Skip to main content
Log in

Pixel value splitting based reversible data embedding scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Reversible data hiding/embedding (RDH) is a well known technique in the field of image information security system. A novel RDH scheme is proposed in this article using place values of the grayscale image pixel’s intensity level. All pixels of the image is split into two halves based on their place values i.e., 100’s & 10’s combined and is referred as group-A set and remaining 1’s place value kept into group-B set. Based on the methodology we propose a Pixel Value Splitting based RDH scheme and may be abbreviated as PVS-RDH scheme. Smooth regions of the image generally have similar group-A values and is the desired region for PVS-RDH scheme. In the proposed scheme, data hiding is performed in the adjacent pairs whose group-A values are same. Further, to increase visual fidelity of the embedded image with respect to original image, corresponding group-B values are also modified by using positive or negative offsets accordingly to reduce the difference created by modification in corresponding group-A sets. Experimental results and performance metrics are analyzed with recent state of art methods which proven that the proposed scheme performs better.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Abdulla AA, Jassim SA, Sellahewa H (2013) Secure steganography technique based on bitplane indexes. IEEE Int Symp Multimed 2013:287–291. https://doi.org/10.1109/ISM.2013.55

    Google Scholar 

  2. Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. In: Chen L, Mitchell C (eds) Security Standardisation Research. SSR 2014. Lecture Notes in Computer Science, vol 8893. Springer, Cham. https://doi.org/10.1007/978-3-319-14054-4_10

  3. Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78:17799–17823. https://doi.org/10.1007/s11042-019-7166-7

    Article  Google Scholar 

  4. Ahmed F, Moskowitz IS (2006) A semi-reversible watermark for medical image authentication. In: 1st Transdisciplinary conference on distributed diagnosis and home healthcare. D2H2. IEEE

  5. Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13.8:1147–1156

    Article  MathSciNet  Google Scholar 

  6. Barni M, et al. (2002) Near-lossless digital watermarking for copyright protection of remote sensing images. In: IEEE International geoscience and remote sensing symposium. vol 3, IEEE

  7. Chang C-C, Lu T-C (2006) A difference expansion oriented data hiding scheme for restoring the original host images. J Syst Softw 79.12:1754–1766

    Article  Google Scholar 

  8. Cheddad A, et al. (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90.3:727–752

    Article  Google Scholar 

  9. Chen X, Sun X, Sun H, Zhou Z, Zhang J (2013) Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. J Syst Softw 86(10):2620–2626

    Article  Google Scholar 

  10. Cox I, Miller M, Bloom J, Fridrich j, Kalker T (2008) Digital Watermarking and Steganography. Morgan Kaufmann Publishers Inc

  11. Dataset1 Available[July-2020]: http://sipi.usc.edu/database/

  12. Dataset2 Available[sep-2021]: http://r0k.us/graphics/kodak

  13. Gujjunoori S, Amberker BB (2013) A dct based near reversible data embedding scheme for mpeg-4 video. In: Proceedings of the fourth international conference on signal and image processing 2012 (ICSIP. Springer, India, p 2012

  14. Gujjunoori S, Madhu O (2019) Difference expansion based reversible data embedding and edge detection. Multimed Tools Appl 78.18:25889–25917

    Article  Google Scholar 

  15. He W, et al. (2018) Reversible data hiding using multi-pass pixel-value-ordering and pairwise prediction-error expansion. Inf Sci 467:784–799

    Article  Google Scholar 

  16. Jung K. -H. (2017) A high-capacity reversible data hiding scheme based on sort- ing and prediction in digital images. Multimedia Tools Appl. 76 (11):13127–13137

    Article  Google Scholar 

  17. Kim HJ, Sachnev V, Shi YQ, Nam J, Choo H-G (2008) A novel difference expansion transform for reversible data embedding. IEEE Trans Inf Forensics Secur 3.3:456–465

    Google Scholar 

  18. Kim CR, et al. (2018) Blind decoding of image steganography using entropy model. Electron Lett 54.10:626–628

    Article  Google Scholar 

  19. Kumar R, Jung K-H (2020) Robust reversible data hiding scheme based on two-layer embedding strategy. Inf Sci 512:96–107

    Article  MathSciNet  Google Scholar 

  20. Lee C-F, Chen H-L, Tso H-K (2010) Embedding capacity raising in reversible data hiding based on prediction of difference expansion. J Syst Softw 83.10:1864–1872

    Article  Google Scholar 

  21. Li X, Li J, Li B, Yang B (2013) High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process 93(1):198–205

    Article  Google Scholar 

  22. Liu M, Seah HS, Zhu C, Lin W, Tian F (2012) Reducing location map in prediction-based difference expansion for reversible image data embedding. Signal Process 92.3:819–828

    Article  Google Scholar 

  23. Meenpal T (2018) DWT-Based blind and robust watermarking using SPIHT algorithm with applications in tele-medicine. Sādhāna 43.1:4

    MathSciNet  MATH  Google Scholar 

  24. Meenpal T, Bhattacharjee AK (2015) Watermark removal attack extended to forgery against correlation-based watermarking schemes. In: International conference on information systems security. Springer, Cham

  25. Meenpal T, Bhattacharjee AK. (2011) High capacity reversible data hiding using IWT. In: 2011 International symposium on electronic system design. IEEE

  26. Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16.3:354–362

    Google Scholar 

  27. Provos N, Honeyman P (2003) Hide and seek: An introduction to steganography. IEEE Secur Priv 1.3:32–44

    Article  Google Scholar 

  28. Rajkumar R, Vasuki A (2019) Reversible and robust image watermarking based on histogram shifting. Cluster Comput 22:12313–12323. https://doi.org/10.1007/s10586-017-1614-9

    Article  Google Scholar 

  29. Tang Y-L, Huang H-T (2007) Robust near-reversible data embedding using histogram projection. In: Third international conference on intelligent information hiding and multimedia signal processing (IIH-MSP 2007). vol 2. IEEE

  30. Thodi DM, Rodriguez JJ (2004) Prediction-error based reversible watermarking. Int Conf Image Process (ICIP’04) 3:1549–1552

    Google Scholar 

  31. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13.8:890–896

    Article  Google Scholar 

  32. Tsai PY, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129–1143

    Article  Google Scholar 

  33. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  34. Wang X, Li X, Yang B, Guo Z (2010) Efficient generalized integer transform for reversible watermarking. IEEE Signal Process Lett 17.6:567–570

    Article  Google Scholar 

  35. Weng S, Zhao Y, Pan J-S, Ni R (2008) Reversible data hiding using the companding technique and improved DE method. Circuits Syst Signal Process 27.2:229–245

    Article  MathSciNet  Google Scholar 

  36. Yang Q, Zhang Y, Yang C, Li W, Information entropy used in digital watermarking (2012)

  37. Yujie J, et al. (2019) Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Signal Process 163:238–246

    Article  Google Scholar 

  38. Zhang B, et al. (2010) A near reversible image watermarking algorithm. In: 2010 International conference on machine learning and cybernetics. vol. 6. IEEE

  39. Wang W, et al. (2017) Reversible data hiding scheme based on significant-bit-difference expansion. IET Image Process 11.11:1002–1014

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Madhu Oruganti.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Meenpal, A., Majumder, S. & Oruganti, M. Pixel value splitting based reversible data embedding scheme. Multimed Tools Appl 81, 40535–40560 (2022). https://doi.org/10.1007/s11042-022-13031-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13031-7

Keywords

Navigation