Skip to main content
Log in

Reversible data hiding in enhanced images with anti-detection capability

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Reversible data hiding (RDH) technique has been widely used for content authentication. However, most conventional RDH schemes generally concentrates on the rate-and-distortion performance (namely high capacity and low distortion), instead of their undetectability performance (namely security). In other words, the stego images with conventional RDH schemes could be easily detected by most steganalysis tools, e.g., SPAM, to reveal some suspicious secret data hidden in it, which increases the embedding risk. Therefore, their applications in some circumstances are restricted. In this paper, enhanced images generated by common image enhancement techniques are built as a desired carrier for RDH, to achieve both better rate-and-distortion and desired undetectability performance due to its special statistical histogram distribution, where many vacant interspaces are scattered in the histogram and suitable for histogram shifting based RDH process. In addition, considering that the enhanced images could provide much more candidate spaces for embedding, some strategies for security improvement, such as multi-feature sorting technique and so on, could be introduced. Experimental results verify the superiority of proposed scheme compared with other related algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography, University of Buckingham

  2. Abdulla AA, Jassim SA, Sellahewa H (2013) Secure Steganography Technique Based on Bitplane Indexes. 2013 IEEE International Symposium on Multimedia., pp. 287-291

  3. Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. International Conference on Research in Security Standardisation., pp. 151-166

  4. Asikuzzaman Md, Pickering MR (2018) An overview of digital video watermarking. IEEE Trans. Circuits Syst. Video Technol 28(9):2131–2153

    Article  Google Scholar 

  5. Benesty J, Chen J, Huang Y (2009) Pearson correlation coefficient. Noise reduction in speech processing. Springer, Berlin, Heidelberg 2:1–4

    Google Scholar 

  6. Boggs PT, Tolle JW (1995) Sequential quadratic programming. Actanumerica. 4:1–51

    Google Scholar 

  7. Celik M, Sharma G, Tekalp A, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans. Image Process 14(2):253–266

    Article  Google Scholar 

  8. Coltuc D (2011) Improved embedding for prediction-based reversible watermarking. IEEE Trans. Inf. Forensics Security. 6(3):873–882

    Article  Google Scholar 

  9. Dong L, Zhou J, Sun W (2020) First Steps Toward Concealing the Traces Left by Reversible Image Data Hiding. IEEE Transactions on Circuits and Systems II: Express Briefs 67(5):951–955

    Google Scholar 

  10. Dragoi IC, Coltuc D (2020) On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction. IEEE Transactions on Information Forensics and Security 16:187–189

    Article  Google Scholar 

  11. Fallahpour M (2008) Reversible image data hiding based on gradient adjusted prediction. IEICE Electron Exp 5(20):870–876

    Article  Google Scholar 

  12. T. Filler, T. Pevny, and P. Bas. BOSS (Break Our Steganography System). Accessed: Dec. 20, 2013. [Online]. Available: http://www.agents.cz/boss

  13. R. Fletcher (2013) Practical methods of optimization. John Wiley Sons

  14. Fridrich J, Goljan M, Du R (2001) Invertible authentication, in: Proceedings of the SPIE Security and Watermarking of Multimedia Contents III. San Jose, CA., pp. 197-208

  15. Fridrich J, Kodovsk J (2013) Multivariate Gaussian model for designing additive distortion for steganography. 2013 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE. 2649-2653

  16. Fu J et al (2000) Wavelet-based histogram equalization enhancement of gastric sonogram images. Computerized medical imaging and graphics 24:59–68

    Article  Google Scholar 

  17. Gao X, An L, Yuan Y, Tao D, Li X (2011) Lossless data embedding using generalized statistical quantity histogram. IEEE Trans. Circuits Syst. Video Technol. 21(8):1061–1070

    Article  Google Scholar 

  18. He J, Chen J, Luo W, Tang S, Huang J (2019) A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted JPEG Bitstreams. IEEE Transactions on Circuits and Systems for Video Technology 29(12):3501–3515

    Article  Google Scholar 

  19. Hong W, Chen TS, Chen J (2015) Reversible data hiding using Delaunay triangulation and selective embedment. Inf. Sci. 308:140–154

    Article  MathSciNet  Google Scholar 

  20. Hou D, Zhang W, Yang Y, Yu N (2018) Reversible Data Hiding Under Inconsistent Distortion Metrics. IEEE Trans. Image Process. 27(10):5087–5099

    Article  MathSciNet  Google Scholar 

  21. Khosravi MR (2021) ACI: a bar chart index for non-linear visualization of data embedding and aggregation capacity in IoMT multi-source compression. Wireless Networks. 1-9

  22. Kodovský J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Security 7(2):432–444

    Article  Google Scholar 

  23. Li X, Li B, Yang B, Zeng T (2013) General framework to histogram shifting-based reversible data hiding. IEEE Trans. Image Process. 22(6):2181–2191

