An improved reversible data hiding scheme using layered embedding

  • Zi-Long Liu
  • Guangrong Shan


Reversible data hiding (RDH) embeds data into the original image content, and it can also losslessly recover the original image content after the embedded data is extracted. Some previous RDH algorithms, such as the algorithm proposed by Luo et al., generate a large amount of overhead information, which may affect data extraction and image recovery in the following phase. In this paper, we solve this problem by designing layered embedding, cyclic embedding and bidirectional embedding, as a result of which an improved scheme of Luo et al.’s algorithm is proposed. The proposed scheme can reduce the amount of overhead information by dozens of times, which is beneficial for increasing the embedding rate and PSNR value. Experimental results show that the performance of the improved scheme outperforms the algorithm proposed by Luo et al. and other previous RDH algorithms.


Reversible data hiding Layered embedding Cyclic embedding Bidirectional embedding 



This work was supported by the basic scientific research project of the central university of Northwest Minzu University (Project ID: 31920150085).


  1. 1.
    Al-Juaid AN, Gutub AA, Khan EA (2018) Enhancing PC data security via combining RSA cryptography and video based steganography. J Inform Sec Cybercrimes Res 1(1):8–18Google Scholar
  2. 2.
    Abdallah EE, Hamza AB, Bhattacharya P (2007) MPEG video watermarking using tensor singular value decomposition. Int Conf Image Analy Recogn 4633:772–783CrossRefGoogle Scholar
  3. 3.
    Abdallah EE, Hamza AB, Bhattacharya P (2010) Video watermarking using wavelet transform and tensor algebra. Signal Image Video Process 4(2):233–245CrossRefGoogle Scholar
  4. 4.
    Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate Array on RGB indicator. Int J Signal Image Process 1(3):196–204Google Scholar
  5. 5.
    Alattar AM (2004) Reversible watermark using difference expansion of a generalized integer transform. IEEE Trans Image Process 3(8):1147–1156MathSciNetCrossRefGoogle Scholar
  6. 6.
    Al-Otaibi NA, Gutub AA (2014) 2-Leyer security system for hiding sensitive text data on personal computers. Lect Notes Inform Theor 2(2):73–79Google Scholar
  7. 7.
    Al-Otaibi NA, Gutub AA (2014) Flexible Stego-system for hiding text in images of personal computers based on user security priority. roceedings of 2014 international conference on advanced engineering technologies, Dubai, UAE: 250–256Google Scholar
  8. 8.
    Barton JM (1997) Method and apparatus for embedding authentication information within digital data. U. S. Patent 5(646):997Google Scholar
  9. 9.
    Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253–266CrossRefGoogle Scholar
  10. 10.
    Chen X, Sun X, Sun H, Xiang L, Yang B (2015) Histogram shifting based reversible data hiding method using directed-prediction scheme. Multimed Tools Appl 74(15):5747–5765CrossRefGoogle Scholar
  11. 11.
    Coatrieux G, Pan W, Cuppens-Boulahia N, Cuppens F, Roux C (2013) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inf Forensic Sec 8(1):111–120CrossRefGoogle Scholar
  12. 12.
    Coltuc D (2012) Low distortion transform for reversible watermarking. IEEE Trans Image Process 21(1):412–417MathSciNetCrossRefGoogle Scholar
  13. 13.
    Fridrich J, Goljan M, Du R (2001) Invertible authentication. Proceedings of the SPIE, security and watermarking of multimedia contents III, San Jose, USA: 197–208Google Scholar
  14. 14.
    Fridrich J, Goljan M, Du R (2002) Lossless data embedding for all image formats. Proc SPIE Sec Watermark Multimed Contents IV. San Jose, USA: 572–583Google Scholar
  15. 15.
