Advertisement

Multimedia Tools and Applications

, Volume 77, Issue 7, pp 7795–7810 | Cite as

A survey of interpolation-based reversible data hiding methods

  • Ki-Hyun Jung
Article

Abstract

It is called as a reversible data hiding method when the cover object can be restored together with extracting the secret data at a receiver. In reversible data hiding, interpolation-based data hiding methods are recently proposed, where image interpolation techniques are used before embedding the secret data. In this paper, reversible data hiding methods using interpolation techniques are described and analyzed on the embedding capacity and the visual image quality that many researchers have tried to improve these different measurements. It is concluded with the directions of research with some recommendations.

Keywords

Steganography Information hiding Reversible data hiding Interpolation Data hiding 

Notes

Acknowledgements

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education (No. 2015R1D1A1A01058019).

References

  1. 1.
    Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156MathSciNetCrossRefGoogle Scholar
  2. 2.
    Al-Oershi OM, Khoo BE (2013) Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold. Signal Process 93:154–162CrossRefGoogle Scholar
  3. 3.
    Chang KC, Huang PS, Tu TM, Chang CP (2007) Image steganographic scheme using try-way pixel-value differencing and adaptive rules. Intelligent Information Hiding and Multimedia Signal Processing:449–452Google Scholar
  4. 4.
    Chang YT, Huang CT, Lee CF, Wang SJ (2013) Image interpolating based data hiding in conjunction with pixel-shifting of histogram. J Supercomput 66(2):1093–1110CrossRefGoogle Scholar
  5. 5.
    Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752CrossRefzbMATHGoogle Scholar
  6. 6.
    Giannoula A, Boulgouris NV, Hatzinakos D, Plataniotis KN (2006) Watermark detection for noisy interpolated images. IEEE Trans Circuits Syst Express Briefs 53(5):359–363CrossRefGoogle Scholar
  7. 7.
    Hong W, Chen TS (2011) Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism. J Vis Commun Image Represent 22:131–140CrossRefGoogle Scholar
  8. 8.
    Hsiao JY, Chan KF, Chang JM (2009) Block-based reversible data embedding. Signal Process 89:556–569CrossRefzbMATHGoogle Scholar
  9. 9.
    Hu J, Li T (2015) Reversible steganography using extended image interpolation technique. Comput Electr Eng 46:447–455CrossRefGoogle Scholar
  10. 10.
    Huang HC, Chang FC (2013) Hierarchy-based reversible data hiding. Expert Syst Appl 40(1):34–43CrossRefGoogle Scholar
  11. 11.
    Huang LC, Tseng LC, Hwang MS (2013) A reversible data hiding method by histogram shifting in high quality medical images. J Syst Softw 86:716–727CrossRefGoogle Scholar
  12. 12.
    Huang LC, Tseng LY, Hwang MS (2013) A reversible data hiding method by histogram shifting in high quality medical images. J Syst Softw 86:716–727CrossRefGoogle Scholar
  13. 13.
    Jana B (2016) High payload reversible data data hiding scheme using weighted matrix. Optik 127:3347–3358CrossRefGoogle Scholar
  14. 14.
    Jung KH, Yoo KY (2009) Data hiding method using image interpolation. Comput Stand Inter 31(2):465–470CrossRefGoogle Scholar
  15. 15.
    Jung KH, Yoo KY (2014) Data hiding using edge detector for scalable images. Multimed Tools Appl 71:1455–1468CrossRefGoogle Scholar
  16. 16.
    Jung KH, Yoo KY (2015) Steganographic method based on interpolation and LSB substitution of digital images. Multimed Tools Appl 74(6):2143–2155CrossRefGoogle Scholar
  17. 17.
    Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Inf Sci 279:251–272CrossRefGoogle Scholar
  18. 18.
    Kumar M, Agrawal S (2016) Reversible data hiding based on prediction error expansion using adjacent pixels. Secur Commun Netw 9(16):3703–3712CrossRefGoogle Scholar
  19. 19.
    Lee CF, Chen HC (2012) Adjustable prediction-based reversible data hiding. Digital Signal Process 22(6):941–953MathSciNetCrossRefGoogle Scholar
  20. 20.
    Lee CF, Huang YL (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl 39(8):6712–6719CrossRefGoogle Scholar
  21. 21.
    Lee CF, Huang YL (2013) Reversible data hiding scheme based on dual stego-images using orientation combinations. Telecommun Syst 52(4):2237–2247CrossRefGoogle Scholar
  22. 22.
    Lee YP, Lee JC, Chen WK, Chang KC, Su IJ, Chang CP (2012) High-payload image hiding with quality recovery using tri-way pixel-value differencing. Inf Sci 191:214–225CrossRefGoogle Scholar
  23. 23.
    Li X, Yang B, Zeng T (2011) Efficient reversible data watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20(12):3524–3533MathSciNetCrossRefzbMATHGoogle Scholar
