Advertisement

Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme

  • Ching-Nung Yang
  • Song-Yu Wu
  • Yung-Shun Chou
  • Cheonshik KimEmail author
Article
  • 20 Downloads

Abstract

Recently, Jana et al. proposed the partial reversible data hiding (PRDH) based on (7, 4) Hamming code, which deals with three images: the original image (OI), the cover image (CI), and the stego image (SI). The CI is obtained by slightly modifying OI. After that, one can embed secret into CI to generate SI. The so-called partial reversible feature is that we can reconstruct the CI faultlessly, which is almost the same to the OI. However, in Jana et al.’s PRDH, the authors only adjust redundant bits by using (7, 4) Hamming code with even (or odd) parity. This simple approach may modify 3 redundant bits at most in 7 least significant bit (LSBs) to obtain CI from OI, and this degrades the CI quality seriously. In this paper, we construct two schemes: the proposed PRDH (PPRDH) and the modified PRDH (MPRDH). PPRDH enhances the partial reversible property that improves the visual quality of CI. And, MPRDH enhances PPRDH to achieve the high embedding capacity. Theoretical estimations of average mean square errors for these PRDH schemes are given to demonstrate the advantage of our PRDH schemes. In addition, we also point out two inaccurate descriptions in Jana et al.’s PRDH about position of embedded secret to more simplify the procedure of embedding secret.

Keywords

Data hiding Partial reversible data hiding Hamming code Error correcting Syndrome LSB 

Notes

Acknowledgements

This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by (2015R1D1A1A01059253), and was supported under the framework of international cooperation program managed by NRF (2016K2A9A2A05005255). Also, it was supported in part by Ministry of Science and Technology (MOST), under 105-2221-E-259-015-MY2.

References

  1. 1.
    Crandall R (1998) Some notes on steganography. http://dde.binghamton.edu/download/Crandall/matrix.pdf, December, 1998
  2. 2.
    Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in grayscale and color images. In: Proceedings of the ACM workshop on multimedia and security, Ottawa, Canada, October 5, pp 27–30Google Scholar
  3. 3.
    Hwang J, Kim JW, Choi JU (2006) A reversible watermarking based on histogram shifting. In: International workshop on digital watermarking, lecture notes in computer science, vol 4283, Springer, Jeju Island, Korea, pp 348–361Google Scholar
  4. 4.
    Jana B, Giri D, Mondal SK (2017) Partial reversible data hiding scheme using (7, 4) hamming code. Multimed Tools Appl 6:21691–21706CrossRefGoogle Scholar
  5. 5.
    Kim KS, Lee MJ, Lee HY, Lee HK (2009) Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recogn 42:3083–3096CrossRefGoogle Scholar
  6. 6.
    Kim C, Yang CN (2016) Data hiding based on overlapped pixels using Hamming code. Multimed Tools Appl 75:15651–15663CrossRefGoogle Scholar
  7. 7.
    Kuo WC, Jiang DJ, Huang YC (2007) Reversible data hiding based on histogram. In: International conference on intelligent computing, lecture notes in artificial intelligence, vol 4682, Springer, Qing Dao, China, pp 1152–1161Google Scholar
  8. 8.
    Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21–27CrossRefGoogle Scholar
  9. 9.
    Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8:553–562CrossRefGoogle Scholar
  10. 10.
    Mielikainen J (2006) LSB Matching revisited. IEEE Signal Process. Lett. 13:285–287CrossRefGoogle Scholar
  11. 11.
    Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16:354–362CrossRefGoogle Scholar
  12. 12.
    Rashid A, Salamat N, Prasath VBS (2018) An algorithm for data hiding in radiographic images and ePHI/R application. Technologies 6(1):1–12CrossRefGoogle Scholar
  13. 13.
    Stanley CA (2017) Pairs of values and the chi-squared attack. https://orion.math.iastate.edu/dept/thesisarchive/MSCC/CStanleyMSSS05.pdf. Accessed 28 Jan 2019
  14. 14.
    Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circuits Syst Video Technol 19:906–910CrossRefGoogle Scholar
  15. 15.
    Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13:890–896CrossRefGoogle Scholar
  16. 16.
    Tsai P, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129–1143CrossRefGoogle Scholar
  17. 17.
    Varsaki E, Fotopoulos V, Skodras AN (2006) A reversible data hiding technique embedding in the image histogram, Technical Report HOU-CS-TR-2006-08-GR, Hellenic Open UniversityGoogle Scholar
  18. 18.
    Wang W, Ye J, Wang T, Wang W (2017) Reversible data hiding scheme based on significant-bit-difference expansion. IET Image Process 11:1002–1014CrossRefGoogle Scholar
  19. 19.
    Westfeld A (2001) F5 - a Steganographic algorithm: high capacity despite better steganalysis. In: Proceedings of the 4th International Workshop on Information Hiding, pp 289–302Google Scholar
  20. 20.
    Wu X, Sun W (2014) High-capacity reversible data hiding in encrypted images by prediction error. Sig Process 104:387–400CrossRefGoogle Scholar
  21. 21.
    Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75 (4):1947–1962CrossRefGoogle Scholar
  22. 22.
    Yang CN, Hsu SC, Kim C (2017) Improving stego image quality in image interpolation based data hiding. Comput Stand Inter 50:209–215CrossRefGoogle Scholar
  23. 23.
    Zhang X, Zhang W, Wang S (2007) Efficient double layered steganographic embedding. Electron Lett 43:482–483CrossRefGoogle Scholar
  24. 24.
    Zhang W, Wang S, Zhang X (2007) Improving embedding efficiency of covering codes for applications in steganography. IEEE Commun Lett 11:680–682CrossRefGoogle Scholar
  25. 25.
    Zhang R, Sachnev V, Bakke BM, Kim HJ, Heo J (2012) An efficient embedder for BCH coding for steganography. IEEE Trans Inf Theory 58:7272–7279MathSciNetCrossRefGoogle Scholar
  26. 26.
    Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7:826–832CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Ching-Nung Yang
    • 1
  • Song-Yu Wu
    • 1
  • Yung-Shun Chou
    • 1
  • Cheonshik Kim
    • 2
    Email author
  1. 1.Department of Computer Science and Information EngineeringNational Dong Hwa UniversityShoufengTaiwan
  2. 2.Department of Computer EngineeringSejong UniversitySeoulRepublic of Korea

Personalised recommendations