    Article  MathSciNet  Google Scholar 

  24. Li T, Li H, Hu L, Li H (2020) A Reversible Steganography Method With Statistical Features Maintained Based on the Difference Value. IEEE Access 8:12845–12855

    Article  Google Scholar 

  25. Lin W, Dong L, Xue P (2005) Visual distortion gauge based on discrimination of noticeable contrast changes. IEEE Trans. Circ. Syst. Video Technol. 15(7):900–909

    Article  Google Scholar 

  26. Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2009) Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Security. 5(1):187–193

    Google Scholar 

  27. Myers L, Sirois JM (2004) Spearman correlation coefficients, differences between. Encyclopedia of statistical sciences

  28. Ni Z, Shi Y, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3):354–362

    Article  Google Scholar 

  29. Peng F, Li X, Yang B (2014) Improved PVO-based reversible data hiding. Digital Signal Process 25(2):255–265

    Article  Google Scholar 

  30. Pevný T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Security 5(2):215–224

    Article  Google Scholar 

  31. Qian Z, Xu H, Luo X, Zhang X (2019) New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams. IEEE Transactions on Circuits and Systems for Video Technology 29(2):351–362

    Article  Google Scholar 

  32. Qin C, Chang C, Huang Y, Liao L (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7):1109–1118

    Article  Google Scholar 

  33. Sachnev V, Kim H, Nam J, Suresh S, Shi Y (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7):989–999

    Article  Google Scholar 

  34. Sedighi V, Cogranne R, Fridrich J (2015) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Security. 11(2):221–234

    Article  Google Scholar 

  35. Shi Y, Li X, Zhang X, Wu HT, Ma B (2016) Reversible Data Hiding: Advances in the Past Two Decades. IEEE Access 4:3210–3237

    Article  Google Scholar 

  36. Su Q, Niu Y, Wang G, Jia S, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94(1):219–235

    Article  Google Scholar 

  37. Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans. Circuits Syst. Video Technol. 19(6):906–910

    Article  Google Scholar 

  38. Tian J (2003) Reversible data hiding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol 13(8):890–896

    Article  Google Scholar 

  39. Wang Z, Bovik AC, Sheikh HR (2004) Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing: a publication of the IEEE Signal Processing Society. 13(4):600–612

    Article  Google Scholar 

  40. Wang J, Ni J, Zhang X, Shi Y (2017) Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans on Cybernetics 99(1):1–12

    Google Scholar 

  41. Wang J, Mao N, Chen X (2019) Multiple histograms based reversible data hiding by using FCM clustering. Signal Processing 159:193–203

    Article  Google Scholar 

  42. Wang J, Chen X, Ni J (2019) Multiple histograms based reversible data hiding: Framework and realization. IEEE Transactions on Circuits and Systems for Video Technology 30(8):2313–2328

    Article  Google Scholar 

  43. Wang J, Chen X, Shi Y (2019) Unconstraint optimal selection of side information for histogram shifting based reversible data hiding. IEEE Access 7:35564–35578

    Article  Google Scholar 

  44. Wang Z, Zhang X, Qian Z (2019) Practical Cover Selection for Steganography. IEEE Signal Processing Letters 27:71–75

    Article  Google Scholar 

  45. Wang W, Yuan X, Chen Z et al (2021) Weak-Light Image Enhancement Method Based on Adaptive Local Gamma Transform and Color Compensation. Journal of Sensors

  46. Yadav AK, Naskar R (2015) A tamper localization approach for reversible watermarking based on histogram bin shifting. 2015 IEEE Power, Communication and Information Technology Conference (PCITC)., pp. 721-726

  47. Zhang W, Hu X, Li X, Yu N (2013) Recursive histogram modification: Establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans. Image Process. 22(7):2775–2785

    Article  Google Scholar 

  48. Zhang W, Hu X, Li X, Yu N (2014) Optimal transition probability of reversible data hiding for general distortion metrics and its applications. IEEE Trans. Image Process. 24(1):294–304

    Article  MathSciNet  Google Scholar 

  49. Zhang Z, Zhang W (2015) Reversible steganography: Data hiding for covert storage. in Proc. Asia-Pacific Signal Inf. Process. Assoc. Annu. Summit Conf. (APSIPA). 753-756

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China under Grant (62062044, 61762054, 61672242, U1736215, U1936212, 61772573). In addition, many thanks to the anonymous reviewers for their insightful comments and valuable suggestions, which helped a lot to improve the paper quality.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junxiang Wang.

Ethics declarations

Competing Interests

All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, J., Zhang, Y., Huang, L. et al. Reversible data hiding in enhanced images with anti-detection capability. Multimed Tools Appl 83, 9853–9872 (2024). https://doi.org/10.1007/s11042-023-15663-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15663-9

Keywords

Navigation