A local variance-controlled reversible data hiding method using prediction and histogram-shifting

The stego image quality produced by the histogram-shifting based reversible data hiding technique is high; however, it often suffers from lower embedding capacity compared to other types of reversible data hiding techniques. In 2009, Tsai et al. solved this problem by exploiting the similarity of neighboring pixels to construct a histogram of prediction errors; data embedding is done by shifting the error histogram. However, Tsai et al.'s method does not fully exploit the correlation of the neighboring pixels. In this paper, a set of basic pixels is employed to improve the prediction accuracy, thereby increasing the payload. To further improve the image quality, a threshold is used to select only low-variance blocks to join the embedding process. According to the experimental results, the proposed method provides a better or comparable stego image quality than Tsai et al.'s method and other existing reversible data hiding methods under the same payload.

[1]  Henk J. A. M. Heijmans,et al.  Reversible data embedding into images using wavelet techniques and sorting , 2005, IEEE Transactions on Image Processing.

[2]  Jeho Nam,et al.  Reversible Watermarking Algorithm Using Sorting and Prediction , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Sushil Jajodia,et al.  Information Hiding: Steganography and Steganalysis , 2005 .

[4]  Tung-Shou Chen,et al.  STEGANOGRAPHY FOR BLOCK TRUNCATION CODING COMPRESSED IMAGES USING HYBRID EMBEDDING SCHEME , 2010 .

[5]  Kou Wei-dong Reversible watermark using difference expansion , 2008 .

[6]  Jessica J. Fridrich,et al.  Lossless Data Embedding—New Paradigm in Digital Watermarking , 2002, EURASIP J. Adv. Signal Process..

[7]  Yongjian Hu,et al.  DE-Based Reversible Data Hiding With Improved Overflow Location Map , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[9]  Faouzi Kossentini,et al.  The emerging JBIG2 standard , 1998, IEEE Trans. Circuits Syst. Video Technol..

[10]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[11]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[12]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[13]  Yu-Chen Hu,et al.  Reversible image hiding scheme using predictive coding and histogram shifting , 2009, Signal Process..

[14]  Yun Q. Shi,et al.  Reversible Data Hiding , 2003, IWDW.

[15]  Zhe-Ming Lu,et al.  An improved lossless data hiding scheme based on image VQ-index residual value coding , 2009, J. Syst. Softw..

[16]  Chin-Chen Chang,et al.  Multilevel reversible data hiding based on histogram modification of difference images , 2008, Pattern Recognit..

[17]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[18]  Chin-Chen Chang,et al.  Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes , 2007, IEEE Transactions on Information Forensics and Security.

[19]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[20]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[21]  Hae-Yeoun Lee,et al.  Reversible data hiding exploiting spatial correlation between sub-sampled images , 2009, Pattern Recognit..