Reversible Shared Data Hiding Based on Modified Signed Digit EMD
The reversible data hiding schemes not only extract the embedded secret data from the stego-image but also recover the original cover image. This can be extended for use with multiple parties where the embedded secret data is undecipherable unless all members contribute. Recently, Chang et al.  proposed a reversible data hiding scheme based on EMD (Exploiting Modification Direction) which can be used for this purpose. However, the capacity of EMD decreases quickly with the increased number of stego-images. To address this disadvantage, we will propose a reversible data hiding scheme based on modified signed digit EMD in this paper. According to our experiments, this scheme achieves the requirement of reversible shared data hiding and keeping good image quality but also maintains embedding capacity of least 1 bpp (bits per pixel).
KeywordsReversible data hiding EMD (Exploiting Modification Direction) Signed digit Embedding capacity
- 1.Abdulla, A.A., Jassimand, S.A., Sellahewa, H.: Efficient high-capacity steganography technique. In: Proceedings of SPIE8755, Mobile Multimedia/Image Processing, Security, and Applications (2013)Google Scholar
- 2.Chang, C.C., Huynh, N.T., Lin, C.C.: Strong tamper-localization, visual secret sharing scheme based on exploiting modification direction. In: 2012 Seventh Asia Joint Conference Information Security (Asia JCIS), pp. 10–16, August 2012Google Scholar
- 4.Kuo, W.C., Wuu, L.C., Shyi, C.N., Kuo, S.H.: A data hiding scheme with high embedding capacity based on general improving exploiting modification direction method. In: The Ninth International Conference on Hybrid Intelligent Systems (HIS2009), pp. 69–73, August 2009Google Scholar
- 6.Kuo, W.C., Hou, H.C., Chuang, C.T.: Data hiding scheme based on binary coefficient EMD. In: NCS 2013, 13–14 December 2013Google Scholar
- 7.Lee, F.C., Wang, Y.R., Chang, C.C.: A steganographic method with high embedding capacity by improving exploiting modification direction. In: Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), pp. 497–500 (2007)Google Scholar