Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme
- 20 Downloads
Recently, Jana et al. proposed the partial reversible data hiding (PRDH) based on (7, 4) Hamming code, which deals with three images: the original image (OI), the cover image (CI), and the stego image (SI). The CI is obtained by slightly modifying OI. After that, one can embed secret into CI to generate SI. The so-called partial reversible feature is that we can reconstruct the CI faultlessly, which is almost the same to the OI. However, in Jana et al.’s PRDH, the authors only adjust redundant bits by using (7, 4) Hamming code with even (or odd) parity. This simple approach may modify 3 redundant bits at most in 7 least significant bit (LSBs) to obtain CI from OI, and this degrades the CI quality seriously. In this paper, we construct two schemes: the proposed PRDH (PPRDH) and the modified PRDH (MPRDH). PPRDH enhances the partial reversible property that improves the visual quality of CI. And, MPRDH enhances PPRDH to achieve the high embedding capacity. Theoretical estimations of average mean square errors for these PRDH schemes are given to demonstrate the advantage of our PRDH schemes. In addition, we also point out two inaccurate descriptions in Jana et al.’s PRDH about position of embedded secret to more simplify the procedure of embedding secret.
KeywordsData hiding Partial reversible data hiding Hamming code Error correcting Syndrome LSB
This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by (2015R1D1A1A01059253), and was supported under the framework of international cooperation program managed by NRF (2016K2A9A2A05005255). Also, it was supported in part by Ministry of Science and Technology (MOST), under 105-2221-E-259-015-MY2.
- 1.Crandall R (1998) Some notes on steganography. http://dde.binghamton.edu/download/Crandall/matrix.pdf, December, 1998
- 2.Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in grayscale and color images. In: Proceedings of the ACM workshop on multimedia and security, Ottawa, Canada, October 5, pp 27–30Google Scholar
- 3.Hwang J, Kim JW, Choi JU (2006) A reversible watermarking based on histogram shifting. In: International workshop on digital watermarking, lecture notes in computer science, vol 4283, Springer, Jeju Island, Korea, pp 348–361Google Scholar
- 7.Kuo WC, Jiang DJ, Huang YC (2007) Reversible data hiding based on histogram. In: International conference on intelligent computing, lecture notes in artificial intelligence, vol 4682, Springer, Qing Dao, China, pp 1152–1161Google Scholar
- 13.Stanley CA (2017) Pairs of values and the chi-squared attack. https://orion.math.iastate.edu/dept/thesisarchive/MSCC/CStanleyMSSS05.pdf. Accessed 28 Jan 2019
- 17.Varsaki E, Fotopoulos V, Skodras AN (2006) A reversible data hiding technique embedding in the image histogram, Technical Report HOU-CS-TR-2006-08-GR, Hellenic Open UniversityGoogle Scholar
- 19.Westfeld A (2001) F5 - a Steganographic algorithm: high capacity despite better steganalysis. In: Proceedings of the 4th International Workshop on Information Hiding, pp 289–302Google Scholar