Advertisement

Multimedia Tools and Applications

, Volume 77, Issue 6, pp 7071–7095 | Cite as

High performance reversible data hiding scheme through multilevel histogram modification in lifting integer wavelet transform

  • S. Subburam
  • S. Selvakumar
  • S. Geetha
Article

Abstract

This paper proposes a digital image reversible data hiding method in integer lifting transform domain. Owing to the characteristics of the natural image statistics, the neighbor pixel values are similar mostly and hence their differences are observed to be close or equal to zero. A histogram constructed out of this difference factor is exploited for reversible data embedding. Further, data is embedded at multiple levels in the integer lifting wavelet transform domain and hence the proposed scheme facilitates higher payload capacity and exceptional perceptual quality than the conventional single level histogram based techniques. The additional information involved for restoring the cover image and the secret payload is also less compared to the conventional schemes, as the proposed method employs a single parameter called “Embedding Level” for both hiding as well as extraction. Extensive experimentation with huge database of images, five existing RDH schemes and against seven steganalysers, shows that the proposed RDH scheme outperforms other schemes and proves to be a high performance RDH scheme in terms of all the desirable features of a reversible data hiding system like high payload, imperceptible, robustness, losslessness and minimal side information.

Keywords

Reversible data hiding Reversible histogram modification Lifting integer wavelet transform Authentication and security 

Notes

Acknowledgements

This paper is based upon work supported by the All India Council for Technical Education - Research Promotion Scheme under Grant No. 20/AICTE/RIFD/RPS(POLICY-II)65/2012-13.

