Adaptive real-time reversible data hiding for JPEG images
- 401 Downloads
Data hiding used to embed data, such as copyright information, into various forms of media such as image, audio, or text with a minimum amount of perceivable degradation to the “host” signal. Therefore, in many cases, the cover media contain distortions even after the hidden data have been extracted. Thus, to extend the application of data hiding to some sensitive domains such as military, medical, and fine arts, which require the embedded cover images to be properly covered, reversible data hiding has become another new branch of this field. Our proposed scheme is inspired by Chang et al.’s idea. In this paper, we propose adaptive real-time reversible data hiding for JPEG images using successive zero coefficients in zigzag sequences of discrete cosine transformation blocks. The contribution of our proposed scheme successfully enhances the hiding capacity while the image quality of stego image and reversibility are maintained. The result of experiments conducted indicates that the proposed scheme enhances data hiding capacity, image quality, and improves performance.
KeywordsReversible data hiding Steganography Discrete cosine transformation JPEG image
This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) by the Ministry of Education, Science and Technology (20120192).
- 15.Leng, L., Zhang, J., Khan, M.K., Chen, X., Alghathbar, K.: Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. Int. J. Phys. Sci. 5(17), 2543–2554 (2010)Google Scholar
- 16.Iwata, M., Miyake, K., Shiozaki, A.: Digital steganography utilizing features of JPEG images. IEICE Trans. Fundam. E87–A(4), 929936 (2004)Google Scholar
- 18.Al-Asmari, A.K., Salama, A., Iliyasu, A.M., Al-qodah, M.A.; A DWT ordering scheme for hiding data in images using pixel value difference. In: 2012 Eighth International Conference on Computational Intelligence and Security (CIS), pp. 553–557 (2012)Google Scholar
- 19.Fridrich, J., Goljan, M., Du, R.: Invertible authentication, In: Proceedings of the SPIE Security Watermarking Multimedia Contents, San Jose, CA, pp. 197–208 (2001)Google Scholar
- 22.Thodi, M., Rodrguez, J.J.: Reversible watermarking by prediction-error expansion. In: Proceedings of 6th IEEE Southwest Symposium on Image Analysis and Interpretation, Lake Tahoe, CA, USA, 28–30 March, pp. 21–25 (2004)Google Scholar
- 24.Shi, Y.Q.: Reversible data hiding. In: IWDW 2004: Third International. Workshop, vol. 3304, pp. 1–12 (2004)Google Scholar