In this paper, we propose an adaptive reversible steganographic scheme based on the just noticeable distortion (JND). First, the JND value of each cover pixel is calculated using the frequency model of the human visual system (HVS). Then, the prediction value of the cover pixel is acquired by anisotropic interpolation, and also the pixel distribution characteristic is estimated. Finally, whether the cover pixel is embeddable or not is adaptively determined according to the relationship between the prediction error and the JND value. The embedding procedure is based on modifying the prediction error of each cover pixel, and the visual degradation caused by embedding is imperceptible due to the control of JND. Experimental results demonstrate that the proposed scheme provides a greater embedding rate and higher quality of stego image than other methods that have been reported recently.
Reversible data hiding Just noticeable distortion Embedding rate Visual quality
This is a preview of subscription content, log in to check access.
This work was supported by the Natural Science Foundation of China (61303203), the Natural Science Foundation of Shanghai, China (13ZR1428400), the Innovation Program of Shanghai Municipal Education Commission (14YZ087), and the OECE Innovation Foundation of USST.
Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177(13):2768–2786CrossRefGoogle Scholar
Chou CH, Li YC (1995) A perceptually tuned subband image coder based on the measurement of just-noticeable-distortion profile. IEEE Trans Circ Syst Video Technol 5(6):467–476CrossRefGoogle Scholar
Fridrich J, Goljan M, Du R (2001) Invertible authentication. Proceedings of SPIE Security and Watermarking of Multimedia Contents III, San Jose, vol. 4314, pp 197–208Google Scholar
Fridrich J, Goljan M, Du R (2002) Lossless data embedding—new paradigm in digital watermarking. EURASIP J Appl Signal Process 2002(2):185–196CrossRefMATHGoogle Scholar
Hong W, Chen TS (2011) Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism. J Vis Commun Image Represent 22(2):131–140CrossRefMathSciNetGoogle Scholar
Jung SW, Ha LT, Ko SJ (2011) A new histogram modification based reversible data hiding algorithm considering the human visual system. IEEE Signal Process Lett 18(2):95–98CrossRefGoogle Scholar
Lee CF, Chen HL, Tso HK (2010) Embedding capacity raising in reversible data hiding based on prediction of difference expansion. J Syst Softw 83(10):1864–1872CrossRefGoogle Scholar
Liu YC, Wu HC, Yu SS (2011) Adaptive DE-based reversible steganographic technique using bilinear interpolation and simplified location map. Multimed Tools Appl 52(2–3):263–276CrossRefGoogle Scholar
Ni ZC, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16(3):354–362CrossRefGoogle Scholar
Qin C, Chang CC, Huang YH, Liao LT (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circ Syst Video Technol 23(7):1109–1118CrossRefGoogle Scholar
Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circ Syst Video Technol 19(6):906–910CrossRefGoogle Scholar
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890–896CrossRefGoogle Scholar
Tsai P, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129–1143CrossRefMATHGoogle Scholar
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRefGoogle Scholar
Watson AB (1993) DCT quantization matrices visually optimized for individual images. Proceedings of SPIE Human Vision, Visual Processing, and Digital Display IV, Bellingham, WA, pp 202–216Google Scholar
Zhao Z, Luo H, Lu ZM, Pan JS (2011) Reversible data hiding based on multilevel histogram modification and sequential recovery. Int J Electron Commun 65(10):814–826CrossRefGoogle Scholar