A Reversible Data Hiding Scheme for JPEG Images

  • Qiming Li
  • Yongdong Wu
  • Feng Bao
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6297)

Abstract

When JPEG images are used as cover objects for data hiding, many existing techniques require the images to be fully or partially decompressed before embedding. This makes practical application of these methods limited. In this paper, we investigate ways to hide data in the compressed domain directly and efficiently, such that both the original content and the embedded message can be recovered at the same time during decompression. We propose a method to embed bits into selected components of the compressed data such that it does not require decompression of the JPEG images and introduces very little change to the original JPEG files. The proposed method can be implemented efficiently and it is possible to perform embedding and detection in a single pass, so that JPEG streams can be processed in real-time without waiting for the end of the data.

Keywords

Reversible data hiding compressed domain embedding JPEG 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)Google Scholar
  2. 2.
    Fridrich, J., Goljan, M., Du, R.: Invertible authentication watermark for JPEG images. In: International Conference on Information Technology: Coding and Computing, pp. 223–227 (2001)Google Scholar
  3. 3.
    Fridrich, J., Goljan, M., Du, R.: Lossless data embedding new paradigm in digital watermarking. EURASIP Journal on Applied Signal Processing 2, 185–196 (2002)Google Scholar
  4. 4.
    Honsinger, C., Jones, P., Rabbani, M., Stoffel, J.: Lossless recovery of an original image containing embedded data. US Patent Application, Docket No: 77102/E-D (1999)Google Scholar
  5. 5.
    Johnson, N., Jajodia, S.: Steganalysis of images created using current steganography software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 273–289. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  6. 6.
    Luoa, W., Heilemana, G.L., Pizano, C.E.: Fast and robust watermarking of jpeg files. In: IEEE Symposium on Image Analysis and Inerpretation, pp. 158–162 (2002)Google Scholar
  7. 7.
    Macq, B.: Lossless multiresolution transform for image authenticating watermarking. In: European signal processing conference, pp. 1973–1976 (2000)Google Scholar
  8. 8.
    Mobasseri, B.G., Cinalli, D.: Lossless watermarking of compressed media using reversibly decodable packets. Signal Processing 86(5), 951–961 (2006)MATHCrossRefGoogle Scholar
  9. 9.
    Mobasseri, B.G., Berger II, R.J.: A foundation for watermarking in compressed domain. Signal Processing Letters 12(5), 399–402 (2005)CrossRefGoogle Scholar
  10. 10.
    Noguchi, Y., Kobayashi, H., Kiya, H.: A method of extracting embedded binary data from jpeg bitstreams using standard jpeg decoder. In: International Conference on Image Processing, pp. 577–580 (2000)Google Scholar
  11. 11.
    Pevny, T., Fridrich, J.: Detection of double-compression in jpeg images for applications in steganography. IEEE Transactions on Information Forensics and Security 3(2), 247–258 (2008)CrossRefGoogle Scholar
  12. 12.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology 13(8), 890–896 (2003)CrossRefGoogle Scholar
  13. 13.
    Tseng, H.W., Chang, C.C.: High capacity data hiding in jpeg-compressed images. Informatica 15(1), 127–142 (2004)MATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Qiming Li
    • 1
  • Yongdong Wu
    • 1
  • Feng Bao
    • 1
  1. 1.Institute for Infocomm Research, A*StarSingapore

Personalised recommendations