Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression

State-of-the-art schemes for reversible data hiding (RDH) usually consist of two steps: first construct a host sequence with a sharp histogram via prediction errors, and then embed messages by modifying the histogram with methods, such as difference expansion and histogram shift. In this paper, we focus on the second stage, and propose a histogram modification method for RDH, which embeds the message by recursively utilizing the decompression and compression processes of an entropy coder. We prove that, for independent identically distributed (i.i.d.) gray-scale host signals, the proposed method asymptotically approaches the rate-distortion bound of RDH as long as perfect compression can be realized, i.e., the entropy coder can approach entropy. Therefore, this method establishes the equivalency between reversible data hiding and lossless data compression. Experiments show that this coding method can be used to improve the performance of previous RDH schemes and the improvements are more significant for larger images.

[1]  Weiming Zhang,et al.  Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers , 2012, IEEE Transactions on Image Processing.

[2]  Yu-Chen Hu,et al.  Reversible image hiding scheme using predictive coding and histogram shifting , 2009, Signal Process..

[3]  F. Willems,et al.  Capacity bounds and constructions for reversible data-hiding , 2002, 2002 14th International Conference on Digital Signal Processing Proceedings. DSP 2002 (Cat. No.02TH8628).

[4]  Beng Chin Ooi,et al.  Tailored reversible watermarking schemes for authentication of electronic clinical atlas , 2005, IEEE Transactions on Information Technology in Biomedicine.

[5]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[6]  Weiming Zhang,et al.  Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding , 2013, IEEE Transactions on Information Forensics and Security.

[7]  Weiming Zhang,et al.  Capacity-Approaching Codes for Reversible Data Hiding , 2011, Information Hiding.

[8]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[9]  Xiao Zeng,et al.  Reversible Image Watermarking Using Interpolation Technique , 2010, IEEE Transactions on Information Forensics and Security.

[10]  Yongjian Hu,et al.  DE-Based Reversible Data Hiding With Improved Overflow Location Map , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[11]  Jessica J. Fridrich,et al.  Lossless data embedding for all image formats , 2002, IS&T/SPIE Electronic Imaging.

[12]  Wei-Ho Chung,et al.  The Scalar Scheme for Reversible Information-Embedding in Gray-Scale Signals: Capacity Evaluation and Code Constructions , 2012, IEEE Transactions on Information Forensics and Security.

[13]  Tung-Shou Chen,et al.  Reversible data hiding for high quality images using modification of prediction errors , 2009, J. Syst. Softw..

[14]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[15]  Iuon-Chang Lin,et al.  Reversible Watermarking: Current Status and Key Issues , 2006, Int. J. Netw. Secur..

[16]  Kuo-Liang Chung,et al.  Reversible Data Hiding-Based Approach for Intra-Frame Error Concealment in H.264/AVC , 2010, IEEE Transactions on Circuits and Systems for Video Technology.

[17]  Tieyong Zeng,et al.  Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.

[18]  Jeho Nam,et al.  Reversible Watermarking Algorithm Using Sorting and Prediction , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[19]  Dinu Coltuc,et al.  Low distortion transform for reversible watermarking , 2012, IEEE Transactions on Image Processing.