    Gutub A (2010) Pixel Indicator technique for RGB image steganography. J Emerg Technol Web Intell 2(1):56–64Google Scholar
  16. 16.
    Gutub A, Al-juaid N (2018) Multi-bits stego-system for hiding text in multimedia images based on user security priority. J Comput Hardware Eng.
  17. 17.
    Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl.
  18. 18.
    Gutub A, Al-Qahtani A, Tabakh A (2009) Triple-A: Secure RGB image steganography based on randomization. 2009 ACS/IEEE Int Conf Comput Syst Appl Rabat, Morocco: 400–403Google Scholar
  19. 19.
    Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A (2008) Pixel indicator high capacity technique for RGB image based steganography. 2008–5th IEEE Int Workshop Signal Process Appl, University of Sharjah, UAE: 1–3Google Scholar
  20. 20.
    Hiary S, Jafar I, Hiary H (2017) An efficient multi-predictor reversible data hiding algorithm based on performance evaluation of different prediction schemes. Multimed Tools Appl 76(2):2131–2157CrossRefGoogle Scholar
  21. 21.
    Hong W (2012) Adaptive reversible data hiding method based on error energy control and histogram shifting. Opt Commun 285(2):101–108CrossRefGoogle Scholar
  22. 22.
    Khan F, Gutub AA (2007) Message concealment techniques using image based steganography. 4th IEEE GCC Conf Exhibit Gulf Int Convention Centre, Manamah, Bahrain: 11–14Google Scholar
  23. 23.
    Kim HJ, Sachney V, Shi YQ, Choo HG (2008) A novel difference expansion transform for reversible data embedding. IEEE Trans Inf Forensic Sec 3(3):456–465CrossRefGoogle Scholar
  24. 24.
    Li XL, Li B, Yang B, Zeng TY (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans Image Process 22(6):2181–2191MathSciNetCrossRefGoogle Scholar
  25. 25.
    Lin CC, Yang SP, Hsueh NL (2008) Lossless data hiding based on difference expansion without a location map. 2008 Congress Image Signal Process: 8–12Google Scholar
  26. 26.
    Liu XY, Wang YF, Du JY, Liao SH, Lou JT, Zou BJ (2018) Robust hybrid image watermarking scheme based on KAZE features and IWT-SVD. Multimed Tools Appl.
  27. 27.
    Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Sec 5(1):187–193CrossRefGoogle Scholar
  28. 28.
    Makbol NM, Khoo BE, Rassem TH (2018) Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain. Multimed Tools Appl.
  29. 29.
    Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16(3):354–362CrossRefGoogle Scholar
  30. 30.
    Parvez MT, Gutub AA (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38(1B):127–142Google Scholar
  31. 31.
    Peng F, Li X, Yang B (2012) Adaptive reversible data hiding scheme based on integer transform. Signal Process 92(1):54–62CrossRefGoogle Scholar
  32. 32.
    TEST IMAGES (2014) Miscelaneous gray level images. Available:
  33. 33.
    Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890–896CrossRefGoogle Scholar
  34. 34.
    Tsai P, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129–1143CrossRefGoogle Scholar
  35. 35.
    Tsai YY, Tsai DS, Liu CL (2013) Reversible data hiding scheme based on neighboring pixel differences. Digit Signal Process 23(3):919–927MathSciNetCrossRefGoogle Scholar
  36. 36.
    Wu HT, Huang J (2012) Reversible image watermarking on prediction errors by efficient histogram modification. Signal Process 92(12):3000–3009CrossRefGoogle Scholar
  37. 37.
    Wu HZ, Wang HX, Shi YQ (2016) PPE-based reversible data hiding. Proc 4th ACM Workshop Inform Hiding Multimed Sec: 187–188Google Scholar
  38. 38.
    Yang Y, Zhang WM, Liang D, Yu NH (2016) Reversible data hiding in medical images with enhanced contrast in texture area. Digital Signal Process 52:13–24CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Mathematics and Computer ScienceNorthwest Minzu UniversityLanzhouChina

Personalised recommendations