Browse > Article
http://dx.doi.org/10.3837/tiis.2012.04.017

Prediction-based Reversible Data Hiding Using Empirical Histograms in Images  

Weng, Chi-Yao (Department of Computer Science and Engineering, National Sun Yat-sen University)
Wang, Shiuh-Jeng (Department of Information Management, Central Police University)
Liu, Jonathan (Department of Computer, Information Science and Engineering, University of Florida)
Goyal, Dushyant (Department of Electronics and Communication Engineering, The LNM Institute of Information Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.6, no.4, 2012 , pp. 1248-1266 More about this Journal
Abstract
This paper presents a multilevel reversible data hiding method based on histogram shifting which can recover the original image losslessly after the hidden data has been extracted from the stego-image. The method of prediction is adopted in our proposed scheme and prediction errors are produced to explore the similarity of neighboring pixels. In this article, we propose two different predictors to generate the prediction errors, where the prediction is carried out using the center prediction method and the JPEG-LS median edge predictor (MED) to exploit the correlation among the neighboring pixels. Instead of the original image, these prediction errors are used to hide the secret information. Moreover, we also present an improved method to search for peak and zero pairs and also talk about the analogy of the same to improve the histogram shifting method for huge embedding capacity and high peak signal-to-noise ratio (PSNR). In the one-level hiding, our method keeps image qualities larger than 53 dB and the ratio of embedding capacity has 0.43 bpp (bit per pixel). Besides, the concept with multiple layer embedding procedure is applied for obtaining high capacity, and the performance is demonstrated in the experimental results. From our experimental results and analytical reasoning, it shows that the proposed scheme has higher PSNR and high data embedding capacity than that of other reversible data hiding methods presented in the literature.
Keywords
Reversible data hiding; steganography; histogram shifting;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
Times Cited By Web Of Science : 0  (Related Records In Web of Science)
연도 인용수 순위
1 C. C. Lin, W. L. Tai and C. C. Chang, "Multilevel reversible data hiding based on histogram modification of difference images," Pattern Recognition, vol.41, no.12, pp.3582-3591, 2008.   DOI   ScienceOn
2 D. C. Lou, M. C. Hu and C. L. Liu, "Multiple-layer data hiding scheme for medical image," Computer Standards and Interfaces, vol.31, no.2, pp.329-335, 2009.   DOI   ScienceOn
3 H.W. Tseng and C.P. Hsieh, ''Prediction-based reversible data hiding,"Information Sciences, vol.179, no.14, pp.2460-2469, 2009.   DOI   ScienceOn
4 C. Honsinger, P. Jone, M. Rabbani and J. Stoffel, "Lossless recovery of an original image containing embedded data," United States Patent #6278791, 2001.
5 C. C. Chang, C. C. Lin, C. S. Tseng and W. L. Tai, "Reversible hiding in DCT-based compressed images," Information Sciences, vol.177, no.13, pp.2768-2786, 2007.   DOI   ScienceOn
6 S. Lee, C. D. Yoo and T. Kalker, "Reversible image watermarking based on integerto-integer wavelet transform," IEEE Trans. on Information Forensics and Security, vol.2, no.3, pp.321-330, 2007.   DOI
7 C. C. Chang, W. L. Tai and C. C. Lin, "A reversible data hiding scheme based on side match vector quantization," IEEE Trans. on Circuits and Systems for Video Technology, vol.16, no.10, pp.1301-1308, 2006.   DOI
8 C. H. Yang and Y. C. Lin, "Reversible data hiding of a VQ index table based on referred counts," Journal of Visual Communication and Image Representation, vol.20, no.6, pp.399-407, 2009.   DOI   ScienceOn
9 N. Dai, G. Feng and Q. Zeng, "Reversible watermarking using adaptive edge-guided interpolation,"KSII Trans. on Internet and Information Systems, vol.4, no.4, pp.856-873, 2011.
10 H.J. Hwang, H.J. Kim, V. Sachnev, and S.H. Joo, "Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting," KSII Trans. on Internet and Information Systems, vol. 4, no. 4, pp. 655-670, 2010.
11 C.H. Yang and M.H. Tsai, "Improving histogram-based reversible data hiding by interleaving predictions," IET Image Processing, vol.4, no.4, pp.223-234, 2010.   DOI   ScienceOn
12 W. Bender, D. Gruhl, N. Morioto and A. Lu, "Techniques for data hiding," International Business Machines Corporation System Journal, vol.35, pp. 13-336, 1996.
13 D. Artz, "Digital steganographic: hiding data within data," IEEE International computing, vol.5, no.3, pp.75-80, 2001.   DOI   ScienceOn
14 W. J. Chen, C. C. Chang and T. H. N. Le, "High payload steganography mechanism using hybrid edge detector," Expert Systems with Applications, vol.37, no.4, pp.3292-3301, 2010.   DOI   ScienceOn
15 C. K. Chan and L. M. Chen, "Hiding data in images by simple LSB substitution," Pattern Recognition, vol.37, no.3, pp.469-474, 2004.   DOI   ScienceOn
16 R. Z. Wang, C. F. Lin and J. C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, vol.34, no.3, pp.671-683, 2001.   DOI   ScienceOn
17 J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. on Circuits Systems for Video Technology, vol.13, no.8, pp.890-896, 2003.   DOI   ScienceOn
18 C. H. Yang and S. J. Wang, "Weighted bipartite graph for location optimal LSB substitution for secret embedding," Journal of Discrete Mathematical Sciences and Cryptography, vol.9, no.1, pp.153-164, 2006.   DOI
19 C. H. Yang, "Inverted pattern approach to improve image quality of information hiding by LSB substitution," Pattern Recognition, vol.3, no.3, pp.488-497, 2008.
20 Z. Ni, Y. Q. Shi, N. Ansari and W. Su, "Reversible data hiding," IEEE Trans. on Circuits and Systems for Video Technology, vol.16, no.3, pp.354-362, 2006.
21 L. Kamstra and H. J. A .M. Heijmans, "Reversible data embedding into images using wavelet techniques and sorting," IEEE Trans. on Image Processing, vol.14, no.12, pp.2082-2090, 2005.   DOI
22 A. M. Alattar, "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Trans. on Image Processing, vol.13, no.8, pp.1147-1156, 2004.   DOI   ScienceOn
23 C. D. Vleeschouwer, J.F. Delaigle and B. Macq, "Circular interpretation of bijective transformations in lossless watermarking for media asset management," IEEE Trans. on Multimedia, vol.5, no.1, pp.97-105, 2003.   DOI   ScienceOn
24 C. C. Lee, H. C. Wu, C. S. Tsai and Y. P. Chu, "Adaptive lossless steganographic scheme with centralized difference expansion," Pattern Recognition, vol.41, no.6, pp.2097-2106, 2008.   DOI   ScienceOn
25 P. Y. Tsai, Y. C. Hu and H. L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Processing, vol.83, no.6, pp.1129-1143, 2009.