References

  1. 1.
    Abdulrahman H, Chaumont M, Montesinos P, and Magnier B (2016) "Color image Steganalysis based on Steerable Gaussian filters bank," Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec ‘16, 109–114Google Scholar
  2. 2.
    Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156MathSciNetCrossRefGoogle Scholar
  3. 3.
    Awrangjeb M (2005) Reversible watermarking using a perceptual model. Journal of Electronic Imaging 14(1):013014CrossRefGoogle Scholar
  4. 4.
    Cohen A, Daubechies I, Feauveau J-C (1992) Biorthogonal bases of compactly supported wavelets. Communications of Pure Applied Mathematics 45(1):485–560MathSciNetCrossRefMATHGoogle Scholar
  5. 5.
    Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4):22–28CrossRefGoogle Scholar
  6. 6.
    Hsiao J-Y, Chan K-F, Morris Chang J (2009) Block-based reversible data embedding. Signal Process 89(4):556–569CrossRefMATHGoogle Scholar
  7. 7.
    Hu Y, Lee H-K, Li J (2009) DE-based reversible data hiding with improved overflow location map. IEEE Transactions on Circuits and Systems for Video Technology 19(2):250–260CrossRefGoogle Scholar
  8. 8.
    Images were obtained from: http://philip.greenspun.com/
  9. 9.
    Jung K-H, Yoo K-Y (2009) Data hiding method using image interpolation. Computer Standards & Interfaces 31(2):465–470CrossRefGoogle Scholar
  10. 10.
    Kim K-S, Lee M-J, Lee H-Y (2009) Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recogn 42(11):3083–3096CrossRefMATHGoogle Scholar
  11. 11.
    Lee S, Yoo CD, Kalker T (2007) Reversible image Watermarking based on integer-to-integer Wavelet transform. IEEE Transactions on Information Forensics and Security 2(3):321–330CrossRefGoogle Scholar
  12. 12.
    Li X, Zhang W, Gui X, Yang B (2015) Efficient reversible data hiding based on multiple histograms modification. IEEE Transactions on Information Forensics and Security 10(9):2016–2027CrossRefGoogle Scholar
  13. 13.
    Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21–27CrossRefGoogle Scholar
  14. 14.
    Lin C-C, Tai W-L, Chang C-C (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41(12):3582–3591CrossRefMATHGoogle Scholar
  15. 15.
    Liu Q, Chen Z (2014) Improved approaches with calibrated neighboring joint density to Steganalysis and seam-carved forgery detection in JPEG images. ACM Trans Intell Syst Technol 5(4):1–30Google Scholar
  16. 16.
    Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Transactions on Information Forensics and Security 5(1):187–193CrossRefGoogle Scholar
  17. 17.
    Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3):354–362CrossRefGoogle Scholar
  18. 18.
    Ni Z, Shi YQ, Ansari N, Su W, Sun Q, Lin X (2008) Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Transactions on Circuits and Systems for Video Technology 18(4):497–509CrossRefGoogle Scholar
  19. 19.
    NRCS Photo Gallery Home, http://photogallery.nrcs.usda/ .gov/
  20. 20.
    Pei Q, Wang X, Li Y, Li H (2013) Adaptive reversible watermarking with improved embedding capacity. J Syst Softw 86(11):2841–2848CrossRefGoogle Scholar
  21. 21.
    Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security 5(2):215–224CrossRefGoogle Scholar
  22. 22.
    Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164CrossRefGoogle Scholar
  23. 23.
    Qin C, Chang C-C, Huang Y-H, Liao L-T (2013) An Inpainting-assisted reversible Steganographic scheme using a histogram shifting mechanism. IEEE Transactions on Circuits and Systems for Video Technology 23(7):1109–1118CrossRefGoogle Scholar
  24. 24.
    Qin C, Chang C-C, Hsu T-J (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimedia Tools and Applications 74(15):5861–5872CrossRefGoogle Scholar
  25. 25.
    Qiu Y, Qian Z, Yu L (2016) Adaptive reversible data hiding by extending the generalized integer transformation. IEEE Signal Processing Letters 23(1):130–134CrossRefGoogle Scholar
  26. 26.
    Schaefer G, Stich M (2003) UCID: An uncompressed color image database. Proc SPIE Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia 5307:472–480Google Scholar
  27. 27.
    Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Transactions on Circuits and Systems for Video Technology 19(6):906–910CrossRefGoogle Scholar
  28. 28.
    Tang W, Li H, Luo W, Huang J (2015) Adaptive Steganalysis based on embedding probabilities of pixels. IEEE Transactions on Information Forensics and Security 11(4):734–745Google Scholar
  29. 29.
    Thodi DM, and Rodríguez JJ (2004) “Prediction-error based reversible watermarking”, Proceedings of International Conference on Image Processing (ICIP '04), vol. 3, 1549–1552Google Scholar
  30. 30.
    Tian J (2003) Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology 13(8):890–896CrossRefGoogle Scholar
  31. 31.
    Tsai P, Hu Y-C, Yeh H-L (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129–1143CrossRefMATHGoogle Scholar
  32. 32.
    Tseng H-W, Hsieh C-P (2009) Prediction-based reversible data hiding. Inf Sci 179(14):2460–2469CrossRefMATHGoogle Scholar
  33. 33.
    Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Processing Letters 9(3):81–84CrossRefGoogle Scholar
  34. 34.
    Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRefGoogle Scholar
  35. 35.
    Wang X, Pei Q, Li Y, Li H (2013) Adaptive reversible watermarking with improved embedding capacity. J Syst Softw 86(11):2841–2848CrossRefGoogle Scholar
  36. 36.
    Weng S, Zhao Y, Pan J-S, Ni R (2007) A novel high-capacity reversible water-marking scheme. In: IEEE International conference on multimedia and expo (ICME ‘07). IEEE, Beijing, pp 631–634CrossRefGoogle Scholar
  37. 37.
    Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Security and Communication Networks 7(8):1283–1291CrossRefGoogle Scholar
  38. 38.
    Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools and Applications 75(4):1947–1962CrossRefGoogle Scholar
  39. 39.
    Yang C-Y, Lin C-H (2012) High-quality and robust reversible data hiding by coefficient shifting algorithm. ETRI J 34(3):429–438MathSciNetCrossRefGoogle Scholar
  40. 40.
    Yang C, Tsai M (2010) Improving histogram-based reversible data hiding by interleaving predictions. IET Image Process 4(4):223CrossRefGoogle Scholar
  41. 41.
    Yang B, Schmucker M, Niu X, Busch C, and S. Sun (2004) “Reversible image watermarking by histogram modification for integer DCT coefficients”, Proceedings of the 6th Workshop on Multimedia Signal Processing (MMSP '04), 143–146Google Scholar
  42. 42.
    Zeng X-T, Ping L-D, Pan X-Z (2010) A lossless robust data hiding scheme. Pattern Recogn 43(4):1656–1667CrossRefMATHGoogle Scholar
  43. 43.
    Zhao Z, Luo H, Lu Z-M, Pan J-S (2011) Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU - International Journal of Electronics and Communications 65(10):814–826CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.Department of Computer Science and EnggPrince Shri Venkateshwara Padmavathy Engineering CollegeChennaiIndia
  2. 2.Department of Computer Science and EnggGKM College of EnggChennaiIndia
  3. 3.School of Computing Sciences and EngineeringVIT University – Chennai CampusChennaiIndia

Personalised recommendations