An Improved Reversible Data Hiding Scheme with Large Payload Based on Image Local-Complexity

  • Fang Cao
  • Yalei Zhang
  • Bowen An
  • Heng Yao
  • Zhenjun Tang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11066)


In this paper, a reversible data hiding scheme for digital images with high hiding capacity is proposed. Original image is segmented into smooth and rough regions based on local complexity. In order to achieve higher hiding capacity, we embed three bits into each pixel belonging to smooth region with lower local complexity and one bit is embedded into each pixel of rough region, which can effectively exploit more redundancy during data embedding compared with conventional methods of prediction error expansion (PEE). Additionally, the pixel selection mechanism is applied to reduce the number of shifted pixels, which leads to high visual quality of stego image. Experimental results show that, our scheme can achieve better rate-distortion performance than some of state-of-the-art schemes.


Reversible data hiding Prediction error expansion Hiding capacity Image quality 



This work was supported by the National Natural Science Foundation of China (61171126, 61272452, 61702332, U1636101, 61562007), Ministry of Transport and Applied Basic Research Projects (2014329810060), and Science & Technology Program of Shanghai Maritime University (20130479), Natural Science Foundation of Guangxi (2017GXNSFAA198222), and Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security (MIMS15-03).


  1. 1.
    Shi, Y.Q., Li, X., Zhang, X., Wu, H., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210–3237 (2016)CrossRefGoogle Scholar
  2. 2.
    Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 14(2), 253–266 (2005)CrossRefGoogle Scholar
  3. 3.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)CrossRefGoogle Scholar
  4. 4.
    Ni, Z.C., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)CrossRefGoogle Scholar
  5. 5.
    Qin, C., Chang, C.C., Huang, Y.H., Liao, L.T.: An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7), 1109–1118 (2013)CrossRefGoogle Scholar
  6. 6.
    Li, X., Li, B., Yang, B., Zeng, T.: General framework to histogram-shifting-based reversible data hiding. IEEE Trans. Image Process. 22(6), 2181–2191 (2013)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Li, X., Zhang, W., Gui, X., Yang, B.: Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 10(9), 2016–2027 (2015)CrossRefGoogle Scholar
  8. 8.
    Fallahpour, M.: Reversible image data hiding based on gradient adjusted prediction. IEICE Electron. Express 5(20), 870–876 (2008)CrossRefGoogle Scholar
  9. 9.
    Thodi, D.M., Rodriguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16(3), 721–730 (2007)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Li, X., Yang, B., Zeng, T.: Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans. Image Process. 20(12), 3524–3533 (2011)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Ou, B., Li, X., Zhao, Y., Ni, R., Shi, Y.Q.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010–5021 (2013)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Fang Cao
    • 1
  • Yalei Zhang
    • 2
  • Bowen An
    • 1
  • Heng Yao
    • 2
  • Zhenjun Tang
    • 3
  1. 1.College of Information EngineeringShanghai Maritime UniversityShanghaiChina
  2. 2.School of Optical-Electrical and Computer EngineeringUniversity of Shanghai for Science and TechnologyShanghaiChina
  3. 3.Guangxi Key Lab of Multi-Source Information Mining & SecurityGuangxi Normal UniversityGuilinChina

Personalised recommendations