Advertisement

Multimedia Tools and Applications

, Volume 74, Issue 15, pp 5861–5872 | Cite as

Reversible data hiding scheme based on exploiting modification direction with two steganographic images

  • Chuan Qin
  • Chin-Chen Chang
  • Tai-Jung Hsu
Article

Abstract

In this paper, we propose a novel data hiding scheme with reversibility based on exploiting modification direction (EMD). One cover image is first chosen and prepared to generate two visually similar steganographic images. During the secret embedding, the pixels in the first steganographic image are modified by no more than one gray level to embed secret data using the traditional EMD method, while the pixels in the second steganographic image are adaptively modified through referring to the first steganographic image without any confusions in image recovery process. On the receiver side, secret data can be extracted easily and the original cover image can also be recovered from the two steganographic images correctly. Experimental results demonstrate that our scheme can achieve high hiding capacity and satisfactory visual quality.

Keywords

Reversible data hiding Exploiting modification direction Hiding capacity Image quality 

Notes

Acknowledgments

This work was supported by the Natural Science Foundation of China (61303203), the Natural Science Foundation of Shanghai, China (13ZR1428400), and the Innovation Program of Shanghai Municipal Education Commission (14YZ087).

References

  1. 1.
    Alattar AM (2004) Reversible watermarking using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156MathSciNetCrossRefGoogle Scholar
  2. 2.
    Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474zbMATHCrossRefGoogle Scholar
  3. 3.
    Coltuc D (2012) Low distortion transform for reversible watermarking. IEEE Trans Image Process 21(1):412–417MathSciNetCrossRefGoogle Scholar
  4. 4.
    Highland HJ (1997) Data encryption: a non-mathematical approach. Comput Secur 16(5):369–386CrossRefGoogle Scholar
  5. 5.
    Ker A (2004) Improved detection of LSB steganography in grayscale images. In: Proc Information Hiding Workshop, vol. 3200. Springer LNCS, pp. 97–115Google Scholar
  6. 6.
    Lee CF, Chen HL, Tso HK (2010) Embedding capacity raising in reversible data hiding based on prediction of difference expansion. J Syst Softw 83(10):1864–1872CrossRefGoogle Scholar
  7. 7.
    Li XL, Li B, Yang B, Zeng TY (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans Image Process 22(6):2181–2191MathSciNetCrossRefGoogle Scholar
  8. 8.
    Mielikainen J (2006) LSB matching revisited. IEEE Signal Proc Lett 13(5):285–287CrossRefGoogle Scholar
  9. 9.
    Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16(3):354–362CrossRefGoogle Scholar
  10. 10.
    Qin C, Chang CC, Huang YH, Liao LT (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circ Syst Video Technol 23(7):1109–1118CrossRefGoogle Scholar
  11. 11.
    Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystem. Commun ACM 21(2):120–126zbMATHMathSciNetCrossRefGoogle Scholar
  12. 12.
    Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730MathSciNetCrossRefGoogle Scholar
  13. 13.
    Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890–896CrossRefGoogle Scholar
  14. 14.
    Zeng XT, Li Z, Ping LD (2012) Reversible data hiding scheme using reference pixel and multi-layer embedding. AEU Int J Electron Commun 66(7):532–539CrossRefGoogle Scholar
  15. 15.
    Zhang X (2013) Reversible data hiding with optimal value transfer. IEEE Trans Multimed 15(2):316–325CrossRefGoogle Scholar
  16. 16.
    Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783CrossRefGoogle Scholar
  17. 17.
    Zhou J, Au OC (2012) Determining the capacity parameters in PEE-based reversible image watermarking. IEEE Signal Proc Lett 19(5):287–290CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.School of Optical-Electrical and Computer EngineeringUniversity of Shanghai for Science and TechnologyShanghaiChina
  2. 2.Department of Information Engineering and Computer ScienceFeng Chia UniversityTaichungTaiwan
  3. 3.Department of Computer Science and Information EngineeringAsia UniversityTaichungTaiwan
  4. 4.Department of Computer Science and Information EngineeringNational Chung Cheng UniversityChiayiTaiwan

Personalised recommendations