Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting

Abstract By leveraging the secret data coding using the remainder storage based exploiting modification direction (RSBEMD), and the pixel change operation recording based on multi-segment left and right histogram shifting, a novel reversible data hiding (RHD) scheme is proposed in this paper. The secret data are first encoded by some specific pixel change operations to the pixels in groups. After that, multi-segment left and right histogram shifting based on threshold manipulation is implemented for recording the pixel change operations. Furthermore, a multiple embedding policy based on chess board prediction (CBP) and threshold manipulation is put forward, and the threshold can be adjusted to achieve adaptive data hiding. Experimental results and analysis show that it is reversible and can achieve good performance in capacity and imperceptibility compared with the existing methods.

[1]  J. Raja Paul Perinbam,et al.  A Block Based Reversible Data Hiding Scheme for Digital Images Using Optimal Value Computation , 2017, Wirel. Pers. Commun..

[2]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[3]  Xiang Zhang,et al.  A reversible visible watermarking for 2D CAD engineering graphics based on graphics fusion , 2019, Signal Process. Image Commun..

[4]  Ingemar J. Cox,et al.  Digital watermarking for copyright protection: a communications perspective , 2001, IEEE Communications Magazine.

[5]  Michael T. Orchard,et al.  Edge-directed prediction for lossless compression of natural images , 2001, IEEE Trans. Image Process..

[6]  Hanung Adi Nugroho,et al.  Multiple layer data hiding scheme based on difference expansion of quad , 2017, Signal Process..

[7]  Vito Cappellini,et al.  Reversible watermarking for image integrity verification in hierarchical PACS , 2010, MM&Sec '10.

[8]  Huan Xu,et al.  An improved section-wise exploiting modification direction method , 2010, Signal Process..

[9]  Chin-Chen Chang,et al.  An Information Hiding Scheme Using Sudoku , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.

[10]  Weiming Zhang,et al.  Efficient Reversible Data Hiding Based on Multiple Histograms Modification , 2015, IEEE Transactions on Information Forensics and Security.

[11]  Xing Zhang,et al.  Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting , 2017, IEEE Transactions on Cybernetics.

[12]  Wen-Yuan Chen,et al.  Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation , 2007, Appl. Math. Comput..

[13]  Geeta Sikka,et al.  An image interpolation based reversible data hiding scheme using pixel value adjusting feature , 2017, Multimedia Tools and Applications.

[14]  Pingzhi Fan,et al.  An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization , 2008, IEEE Transactions on Multimedia.

[15]  Weiming Zhang,et al.  A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification , 2013, IEEE Trans. Inf. Forensics Secur..

[16]  Jeho Nam,et al.  Reversible Watermarking Algorithm Using Sorting and Prediction , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[17]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[18]  Bin Li,et al.  High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion , 2013, Signal Process..

[19]  Wei Su,et al.  Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[20]  Alessandro Neri,et al.  Secure annotation for medical images based on reversible watermarking in the Integer Fibonacci-Haar transform domain , 2011, Electronic Imaging.

[21]  He Yigang,et al.  Steganography based on wavelet transform and modulus function , 2007 .

[22]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[23]  Yao Zhao,et al.  LDFT-Based Watermarking Resilient to Local Desynchronization Attacks , 2013, IEEE Transactions on Cybernetics.

[24]  Fei Peng,et al.  A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates , 2019, Multimedia Tools and Applications.

[25]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[26]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[27]  Yao Zhao,et al.  Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding , 2015, Signal Process..

[28]  Henk J. A. M. Heijmans,et al.  Reversible data embedding into images using wavelet techniques and sorting , 2005, IEEE Transactions on Image Processing.

[29]  Xiaoyun Wang,et al.  High capacity data hiding based on interpolated image , 2016, Multimedia Tools and Applications.

[30]  Yong-Huai Huang,et al.  Hiding digital watermarks using multiresolution wavelet transform , 2001, IEEE Trans. Ind. Electron..

[31]  Ning Zhang,et al.  Lossless compression of color mosaic images , 2006, IEEE Transactions on Image Processing.

[32]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[33]  Oscar C. Au,et al.  Enhanced Image Trans-coding Using Reversible Data Hiding , 2007, 2007 IEEE International Symposium on Circuits and Systems.

[34]  Yao Zhao,et al.  Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[35]  Hefei Ling,et al.  No-Reference Perceptual Quality Assessment of JPEG Images Using General Regression Neural Network , 2006, ISNN.

[36]  W. Kuo,et al.  Data hiding based on generalised exploiting modification direction method , 2013 .

[37]  Chi-Yao Weng,et al.  An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection , 2017, Multimedia Tools and Applications.

[38]  Xiaolong Li,et al.  Improved PVO-based reversible data hiding: A new implementation based on multiple histograms modification , 2016, J. Vis. Commun. Image Represent..

[39]  Weiqing Wang,et al.  A high capacity reversible data hiding scheme based on right-left shift , 2018, Signal Process..