Abstract
Reversible data hiding (RDH) technique has been widely used for content authentication. However, most conventional RDH schemes generally concentrates on the rate-and-distortion performance (namely high capacity and low distortion), instead of their undetectability performance (namely security). In other words, the stego images with conventional RDH schemes could be easily detected by most steganalysis tools, e.g., SPAM, to reveal some suspicious secret data hidden in it, which increases the embedding risk. Therefore, their applications in some circumstances are restricted. In this paper, enhanced images generated by common image enhancement techniques are built as a desired carrier for RDH, to achieve both better rate-and-distortion and desired undetectability performance due to its special statistical histogram distribution, where many vacant interspaces are scattered in the histogram and suitable for histogram shifting based RDH process. In addition, considering that the enhanced images could provide much more candidate spaces for embedding, some strategies for security improvement, such as multi-feature sorting technique and so on, could be introduced. Experimental results verify the superiority of proposed scheme compared with other related algorithms.
Similar content being viewed by others
References
Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography, University of Buckingham
Abdulla AA, Jassim SA, Sellahewa H (2013) Secure Steganography Technique Based on Bitplane Indexes. 2013 IEEE International Symposium on Multimedia., pp. 287-291
Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. International Conference on Research in Security Standardisation., pp. 151-166
Asikuzzaman Md, Pickering MR (2018) An overview of digital video watermarking. IEEE Trans. Circuits Syst. Video Technol 28(9):2131–2153
Benesty J, Chen J, Huang Y (2009) Pearson correlation coefficient. Noise reduction in speech processing. Springer, Berlin, Heidelberg 2:1–4
Boggs PT, Tolle JW (1995) Sequential quadratic programming. Actanumerica. 4:1–51
Celik M, Sharma G, Tekalp A, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans. Image Process 14(2):253–266
Coltuc D (2011) Improved embedding for prediction-based reversible watermarking. IEEE Trans. Inf. Forensics Security. 6(3):873–882
Dong L, Zhou J, Sun W (2020) First Steps Toward Concealing the Traces Left by Reversible Image Data Hiding. IEEE Transactions on Circuits and Systems II: Express Briefs 67(5):951–955
Dragoi IC, Coltuc D (2020) On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction. IEEE Transactions on Information Forensics and Security 16:187–189
Fallahpour M (2008) Reversible image data hiding based on gradient adjusted prediction. IEICE Electron Exp 5(20):870–876
T. Filler, T. Pevny, and P. Bas. BOSS (Break Our Steganography System). Accessed: Dec. 20, 2013. [Online]. Available: http://www.agents.cz/boss
R. Fletcher (2013) Practical methods of optimization. John Wiley Sons
Fridrich J, Goljan M, Du R (2001) Invertible authentication, in: Proceedings of the SPIE Security and Watermarking of Multimedia Contents III. San Jose, CA., pp. 197-208
Fridrich J, Kodovsk J (2013) Multivariate Gaussian model for designing additive distortion for steganography. 2013 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE. 2649-2653
Fu J et al (2000) Wavelet-based histogram equalization enhancement of gastric sonogram images. Computerized medical imaging and graphics 24:59–68
Gao X, An L, Yuan Y, Tao D, Li X (2011) Lossless data embedding using generalized statistical quantity histogram. IEEE Trans. Circuits Syst. Video Technol. 21(8):1061–1070
He J, Chen J, Luo W, Tang S, Huang J (2019) A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted JPEG Bitstreams. IEEE Transactions on Circuits and Systems for Video Technology 29(12):3501–3515
Hong W, Chen TS, Chen J (2015) Reversible data hiding using Delaunay triangulation and selective embedment. Inf. Sci. 308:140–154
Hou D, Zhang W, Yang Y, Yu N (2018) Reversible Data Hiding Under Inconsistent Distortion Metrics. IEEE Trans. Image Process. 27(10):5087–5099
Khosravi MR (2021) ACI: a bar chart index for non-linear visualization of data embedding and aggregation capacity in IoMT multi-source compression. Wireless Networks. 1-9
Kodovský J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Security 7(2):432–444
