Browse > Article
http://dx.doi.org/10.9717/kmms.2012.15.5.639

A novel Reversible Data Hiding Scheme based on Modulo Operation and Histogram Shifting  

Kim, Dae-Soo (경북대학교 정보보호학과)
Yoo, Kee-Young (경북대학교 IT 대학 컴퓨터학부)
Publication Information
Abstract
In 2009, Tsai et al. proposed reversible image hiding scheme using linear prediction coding and histogram shifting. Tsai et al.'s scheme improved the hiding capacity of Ni et al.'s scheme by using the prediction coding and two histograms. However, Tsai et al.'s scheme has problems. In the prediction coding, the basic pixel is not used from embedding procedure. Many additional communication data are generated because two peak and zero point pairs are generated by each block. To solve the problems, this paper proposes a novel reversible data hiding scheme based on modulo operation and histogram shifting. In experimental results, the hiding capacity was increased by 28% than Tsai et al.'s scheme. However, the additional communication data was decreased by 71%.
Keywords
Steganography; Reversible data hiding; Histogram shifting; Modulo operation;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 D. Artz, "Digital Steganography: Hiding Data Within Data," IEEE Internet Computing, Vol. 5, No.3, pp. 75-80, 2001.   DOI   ScienceOn
2 R.Z.Wang, C.F. Lin, and J.C. Lin, "Image Hiding by Optimal LSB Substitution and Genetic Algorithm," Pattern Recognition, Vol.34, No.3, pp. 671-683, 2001.   DOI
3 C.C. Chang, Y.H. Yu, and Y.C. Hu, "Hiding Secret Data in Images Via Predictive Coding," Pattern Recognition, Vol.38, No.5, pp. 691-705, 2005.   DOI
4 Y.C. Hu, "High Capacity Image Hiding Scheme Based on Vector Quantization," Pattern Recognition, Vol.39, No.9, pp. 1715-1724, 2006.   DOI
5 C.L Liu and S.R Liao, "High-Performance JPEG Steganography using Complementary Embedding Strategy," Pattern Recognition, Vol. 41, No.9, pp. 2945-2966, 2008.   DOI
6 M.U. Celik, G. Sharma, A.M. Tekalp., and E. Saber, "Reversible Data Hiding," Proc. of International Conference on Image Processing, Rochester, NY, USA, Vol.2, pp. 157-160, September 24, 2002.
7 J. Tian, "Wavelet-based Reversible Watermarking for Authentication," Proc. Security and Watermarking of Multimedia Contents IV, Electronic Imaging 2002, Vol.4675, pp. 679-690, 2002.
8 J. Tian, "Reversible Watermarking by Difference Expansion," Proc. of Workshop on Multimedia and Security, pp. 19-22, 2002.
9 H.C. Wu, C.C. Lee, C.S. Tsai, Y.P. Chu, and H.R. Chen, "A High Capacity Reversible Data Hiding Scheme with Edge Prediction and Difference Expansion," The Journal of Systems and Software, Vol.82, No.12, pp. 1966-1973, 2009.   DOI
10 H.C. Wu, H.C. Wang, C.S. Tsai, and C.M. Wang, "Reversible Image Steganographic Scheme Via Predictive Coding," Displays, Vol.31, No.1, pp. 35-43, 2010.   DOI
11 Y.C. Li, C.M. Yeh, and C.C. Chang, "Data Hiding Based on the Similarity Between Neighboring Pixels with Reversibility," Digital Signal Processing, Vol.20, Issue4, pp. 1116-1128, 2010.   DOI
12 Z. Ni, Y.U. N.Q. Shi, N. Ansari, and W.E.I. Su, "Reversible Data Hiding," IEEE Transactions on Circuits and Systems for Video Technology, Vol.16, No.3, pp. 354-362, 2006.   DOI   ScienceOn
13 P. Tsai, Y.C. Hu, and H.L. Yeh, "Reversible Image Hiding Scheme using Predictive Coding and Histogram Shifting," Signal Processing, Vol.89, No.6, pp. 1129-1143, 2009.   DOI
14 D.S. Kim, G.J. Lee, and K.Y. Yoo, "A Reversible Image Scheme Using Novel Linear Prediction Coding and Histogram Shifting," The 2011 International Conference on Security & Management, pp. 282-287, 2011.
15 I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Vol.1. Morgan Kaufmann, 2 edition, 2008.
16 S.H, Bae, "A High Capacity Reversible Watermarking Using Histogram Shifting", Journal of Korea Multimedia Society, Vol. 13, No. 1, pp. 76-82, 2010.   과학기술학회마을