Reversible data hiding scheme based on exploiting modification direction with two steganographic images

In this paper, we propose a novel data hiding scheme with reversibility based on exploiting modification direction (EMD). One cover image is first chosen and prepared to generate two visually similar steganographic images. During the secret embedding, the pixels in the first steganographic image are modified by no more than one gray level to embed secret data using the traditional EMD method, while the pixels in the second steganographic image are adaptively modified through referring to the first steganographic image without any confusions in image recovery process. On the receiver side, secret data can be extracted easily and the original cover image can also be recovered from the two steganographic images correctly. Experimental results demonstrate that our scheme can achieve high hiding capacity and satisfactory visual quality.

[1]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[2]  Harold Joseph Highland,et al.  Data encryption: A non-mathematical approach , 1997, Comput. Secur..

[3]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[4]  Bin Li,et al.  General Framework to Histogram-Shifting-Based Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[5]  Andrew D. Ker Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.

[6]  Chin-Chen Chang,et al.  An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism , 2013, IEEE Transactions on Circuits and Systems for Video Technology.

[7]  Dinu Coltuc,et al.  Low distortion transform for reversible watermarking , 2012, IEEE Transactions on Image Processing.

[8]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[9]  Xian-Ting Zeng,et al.  Reversible data hiding scheme using reference pixel and multi-layer embedding , 2012 .

[10]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[11]  Xinpeng Zhang,et al.  Reversible Data Hiding With Optimal Value Transfer , 2013, IEEE Transactions on Multimedia.

[12]  Oscar C. Au,et al.  Determining the Capacity Parameters in PEE-Based Reversible Image Watermarking , 2012, IEEE Signal Processing Letters.

[13]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[14]  Chin-Feng Lee,et al.  Embedding capacity raising in reversible data hiding based on prediction of difference expansion , 2010, J. Syst. Softw..

[15]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[16]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[17]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[18]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.