Li X, Li B, Yang B, Zeng T (2013) General framework to histogram shifting-based reversible data hiding. IEEE Trans. Image Process. 22(6):2181–2191
Li T, Li H, Hu L, Li H (2020) A Reversible Steganography Method With Statistical Features Maintained Based on the Difference Value. IEEE Access 8:12845–12855
Lin W, Dong L, Xue P (2005) Visual distortion gauge based on discrimination of noticeable contrast changes. IEEE Trans. Circ. Syst. Video Technol. 15(7):900–909
Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2009) Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Security. 5(1):187–193
Myers L, Sirois JM (2004) Spearman correlation coefficients, differences between. Encyclopedia of statistical sciences
Ni Z, Shi Y, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3):354–362
Peng F, Li X, Yang B (2014) Improved PVO-based reversible data hiding. Digital Signal Process 25(2):255–265
Pevný T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Security 5(2):215–224
Qian Z, Xu H, Luo X, Zhang X (2019) New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams. IEEE Transactions on Circuits and Systems for Video Technology 29(2):351–362
Qin C, Chang C, Huang Y, Liao L (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7):1109–1118
Sachnev V, Kim H, Nam J, Suresh S, Shi Y (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7):989–999
Sedighi V, Cogranne R, Fridrich J (2015) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Security. 11(2):221–234
Shi Y, Li X, Zhang X, Wu HT, Ma B (2016) Reversible Data Hiding: Advances in the Past Two Decades. IEEE Access 4:3210–3237
Su Q, Niu Y, Wang G, Jia S, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94(1):219–235
Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans. Circuits Syst. Video Technol. 19(6):906–910
Tian J (2003) Reversible data hiding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol 13(8):890–896
Wang Z, Bovik AC, Sheikh HR (2004) Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing: a publication of the IEEE Signal Processing Society. 13(4):600–612
Wang J, Ni J, Zhang X, Shi Y (2017) Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans on Cybernetics 99(1):1–12
Wang J, Mao N, Chen X (2019) Multiple histograms based reversible data hiding by using FCM clustering. Signal Processing 159:193–203
Wang J, Chen X, Ni J (2019) Multiple histograms based reversible data hiding: Framework and realization. IEEE Transactions on Circuits and Systems for Video Technology 30(8):2313–2328
Wang J, Chen X, Shi Y (2019) Unconstraint optimal selection of side information for histogram shifting based reversible data hiding. IEEE Access 7:35564–35578
Wang Z, Zhang X, Qian Z (2019) Practical Cover Selection for Steganography. IEEE Signal Processing Letters 27:71–75
Wang W, Yuan X, Chen Z et al (2021) Weak-Light Image Enhancement Method Based on Adaptive Local Gamma Transform and Color Compensation. Journal of Sensors
Yadav AK, Naskar R (2015) A tamper localization approach for reversible watermarking based on histogram bin shifting. 2015 IEEE Power, Communication and Information Technology Conference (PCITC)., pp. 721-726
Zhang W, Hu X, Li X, Yu N (2013) Recursive histogram modification: Establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans. Image Process. 22(7):2775–2785
Zhang W, Hu X, Li X, Yu N (2014) Optimal transition probability of reversible data hiding for general distortion metrics and its applications. IEEE Trans. Image Process. 24(1):294–304
Zhang Z, Zhang W (2015) Reversible steganography: Data hiding for covert storage. in Proc. Asia-Pacific Signal Inf. Process. Assoc. Annu. Summit Conf. (APSIPA). 753-756
Acknowledgements
This work was supported by the National Natural Science Foundation of China under Grant (62062044, 61762054, 61672242, U1736215, U1936212, 61772573). In addition, many thanks to the anonymous reviewers for their insightful comments and valuable suggestions, which helped a lot to improve the paper quality.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing Interests
All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Wang, J., Zhang, Y., Huang, L. et al. Reversible data hiding in enhanced images with anti-detection capability. Multimed Tools Appl 83, 9853–9872 (2024). https://doi.org/10.1007/s11042-023-15663-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15663-9