Reversible Data Hiding Under Inconsistent Distortion Metrics

Recursive code construction (RCC), based on the optimal transition probability matrix (OTPM), approaching the rate-distortion bound of reversible data hiding (RDH) has been proposed. Using the existing methods, OTPM can be effectively estimated only for a consistent distortion metric, i.e., if the host elements at different positions share the same distortion metric. However, in many applications, the distortion metrics are position dependent and should thus be inconsistent. Inconsistent distortion metrics can usually be quantified as a multi-distortion metric. In this paper, we first formulate the rate-distortion problem of RDH under a multi-distortion metric and subsequently propose a general framework to estimate the corresponding OTPM, with which RCC is extended to approach the rate-distortion bound of RDH under the multi-distortion metric. We apply the proposed framework to two examples of inconsistent distortion metrics: RDH in color image and reversible steganography. The experimental results show that the proposed method can efficiently improve upon the existing techniques.

[1]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.

[2]  Yao Zhao,et al.  Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding , 2015, Signal Process..

[3]  Jeho Nam,et al.  Reversible Watermarking Algorithm Using Sorting and Prediction , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[4]  Weiming Zhang,et al.  Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers , 2012, IEEE Transactions on Image Processing.

[5]  F. Willems,et al.  Capacity bounds and constructions for reversible data-hiding , 2002, 2002 14th International Conference on Digital Signal Processing Proceedings. DSP 2002 (Cat. No.02TH8628).

[6]  Weiming Zhang,et al.  Capacity-Approaching Codes for Reversible Data Hiding , 2011, Information Hiding.

[7]  KimHyoung Joong,et al.  Reversible watermarking algorithm using sorting and prediction , 2009 .

[8]  Chuan Qin,et al.  Guided filtering based color image reversible data hiding , 2017, J. Vis. Commun. Image Represent..

[9]  Sung-Jea Ko,et al.  A New Histogram Modification Based Reversible Data Hiding Algorithm Considering the Human Visual System , 2011, IEEE Signal Processing Letters.

[10]  Wei-Ho Chung,et al.  The Scalar Scheme for Reversible Information-Embedding in Gray-Scale Signals: Capacity Evaluation and Code Constructions , 2012, IEEE Transactions on Information Forensics and Security.

[11]  Weiming Zhang,et al.  Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression , 2013, IEEE Transactions on Image Processing.

[12]  Weiming Zhang,et al.  Reversible image processing via reversible data hiding , 2016, 2016 IEEE International Conference on Digital Signal Processing (DSP).

[13]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[14]  Jian Li,et al.  Reversible data hiding scheme for color image based on prediction-error expansion and cross-channel correlation , 2013, Signal Process..

[15]  Fei Peng,et al.  High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion , 2017, Neurocomputing.

[16]  Weiming Zhang,et al.  Efficient Reversible Data Hiding Based on Multiple Histograms Modification , 2015, IEEE Transactions on Information Forensics and Security.

[17]  Yongjian Hu,et al.  DE-Based Reversible Data Hiding With Improved Overflow Location Map , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[18]  Bin Li,et al.  A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.

[19]  Mandeep Kaur,et al.  Reversible Watermarking Techniques for Medical Images with ROI-Temper Detection and Recovery-A Survey , 2010 .

[20]  Weiming Zhang,et al.  Reversible steganography: Data hiding for covert storage , 2015, 2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA).

[21]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[22]  Weiming Zhang,et al.  Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications , 2015, IEEE Transactions on Image Processing.

[23]  Weiming Zhang,et al.  Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Yu-Chen Hu,et al.  Reversible image hiding scheme using predictive coding and histogram shifting , 2009, Signal Process..

[25]  Kuo-Liang Chung,et al.  Reversible Data Hiding-Based Approach for Intra-Frame Error Concealment in H.264/AVC , 2010, IEEE Transactions on Circuits and Systems for Video Technology.

[26]  Tieyong Zeng,et al.  Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.

[27]  Jessica J. Fridrich,et al.  Lossless data embedding for all image formats , 2002, IS&T/SPIE Electronic Imaging.

[28]  Xinpeng Zhang,et al.  Reversible Data Hiding With Optimal Value Transfer , 2013, IEEE Transactions on Multimedia.

[29]  Weiming Zhang,et al.  Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding , 2013, IEEE Transactions on Information Forensics and Security.

[30]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[31]  Fei Peng,et al.  Adaptive reversible data hiding scheme based on integer transform , 2012, Signal Process..

[32]  Xing Zhang,et al.  Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting , 2017, IEEE Transactions on Cybernetics.

[33]  Jian Sun,et al.  Guided Image Filtering , 2010, ECCV.

[34]  Weiming Zhang,et al.  Improving visual quality of reversible data hiding by twice sorting , 2016, Multimedia Tools and Applications.

[35]  Tung-Shou Chen,et al.  Reversible data hiding using Delaunay triangulation and selective embedment , 2015, Inf. Sci..

[36]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[37]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[38]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[39]  Kumar Parasuraman,et al.  Reversible image watermarking using interpolation technique , 2014, 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE).

[40]  Ton Kalker,et al.  Capacity bounds and constructions for reversible data-hiding , 2003, IS&T/SPIE Electronic Imaging.

[41]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[42]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.