Advertisement

Journal of Real-Time Image Processing

, Volume 14, Issue 1, pp 137–145 | Cite as

Reversible data hiding scheme with edge-direction predictor and modulo operation

  • Dae-Soo Kim
  • Eun-Jun Yoon
  • Cheonshik Kim
  • Kee-Young YooEmail author
Special Issue Paper

Abstract

Since the first histogram shifting technique was proposed by Ni et al., many histogram based data hiding methods were proposed to improve their scheme. One of the methods is using difference value between cover image and prediction image. Another method is using two point pairs and absolute value for improving Ni et al.’s scheme. In this paper, novel reversible data hiding scheme with edge-direction predictor and modulo operation was proposed for improving histogram shifting technique with 3 cases. We considered as much as possible around pixels by using edge-direction predictor with odd and even line embedding Also, we utilize two point pairs and absolute value at the same time by using modulo operation with wrap around. In the experimental results, the proposed scheme shown a good quality image result about 48dB as similar as other schemes and enhanced hiding capacity over 50 % than other schemes.

Keywords

Steganography Reversible data hiding Histogram shifting Modulo operation Edge-direction predictor 

Notes

Acknowledgments

This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) [No. 10041145, Self-Organized Software platform (SoSp) for Welfare Devices] and by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (NRF-2015R1A2A2A01006824).

References

  1. 1.
    Johnson, N.F., Duric, Z., Vanstone, S.J.A.: Information Hiding: Steganography and Watermarking—Attacks and Countermeasures. Kluwer Academic Publishers (2001)Google Scholar
  2. 2.
    Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding-a survey. Proc. IEEE (special issue on protection of multimedia content) 87(7), 1062–1078 (1999)Google Scholar
  3. 3.
    Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless Recovery of an Origianl Image Containing Embedded Data. U.S. Patent application 6278791(B1) (2001)Google Scholar
  4. 4.
    Ni, Z., Shi, Y.U.N.Q., Ansari, N., Su, W.E.I.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)CrossRefGoogle Scholar
  5. 5.
    Tai, W.L., Yeh, C.M., Chang, C.C.: Reversible data hiding based on histogram modification of pixel differences. IEEE Trans. Circuits Syst. Video Technol. 19(6), 906–910 (2009)CrossRefGoogle Scholar
  6. 6.
    Hong, W.: Adaptive reversible data hiding method based on error energy control and histogram shifting. Optics Commun. 285(2), 101–108 (2012)CrossRefGoogle Scholar
  7. 7.
    Li, Y.C., Yeh, C.M., Chang, C.C.: Data hiding based on the similarity between neighboring pixels with reversibility. Digital Signal Process. 20(4), 1116–1128 (2010)Google Scholar
  8. 8.
    Tsai, Y.Y., Tsai, D.S., Liu, C.L.: Reversible data hiding scheme based on neighboring pixel differences. Digital Signal Process. 23(3), 919–927 (2016)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Kim, D.S., Lee, G.J., Yoo, K.Y.: A reversible data hiding scheme based on histogram shifting using edge direction predictor. RACS 2014, 126–131 (2014)Google Scholar
  10. 10.
    Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2 edn (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2016

Authors and Affiliations

  • Dae-Soo Kim
    • 1
  • Eun-Jun Yoon
    • 2
  • Cheonshik Kim
    • 3
  • Kee-Young Yoo
    • 1
    Email author
  1. 1.School of Computer Science and EngineeringCollege of IT Engineering, Kyungpook National UniversityDaeguSouth Korea
  2. 2.Department of Cyber SecurityKyungil UniversityGyenggsan-SiSouth Korea
  3. 3.Department of Digital Media EngineeringAnyang UniversityAnyang-shiSouth Korea

Personalised recommendations