JPEG Reversible Data Hiding with Matrix Embedding

  • Fangjun HuangEmail author
  • Jiayong Li
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11903)


Joint photographic experts group (JPEG) image is the most popular image format used in our daily life. Different from the reversible data hiding (RDH) in spatial domain image, JPEG RDH needs to consider not only the visual quality, but also the file storage size of the marked image. In this paper, we firstly implement the matrix embedding (which is originated from steganography) strategy into the field of JPEG RDH. Via considering the philosophy behind the JPEG encoder, those quantized discrete cosine transform (DCT) coefficients that may introduce less distortion are adaptively selected for modification in the embedding process. Experimental results demonstrate that higher visual quality and less storage size of the marked JPEG image can be obtained compared with the state-of-the-art methods.


Reversible data hiding JPEG Distortion 



This work is partially supported by the National Natural Science Foundation of China (61772572), the NSFC-NRF Scientific Cooperation Program (61811540409), and the Natural Science Foundation of Guangdong Province of China (2017A030313366).


  1. 1.
    Barton, J.M.: Method and apparatus for embedding authentication information within digital data. U.S. Patent 5646997 (1997)Google Scholar
  2. 2.
    Fridrich, J., Goljan, M.: Lossless data embedding for all image formats. In: SPIE Proceedings of Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, vol. 4675, pp. 572–583 (2002)Google Scholar
  3. 3.
    Celik, M., Sharma, G., Tekalp, A., Saber, E.: Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 14(2), 253–266 (2005)CrossRefGoogle Scholar
  4. 4.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)CrossRefGoogle Scholar
  5. 5.
    Alattar, A.M.: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process. 13(8), 1147–1156 (2004)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Ni, Z., Shi, Y., Ansari, N., Wei, S.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)CrossRefGoogle Scholar
  7. 7.
    Li, X., Li, B., Yang, B., Zeng, T.: General framework to histogram-shifting-based reversible data hiding. IEEE Trans. Image Process. 22(6), 2181–2191 (2013)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Ou, B., Li, X., Zhao, Y., Ni, R., Shi, Y.-Q.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010–5021 (2013)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Li, X., Zhang, W., Gui, X., Yang, B.: Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 10(9), 2016–2027 (2015)CrossRefGoogle Scholar
  10. 10.
    Wang, J., Ni, J., Zhang, X., Shi, Y.-Q.: Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans. Cybern. 47(2), 315–326 (2017)Google Scholar
  11. 11.
    Zhang, X.: Reversible data hiding with optimal value transfer. IEEE Trans. Multimedia 15(2), 316–325 (2013)CrossRefGoogle Scholar
  12. 12.
    Hu, X., Zhang, W., Li, X., Yu, N.: Minimum rate prediction and optimized histograms modification for reversible data hiding. IEEE Trans. Inf. Forensics Secur. 10(3), 653–664 (2015)CrossRefGoogle Scholar
  13. 13.
    Zhang, W., Hu, X., Li, X., Yu, N.: Optimal transition probability of reversible data hiding for general distortion metrics and its applications. IEEE Trans. Image Process. 24(1), 294–304 (2015)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Wang, K., Lu, Z.-M., Hu, Y.-J.: A high capacity lossless data hiding scheme for JPEG images. J. Syst. Software 86, 1965–1975 (2013)CrossRefGoogle Scholar
  15. 15.
    Mobasseri, B.G., Berger, R.J., Marcinak, M.P., NaikRaikar, Y.J.: Data embedding in JPEG bitstream by code mapping. IEEE Trans. Image Process. 19(4), 958–966 (2010)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Qian, Z., Zhang, X.: Lossless data hiding in JPEG bitstream. J. Syst. Softw. 85, 309–313 (2012)CrossRefGoogle Scholar
  17. 17.
    Hu, Y., Wang, K., Lu, Z.-M.: An improved VLC-based lossless data hiding scheme for JPEG images. J. Syst. Softw. 86, 2166–2173 (2013)CrossRefGoogle Scholar
  18. 18.
    Huang, F., Qu, X., Kim, H.J., Huang, J.: Reversible data hiding in JPEG images. IEEE Trans. Circuits Syst. Video Technol. 26(9), 1610–1621 (2016)CrossRefGoogle Scholar
  19. 19.
    Wedaj, F.T., Kim, S., Kim, H.J., Huang, F.: Improved reversible data hiding in JPEG images based on new coefficient selection strategy. EURASIP J. Image Video Process. 63, 1–11 (2017)Google Scholar
  20. 20.
    Hou, D., Wang, H., Zhang, W., Yu, N.: Reversible data hiding in JPEG image based on DCT frequency and block selection. Signal Process. 148, 41–47 (2018)CrossRefGoogle Scholar
  21. 21.
    Fridrich, J., Soukal, D.: Matrix embedding for Large Payloads. IEEE Trans. Inf. Forensics Secur. 1(3), 390–395 (2006)CrossRefGoogle Scholar
  22. 22.
    Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using Syndrome-Trellis Codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2010)CrossRefGoogle Scholar
  23. 23.
    Wallace, G.K.: The JPEG still picture compression standard. IEEE Trans. Consumer Electron. 38(1), xviii–xxxiv (1992)CrossRefGoogle Scholar
  24. 24.
    Huang, F., Huang, J., Shi, Y.Q.: New channel selection rule for JPEG steganography. IEEE Trans. Inf. Forensics Secur. 7(4), 1181–1191 (2012)CrossRefGoogle Scholar
  25. 25.
    Huang, F., Kim, H.J.: Framework for improving the security performance of ordinary distortion functions of JPEG steganography. Multimedia Tools Appl. 75, 281–296 (2016)CrossRefGoogle Scholar
  26. 26.
    Fridrich, J., Goljan, M., Lisonek, P., Soukal, D.: Writing on wet paper. IEEE Trans. Inf. Forensics Secur. 53(10), 3923–3935 (2005)MathSciNetzbMATHGoogle Scholar
  27. 27.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Guangdong Provincial Key Laboratory of Information Security Technology, School of Data and Computer ScienceSun Yat-sen UniversityGuangzhouChina

Personalised recommendations