Browse > Article
http://dx.doi.org/10.9717/kmms.2021.24.6.768

An Improved Interpolation Method using Pixel Difference Values for Effective Reversible Data Hiding  

Kim, Pyung Han (Dept. of Computer Science & Eng., Graduate School, Kyungpook National University)
Jung, Ki Hyun (Dept. of Computer Science, Kyungil University)
Yoon, Eun-Jun (Dept. of Computer Science, Kyungil University)
Ryu, Kwan-Woo (Dept. of Computer Science & Eng., Graduate School, Kyungpook National University)
Publication Information
Abstract
The reversible data hiding technique safely transmits secret data to the recipient from malicious attacks by third parties. In addition, this technique can completely restore the image used as a transmission medium for secret data. The reversible data hiding schemes have been proposed in various forms, and recently, the reversible data hiding schemes based on interpolation are actively researching. The reversible data hiding scheme based on the interpolation method expands the original image into the cover image and embed secret data. However, the existing interpolation-based reversible data hiding schemes did not embed secret data during the interpolation process. To improve this problem, this paper proposes embedding the first secret data during the image interpolation process and embedding the second secret data into the interpolated cover image. In the embedding process, the original image is divided into blocks without duplicates, and the maximum and minimum values are determined within each block. Three way searching based on the maximum value and two way searching based on the minimum value are performed. And, image interpolation is performed while embedding the first secret data using the PVD scheme. A stego image is created by embedding the second secret data using the maximum difference value and log function in the interpolated cover image. As a result, the proposed scheme embeds secret data twice. In particular, it is possible to embed secret data even during the interpolation process of an image that did not previously embed secret data. Experimental results show that the proposed scheme can transmit more secret data to the receiver while maintaining the image quality similar to other interpolation-based reversible data hiding schemes.
Keywords
Reversible Data Hiding; Pixel Value Differencing; Maximum Value; Minimum Value; Maximum Difference Value; PSNR; Embedding Capacity;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C.F. Lee and Y.L. Huang, "An Efficient Image Interpolation Increasing Payload in Reversible Data Hiding," Expert Systems with Applications, Vol. 39, pp. 6712-6719, 2012.   DOI
2 J.H. Lee, P.H. Kim, K.H. Jung, and K.Y. Yoo, "Information Hiding Method Based on Interpolation Using Max Difference of RGB Pixel for Color Images," Journal of Korea Multimedia Society, Vol. 20, No. 4, pp. 629-639, 2017.   DOI
3 B. Jana, D. Giri, and S.K. Mondal, "Weighted Matrix Based Reversible Data Hiding Scheme Using Image Interpolation," Computer Intelligence in Data Mining, Vol. 2, pp. 239-248, 2016.
4 T.C. Lu, "Interpolation-based Hiding Scheme Using the Modulus Function and Re-encoding Strategy," Signal Processing, Vol. 142, pp. 244-259, 2018.   DOI
5 K.H. Jung and K.Y. Yoo, "Data Hiding Method Using Image Interpolation," Computer Standards & Interfaces, Vol. 31, pp. 465-470, 2009.   DOI
6 D.C. Wu and W.H. Tsai, "A Steganographic Method for Images by Pixel-value Differencing," Pattern Recognition Letters, Vol. 24, pp. 1613-1626, 2003.   DOI
7 Z. Ni, Y.U.N.Q. Shi, N. Ansari and W.E.I. Su, "Reversible Data Hiding," IEEE Transactions on Circuits and System for Video Technology, Vol. 16, No. 3, pp. 354-362, 2006.   DOI
8 P.H. Kim, K.Y. Ryu, and K.H. Jung, "Reversible Data Hiding Scheme Based on Pixelvalue Differencing in Dual Images," Distributed Sensor Networks, Vol. 16, No. 7, 2020.
9 J. Hu and T. Li, "Reversible Steganography Using Extended Image Interpolation Technique," Computers and Electrical Engineering, Vol. 46, pp. 447-455, 2015.   DOI
10 S. Wang, Z. Cao, M.A. Strangio, and L. Wang, "Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol," IEEE Communications Letters, Vol. 12, No. 2, pp. 149-151, 2008.   DOI
11 C.W. Leung, F.Y. Ng, and D.S. Wong, "On the Security of a Visual Cryptography Scheme for Color Images," Pattern Recognition, Vol. 42, No. 5, pp. 920-940, 2009
12 W. Bender, D. Gruhl, N. Morimoto, Aiguo Lu, "Techniques for data hiding," IBM Systems Journal, Vol. 35, No. 3-4, pp. 313-336, 1996.   DOI
13 N.F. Johnson, and S. Jajodia, "Exploring Steganography: Seeing the Unseen," Computer Practices, Vol. 31, No. 2, pp. 26-34, 1998.
14 F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Information Hiding - a Survey," Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, Vol. 7, No. 87, pp. 1062-1078, 1999.
15 C. Kurah and J.Mchughes, "A Cautionary Note on Image Downgrading," IEEE Computer Security Applications Conference, Vol. 2, 1992.
16 X.Li, J. Li, B. Li, and B. Yang, "High-fidelity Reversible Data Hiding Scheme Based on Pixel-value-ordering and Prediction-error expansion," Signal Process, Vol. 93, pp. 198-205, 2013.   DOI