Survey of Recent Reversible Data Hiding Schemes.

A B S T R A C T Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is always to conceal the very existence of the embedded data. Watermarking is one of the promising solutions for tamper detection and protection of digital content. However, watermarking can cause damage to the sensitive information present in the cover work. Therefore, at the receiving end, the exact recovery of cover work may not be possible. Additionally, there exist certain applications that may not tolerate even small distortions in cover work prior to the downstream processing. In such applications, reversible data hiding instead of conventional watermarking is employed. Reversible data hiding of digital content allows full extraction of the secret data along with the complete restoration of the cover work. Due to the rapid evolution of reversible data hiding techniques, a latest review of recent research in this field is highly desirable.

[1]  Hany Farid,et al.  Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.

[2]  Chengyun Yang,et al.  Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique , 2004, IWDW.

[3]  Jessica J. Fridrich,et al.  Lossless Data Embedding—New Paradigm in Digital Watermarking , 2002, EURASIP J. Adv. Signal Process..

[4]  Asifullah Khan,et al.  Digital image authentication and recovery: Employing integer transform based information embedding and extraction , 2010, Inf. Sci..

[5]  Mauro Barni,et al.  Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .

[6]  Jeffrey J. Rodríguez,et al.  Prediction-error based reversible watermarking , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[7]  Benoit M. Macq,et al.  Lossless multiresolution transform for image authenticating watermarking , 2000, 2000 10th European Signal Processing Conference.

[8]  Chien-Ping Chang,et al.  High-payload image hiding with quality recovery using tri-way pixel-value differencing , 2012, Inf. Sci..

[9]  Der-Chyuan Lou,et al.  LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis , 2012, Inf. Sci..

[10]  Chin-Chen Chang,et al.  Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation , 2006, IEEE Transactions on Information Forensics and Security.

[11]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[12]  Asifullah Khan,et al.  A high capacity reversible watermarking approach for authenticating images: Exploiting down-sampling, histogram processing, and block selection , 2014, Inf. Sci..

[13]  Tae-Sun Choi,et al.  Machine learning based adaptive watermark decoding in view of anticipated attack , 2008, Pattern Recognit..

[14]  Cheng-Hsing Yang,et al.  Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[15]  Dinu Coltuc,et al.  Very Fast Watermarking by Reversible Contrast Mapping , 2007, IEEE Signal Processing Letters.

[16]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[17]  Xuelong Li,et al.  Reversibility improved lossless data hiding , 2009, Signal Process..

[18]  Xiao Zeng,et al.  Reversible Image Watermarking Using Interpolation Technique , 2010, IEEE Transactions on Information Forensics and Security.

[19]  Muhammad Arsalan,et al.  Intelligent reversible watermarking in integer wavelet domain for medical images , 2012, J. Syst. Softw..

[20]  Hsi-Chin Hsin,et al.  Nested Quantization Index Modulation for Reversible Watermarking and Its Application to Healthcare Information Management Systems , 2011, Comput. Math. Methods Medicine.