A Subsampling and Interpolation Technique for Reversible Histogram Shift Data Hiding

  • Yih-Chuan Lin
  • Tzung-Shian Li
  • Yao-Tang Chang
  • Chuen-Ching Wang
  • Wen-Tzu Chen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6134)


This paper proposes a novel reversible data hiding algorithm for images, which the original host image can be exactly recovered from the marked image after the hidden data has been extracted. The proposed algorithm considers shifting the histogram of the difference values between the subsampled target pixel intensities and their interpolated counterparts to hide secret data. The shifting of the histogram of difference values is carried out by modifying the target pixel values. As compared to other schemes, the proposed method can make more utilization of the correlation between nearby pixels in an image via simple interpolation techniques to increase embedding capacity without sacrificing much distortion for data hiding. The reason of the feasibility is that the difference histogram derived in the paper renders so highly centralized distribution around zero that much more embedding capacity than before can be thus obtained. The experimental results demonstrate that the proposed method not only provides larger embedding capacity than other histogram shifting methods but also maintains a high visual quality. Moreover the computational complexity of the proposed method is low since only simple arithmetic computations are needed.


Reversible Data Hiding Histogram Shifting Subsampling Interpolation 


  1. 1.
    Tain, J.: Reversible Data Embedding Using a Difference Expansion. IEEE transactions on circuits and systems for video technology 13(8) (2003)Google Scholar
  2. 2.
    Alattar, A.M.: Reversible watermarking using the difference expansion of a generalized integer transform. IEEE transactions on image processing 13(8) (2004)Google Scholar
  3. 3.
    Coltuc, D., Chassery, J.-M.: Very fast watermarking by reversible contrast mapping. IEEE Signal Processing Letters 14(4), 255–258 (2006)CrossRefGoogle Scholar
  4. 4.
    Lin, C.-C., Yang, S.-P., Hsueh, N.-L.: Lossless data hiding based on difference expansion without a location map. In: IEEE Congress on Image and Signal Processing (2008)Google Scholar
  5. 5.
    Ni, Z., Shi, Y.-Q., Ansari, N., Su, W.: Reversible Data Hiding. IEEE Transactions on Circuits and Systems Video Technology 16(3) (2006)Google Scholar
  6. 6.
    Hwang, J.H., Kim, J.W., Choi, J.U.: A reversible watermarking based on histogram shifting. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 348–361. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  7. 7.
    Kuo, W.-C., Jiang, D.-J., Huang, Y.-C.: A reversible data hiding based on block division. In: Congress on image and signal processing, vol. 1, pp. 365–369 (2008)Google Scholar
  8. 8.
    Kim, K.-S., Lee, M.-J., Suh, Y.-H.: Histogram-based reversible data hiding technique using subsampling. In: Proceeding of the 10th ACM workshop on multimedia and security (September 2008)Google Scholar
  9. 9.
    Chung, K.-L., Huang, Y.-H., Yang, W.-N., Hsu, Y.-C.: Capacity maximization for reversible data hiding based on dynamic programming approach. Applied mathematics and computation, 284–292 (2009)Google Scholar
  10. 10.
    Lin, Y.-C., Li, T.-S.: High capacity histogram shifting lossless data hiding. In: IPPR conference on Computer Vision, Graphics, and Image Processing (2009)Google Scholar
  11. 11.
    Kim, K.-S., Leeand, M.-J., Suh, Y.-H.: Reversible data exploiting spatial correlation between sub-sampled images. Pattern Recognition 42, 3083–3096 (2009)zbMATHCrossRefGoogle Scholar
  12. 12.
    Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless Generalized-LSB Data Embedding. IEEE transactions on image processing 14(2) (2005)Google Scholar
  13. 13.
    Ohyama, S., Niimi, M., Yamawaki, K., Noda, H.: Lossless data hiding using bit-depth embedding for JPEG2000 compressed bit stream. In: IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2008)Google Scholar
  14. 14.
    Fridrich, J., Goljan, J., Du, R.: Invertible authentication. In: Proceedings of the SPIE, Security and Watermarking of Multimedia Contents, vol. 4314, pp. 197–208 (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Yih-Chuan Lin
    • 1
  • Tzung-Shian Li
    • 1
  • Yao-Tang Chang
    • 2
  • Chuen-Ching Wang
    • 3
  • Wen-Tzu Chen
    • 4
  1. 1.Dept. of Computer Science and Information EngineeringNational Formosa UniversityYunlinTaiwan
  2. 2.Dept. of Electro-Optical Science and EngineeringKao Yuan UniversityTaiwan
  3. 3.Dept. of Electrical EngineeringNational Changhua Univeristy of EducationTaiwan
  4. 4.Institute of Telecommunications ManagementNational Cheng Kung UniversityTaiwan

Personalised recommendations