Reversible Shared Data Hiding Based on Modified Signed Digit EMD

  • Wen-Chung Kuo
  • Chun-Cheng Wang
  • Hong-Ching Hou
  • Chen-Tsun Chuang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9023)


The reversible data hiding schemes not only extract the embedded secret data from the stego-image but also recover the original cover image. This can be extended for use with multiple parties where the embedded secret data is undecipherable unless all members contribute. Recently, Chang et al. [2] proposed a reversible data hiding scheme based on EMD (Exploiting Modification Direction) which can be used for this purpose. However, the capacity of EMD decreases quickly with the increased number of stego-images. To address this disadvantage, we will propose a reversible data hiding scheme based on modified signed digit EMD in this paper. According to our experiments, this scheme achieves the requirement of reversible shared data hiding and keeping good image quality but also maintains embedding capacity of least 1 bpp (bits per pixel).


Reversible data hiding EMD (Exploiting Modification Direction) Signed digit Embedding capacity 


  1. 1.
    Abdulla, A.A., Jassimand, S.A., Sellahewa, H.: Efficient high-capacity steganography technique. In: Proceedings of SPIE8755, Mobile Multimedia/Image Processing, Security, and Applications (2013)Google Scholar
  2. 2.
    Chang, C.C., Huynh, N.T., Lin, C.C.: Strong tamper-localization, visual secret sharing scheme based on exploiting modification direction. In: 2012 Seventh Asia Joint Conference Information Security (Asia JCIS), pp. 10–16, August 2012Google Scholar
  3. 3.
    Jedwab, J., Mitchell, C.J.: Minimum weight modified signed-digit representation and fast exponentiation. Electron. Lett. 25(17), 1171–1173 (1989)CrossRefMATHGoogle Scholar
  4. 4.
    Kuo, W.C., Wuu, L.C., Shyi, C.N., Kuo, S.H.: A data hiding scheme with high embedding capacity based on general improving exploiting modification direction method. In: The Ninth International Conference on Hybrid Intelligent Systems (HIS2009), pp. 69–73, August 2009Google Scholar
  5. 5.
    Kuo, W.C., Wang, C.C.: Data hiding based on generalised exploiting modification direction method. J. Imaging Sci. 61(6), 484–490 (2013)CrossRefGoogle Scholar
  6. 6.
    Kuo, W.C., Hou, H.C., Chuang, C.T.: Data hiding scheme based on binary coefficient EMD. In: NCS 2013, 13–14 December 2013Google Scholar
  7. 7.
    Lee, F.C., Wang, Y.R., Chang, C.C.: A steganographic method with high embedding capacity by improving exploiting modification direction. In: Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), pp. 497–500 (2007)Google Scholar
  8. 8.
    Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 1–3 (2006)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Wen-Chung Kuo
    • 1
  • Chun-Cheng Wang
    • 2
  • Hong-Ching Hou
    • 3
  • Chen-Tsun Chuang
    • 3
  1. 1.Department of Computer Science and Information EngineeringNational Yunlin University of Science and TechnologyDouliuTaiwan, R.O.C.
  2. 2.Graduate School of Engineering Science and Technology Doctoral ProgramNational Yunlin University of Science and TechnologyDouliuTaiwan, R.O.C.
  3. 3.Department of Computer Science and Information EngineeringNational Formosa UniversityHuweiTaiwan, R.O.C.

Personalised recommendations