel Value Ordering,” Signal Processing, vol. 176, pp. 107703, 2020.
[10] Li X., Li J., and Li B., “High-Fidelity Reversible Data Hiding Scheme Based on Pixel-value- ordering and Prediction-Error Expansion,” Signal Processing, vol. 93, no. 1, pp. 198-205, 2013.
[11] Ma K., Zhang W., Zhao X., Yu N., and Li F., “Reversible Data Hiding in Encrypted Images By Reserving Room Before Encryption,” IEEE Transactions on Information Forensics and security, vol. 8, no. 3, pp. 553-562, 2013.
[12] Mao Y., Chen G., and Lian S., “A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps,” International Journal of Bifurcation and chaos, vol. 14, no. 10, pp. 3613- 3624, 2003.
[13] Marawan M., AlShahwan F., Sifou F., Kartit A., and Ouhamne H., “Improving The Security of Cloud-Based Medical Image Storage,” Engineering Letters, vol. 27, no. 1, 2019.
[14] Ni Z., Shi Y., Ansari N., and Su W., “Reversible Data Hiding,” IEEE Transactions on Circuits and Systems for video technology, vol. 16, no. 3, pp. 354-362, 2006.
[15] Puech W., Chaumont M., and Strauss O., “A Reversible Data Hiding Method for Encrypted Images,” in Proceeding of the Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, pp. 534-542, 2008. Separable High Capacity Reversible Data Hiding Algorithm for Encrypted Images 821
[16] Shi Y., Li X., Zhang X., Wu H., and Ma B., “Reversible Data Hiding: Advances in the Past Two Decades,” IEEE Access, vol. 4, pp. 3210- 3237, 2016.
[17] Shiu C., Chen Y., and Hong W., “Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy,” KSII Transactions on Internet and Information Systems, vol. 13, no. 2, pp. 1020-1042, 2019.
[18] The USC-SIPI Image Database
[Online]. Available: http://sipi.usc.edu/database, Last Visited 2021.
[19] Thahab A., “A Novel Secure Video Steganography Technique Using Temporal Lifted Wavelet Transform and Human Vision Properties,” The International Arab Journal for Information Technology, vol. 17, no. 2, pp. 147- 153, 2020.
[20] Wang W., “A Reversible Data Hiding Algorithm Based on Bidirectional Difference Expansion,” Multimedia Tools and Applications, vol. 79, no. 9, pp. 890- 896, 2020.
[21] Waterloo Image Repository
[Online]. Available: http://links.uwaterloo.ca/Repository.html, Last Visited, 2021.
[22] Xu C., Zhang Y., and Gu Z., “A Novel Color Image Encryption Method Based on Sequence Cross Transformation and Chaotic Sequences,” Engineering Letters, vol. 28, no. 4, 2020.
[23] Zhang X., “Reversible Data Hiding in Encrypted Image,” IEEE Signal Processing Letters, vol. 18, no. 4, pp. 255-258, 2011.
[24] Zhang X., Qian Z., Feng G., and Ren Y., “Efficient Reversible Data Hiding in Encrypted Images,” Journal of Visual Communication and Image Representation, vol. 25, no. 2, pp. 322-328, 2014. Iyad Jafar received the B.S. degree in Electrical Engineering from The University of Jordan in 2001, the M.Sc. degree in Electrical Engineering from the Illinois Institute of Technology in 2004, and the Ph.D. degree in Computer Engineering from Wayne State University in 2008. He is currently working as a professor and acting chair in the Department of Computer Engineering at the University of Jordan. His research interests are in signal and image processing, pattern recognition, and computer networks. Khalid Darabkh Received the PhD degree in Computer Engineering from the University of Alabama in Huntsville in 2007 with honors. He is currently a professor in the Computer Engineering Department at the University of Jordan. He authored and co-authored of at least a hundred eighty highly esteemed research articles. He is among World’s Top 2% Scientists List compiled by Stanford University in 2020 and 2021. He serves on the Editorial Board of Telecommunication Systems, published by Springer, Computer Applications in Engineering Education, published by John Wiley & Sons, and Journal of High Speed Networks, published by IOS Press. Additionally, he serves as a TPC member of highly reputable IEEE conferences such as GLOBECOM, ICC, LCN, VTC- Fall, PIMRC, ISWCS, ATC, ICT, and IAEAC. He is engaged in research mainly on Internet of things, Software-defined networks, vehicular networks, flying ad-hoc networks, Fog networking, Full duplex cognitive radio networks, queuing systems and networks, multimedia transmission, channel coding, steganography and watermarking, as well as innovative and interactive learning environments. Fahed Jubair graduated from Purdue University in 2014 with a Ph.D. degree in Electrical and Computer Engineering. He received his B.Sc. degree from the University of Jordan in 2007. Dr. Jubair is currently an assistant professor of Computer Engineering at the University of Jordan. His main research interests include optimizing compilers, parallel computing, heuristic algorithms, and machine learning.
