Advertisement

Peer-to-Peer Networking and Applications

, Volume 7, Issue 4, pp 723–736 | Cite as

Image reversibility in data embedding on the basis of blocking-predictions

  • Fu-Hau Hsu
  • Min-Hao Wu
  • Cheng-Hsing Yang
  • Shiuh-Jeng Wang
Article

Abstract

The popularity of peer-to-peer (P2P) multimedia file sharing applications such as voice, files, images, video, texts have created a flurry of recent research activity into P2P architectures. Reversible data hiding has drawn considerable attention in recent years. Being reversible, the decoder can extract the hidden data and recover the cover image completely. In this paper we used the block prediction to achieve histogram-based reversible data hiding. The histogram is created by exploiting all difference values between pixels and their predictive values. Experimental results show that our scheme is capable of providing great embedding capacity without making noticeable distortion. In the one-level data hiding, our scheme preserves image quality larger than 48 dB and has the best capacity. Moreover, in the multilevel cases, our scheme performs better than other existing schemes. Our scheme can successfully increase the embedding capacity from histogram-based data hiding and preserve image quality well.

Keywords

Predictions Blocking-predictions Histogram-based Reversibility Image quality 

Notes

Acknowledgments

This research was partially supported by the National Science Council of the Republic of China under the Grant NSC 99-2221-E-153-003-, Grant NSC 98-2221-E-015-001-MY3-, NSC 100-2221-E-015-001-MY2-, NSC 99-2918-I-015-001-, and NSC 101-2221-E-008-028-MY2-.

References

  1. 1.
    Alattar A (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13:1147–1156CrossRefMathSciNetGoogle Scholar
  2. 2.
    Chang CC, Lu TC (2006) Reversible index-domain information hiding scheme based on side-match vector quantization. J Syst Softw 79:1120–1129CrossRefGoogle Scholar
  3. 3.
    Chrysochos E, Fotopoulos V, Skodras AN, Xenos M (2007) Reversible image watermarking based on histogram modification, 11th Panhellenic Conference on Informatics with international participation, Patras, Greece, pp 93–104Google Scholar
  4. 4.
    Hsiao JY, Chan KF, Chang JM (2009) Block-based reversible data embedding. Signal Process 89:556–569CrossRefzbMATHGoogle Scholar
  5. 5.
    Kamstra L, Heijmans HJAM (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14:2082–2090CrossRefMathSciNetGoogle Scholar
  6. 6.
    Kim HJ, Sachnev V, Shi YQ, Nam J, Choo HG (2008) A novel difference expansion transform for reversible data embedding. IEEE Trans Inform Forensics Secur 3:456–465CrossRefGoogle Scholar
  7. 7.
    Li YC, Yeh CM, Chang CC (2010) Data hiding based on the similarity between neighboring pixels with reversibility. Digit Signal Process 20:1116–1128CrossRefGoogle Scholar
  8. 8.
    Lin CC, Hsueh NL (2008) A lossless data hiding scheme based on three-pixel block differences. Pattern Recogn 41:1415–1425CrossRefzbMATHGoogle Scholar
  9. 9.
    Lin CC, Tai WL, Chang CC (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41:3582–3591CrossRefzbMATHGoogle Scholar
  10. 10.
    Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16:354–362CrossRefGoogle Scholar
  11. 11.
    Thodi DM, Rodríguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16:721–730CrossRefMathSciNetGoogle Scholar
  12. 12.
    Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13:890–896CrossRefGoogle Scholar
  13. 13.
    Tsai P, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89:1129–1143CrossRefzbMATHGoogle Scholar
  14. 14.
    Tseng HW, Hsieh CP (2009) Prediction-based reversible data hiding. Inform Sci 179:2460–2469CrossRefzbMATHGoogle Scholar
  15. 15.
    Yang B, Lu ZM, Sun SH (2005) Reversible watermarking in the VQ-compressed domain. Proc. 5th IASTED Int. Conf. Visualization, Imaging, and Image Processing, Benidorm, Spain, pp 298–303Google Scholar
  16. 16.
    Zeng XT, Ping L, Li Z (2009) Lossless data hiding scheme using adjacent pixel difference based on scan path. J Multimed 4:145–152CrossRefGoogle Scholar
  17. 17.
    Celik MU, Sharma G, Tekalp AM (2006) Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans Image Process 15:1042–1049CrossRefGoogle Scholar
  18. 18.
    Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14:253–266CrossRefGoogle Scholar
  19. 19.
    Chang CC, Lin CC, Tseng CS (2007) Reversible hiding in DCT-based compressed images. Inform Sci 177:2768–2786CrossRefGoogle Scholar
  20. 20.
    Lee S, Yoo CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans Inf Forensics Secur 2:321–330CrossRefGoogle Scholar
  21. 21.
    Lu ZM, Wang JX, Liu BB (2009) An improved lossless data hiding scheme based on image VQ-index residual value coding. J Syst Softw 82:1016–1024CrossRefGoogle Scholar
  22. 22.
    Wang JX, Lu ZM (2009) A path optional lossless data hiding scheme based on VQ joint neighboring coding. Inform Sci 179:3332–3348CrossRefGoogle Scholar
  23. 23.
    Yang CH, Lin YC (2009) Reversible data hiding of a VQ index table based on referred counts. J Vis Commun Image Represent 20:399–407CrossRefMathSciNetGoogle Scholar
  24. 24.
    Yang CH, Tsai MH (2010) Improving histogram-based reversible data hiding by interleaving predictions. IET Image Process 4:223–234CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Fu-Hau Hsu
    • 1
  • Min-Hao Wu
    • 1
  • Cheng-Hsing Yang
    • 2
  • Shiuh-Jeng Wang
    • 3
  1. 1.Department of Computer Science and Information EngineeringNational Central UniversityTaoyuanTaiwan
  2. 2.Department of Computer ScienceNational Pingtung University of EducationPingtungTaiwan
  3. 3.Department of Information ManagementCentral Police UniversityTaoyuanTaiwan

Personalised recommendations