  24. 24.
    Liao X, Wen QY, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J Vis Commun Image Represent 22(1):1–8CrossRefGoogle Scholar
  25. 25.
    Liu L, Chen T, Zhu S, Hong W, Si X (2016) A reversible data hiding method using improved neighbor mean interpolation and randon-block division. Inf Technol J 13:2374–2384Google Scholar
  26. 26.
    Lu TC (2017) An interpolation-based lossless hiding scheme based on message recoding mechanism. Optik 130:1377–1396CrossRefGoogle Scholar
  27. 27.
    Lu TC, Chang CC, Huang YH (2014) High capacity reversible hiding scheme based on interpolation, difference expansion and histogram methods. Multimed Tools Appl 72:417–435CrossRefGoogle Scholar
  28. 28.
    Lu TC, Tseng CY, Wu JH (2015) Dual imaging-based reversible hiding technique using LSB matching. Signal Process 108:77–89CrossRefGoogle Scholar
  29. 29.
    Lu TC, Wu JH, Huang CC (2015) Dual-image-based reversible data hiding method using center folding strategy. Signal Process 115:195–213CrossRefGoogle Scholar
  30. 30.
    Lu TC, Lin MC, Huang CC, Deng KM (2016) Reversible data hiding based on image interpolation with a secret message reduction strategy. International Journal of Computer & Software Engineering 1:102–112CrossRefGoogle Scholar
  31. 31.
    Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187–193CrossRefGoogle Scholar
  32. 32.
    Luo H, Yu FX, Chen H, Huang ZL, Li H, Wang PH (2011) Reversible data hiding based on block median preservation. Inf Sci 181:308–328CrossRefGoogle Scholar
  33. 33.
    Malik A, Sikka G, Verma HK (2016) An image interpolation based reversible data hiding scheme using pixel value adjusting feature. Multimedia Tools and Applications. OnlineGoogle Scholar
  34. 34.
    Marin J, Shih FY (2014) Reversible data hiding techniques using multiple scanning difference value histogram modification. Journal of Information hiding and multimedia signal processing 5(3):451–460Google Scholar
  35. 35.
    Nissar A, Mir AH (2010) Classification of steganalysis techniques: a study. Digital Signal Process 20:1758–1770CrossRefGoogle Scholar
  36. 36.
    Sabeen GPV, Sajila MK, Bindiya MV (2016) A two stage data hiding scheme with high capacity based on interpolation and difference expansion. Procedia Technol 24:1311–1316CrossRefGoogle Scholar
  37. 37.
    Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13(14):95–113CrossRefzbMATHGoogle Scholar
  38. 38.
    Tang M, Hu J, Song W, Zeng S (2015) Reversible and adaptive image steganographic method. AEU-Int J Electron C 69(12):1745–1754CrossRefGoogle Scholar
  39. 39.
    Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896CrossRefGoogle Scholar
  40. 40.
    Tsai YY, Chen JT, Kuo YC, Chan CS (2014) A generalized image interpolation-based reversible data hiding scheme with high embedding capacity and image quality. KSII Trans Internet Inf Syst 8(9):3286–3301Google Scholar
  41. 41.
    Tsai YY, Huang YH, Lin RJ, Chan CS (2016) An adjustable interpolation-based data hiding algorithm based on LSB substitution and histogram shifting. International Journal of Digital Crime and Forensics 8(2):48–61CrossRefGoogle Scholar
  42. 42.
    Wang CM, Wu NI, Tsai CS, Hwang MS (2008) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Softw 81:150–158CrossRefGoogle Scholar
  43. 43.
    Wang XT, Chang CC, Nguyen TS, Li MC (2013) Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digital Signal Process 23:569–577MathSciNetCrossRefGoogle Scholar
  44. 44.
    Weng SW, Pan JS (2014) Reversible watermarking based on eight improved prediction modes. Journal of Information Hiding and Multimedia Signal Processing 5(3):527–53316Google Scholar
  45. 45.
    Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24:1613–1626CrossRefzbMATHGoogle Scholar
  46. 46.
    Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Processing Visualization, Image Signal Process 152:611–615CrossRefGoogle Scholar
  47. 47.
    Yang CN, Hsu SC, Kim C (2017) Improving stego image quality in image interpolation based data hiding. Comput Stand Inter 50:209–215CrossRefGoogle Scholar
  48. 48.
    Zhang L, Wu X (2006) An edge-guided image interpolation algorithm via directional filtering and data fusion. IEEE Trans Image Process 15(8):2226–2238CrossRefGoogle Scholar
  49. 49.
    Zhao Z, Luo H, Lu ZM, Pan JS (2011) Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU-Int J Electron Commun 65(10):814–826CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.Department of Cyber SecurityKyungil UniversityGyeongsan-siRepublic of Korea

Personalised recommendations