Histogram Shifting as a Data Hiding Technique: An Overview of Recent Developments

  • Yasaman Zandi Mehran
  • Mona Nafari
  • Alireza Nafari
  • Nazanin Zandi Mehran
Part of the Communications in Computer and Information Science book series (CCIS, volume 166)


Histogram shifting is a data hiding technique which has been proposed since 2004. In this paper, we provide an overview of recent contributions pertaining to the Histogram shifting technique. It discusses on this method and its development in terms of payload capacity and image quality. From these discussions, we can state that which schemes are beneficial in terms of capacity-PSNR control. Overally, Histogram shifting is a valuable technique. Its practical applications are expected to grow in years to come.


Histogram shifting Pseudo code predictive coding histogram modification difference image block correlation sub-sampling 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Cheng, Q., Huang, T.S.: An Additive Approach to Transform-Domain Information Hiding and Optimum Detection Structure. IEEE Transactions on Multimedia 3(3), 273–284 (2001)CrossRefGoogle Scholar
  2. 2.
    Artz, D.: Digital Steganography: Hiding Data Within Data. IEEE Internet Computing 5(3), 75–80 (2001)CrossRefGoogle Scholar
  3. 3.
    Podilchuk, C.I., Delp, E.J.: Digital Watermarking: Algorithms and Applications. IEEE Signal Processing Magazine 18(4), 33–46 (2001)CrossRefGoogle Scholar
  4. 4.
    Wang, R.Z., Lin, C.F., Lin, J.C.: Image Hiding by Optimal LSB Substitution and Genetic Algorithm. Pattern Recognition 34(3), 671–683 (2001)CrossRefzbMATHGoogle Scholar
  5. 5.
    Jo, M., Kim, H.D.: A Digital Image Watermarking Scheme Based on Vvector Quantization. IEICE Transactions on Information and Systems 9(3), 1054–1105 (2002)Google Scholar
  6. 6.
    Chang, C.C., Tai, W.L., Lin, C.C.: A Reversible Data Hiding Scheme Based on Side-Match Vector Quantization. IEEE Transactions on Circuits and Systems for Video Technology 16(10), 1301–1308 (2006)CrossRefGoogle Scholar
  7. 7.
    Celik, M.U., Sharma, G., Tekalp, A.M.: Reversible Data Hiding. In: Proceedings of IEEE International Conference on Image Processing, Rochester, NY, vol. 158, pp. 157–160 (2002)Google Scholar
  8. 8.
    Tian, J.: Reversible Data Embedding Using a Difference Expansion. IEEE Transactions on Circuits and Systems for Video Technology 13(8), 890–899 (2003)CrossRefGoogle Scholar
  9. 9.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible Data Hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3), 354–361 (2006)CrossRefGoogle Scholar
  10. 10.
    Tai, C.L., Chiang, H.F., Fan, K.C., Chung, C.D.: Reversible Data Hiding and Lossless Reconstruction of Binary Images Using Pair-Wise Logical Computation Mechanism. Pattern Recognition 38(11), 1993–2006 (2005)CrossRefGoogle Scholar
  11. 11.
    Fridrich, J., Goljan, M., Du, R.: Invertible Authentication. In: Proceedings of SPIE Security Watermarking Multimedia Contents, San Jose, CA, pp. 197–208 (January 2001)Google Scholar
  12. 12.
    Xuan, G., Zhu, J., Chen, J., Shi, Y.Q., Ni, Z., Su, W.: Distortionless Data Hiding Based on Integer Wavelet Transform. Electronics Letters 38(25), 1646–1648 (2002)CrossRefGoogle Scholar
  13. 13.
    Kamstra, L., Heijmans, H.J.A.M.: Reversible Data Embedding into Images Using Wavelet Techniques and Sorting. IEEE Transactions on Image Processing 4(12), 2082–2090 (2005)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Chang, C.-C., Wu, W.-C.: A Reversible Information Hiding Scheme Based on Vector Quantization. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 1101–1107. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  15. 15.
    Shi, Y.Q., Ni, Z., Zou, D., Liang, C., Xuan, G.: Lossless Data Hiding: Fundamentals, Algorithms and Applications. In: Proc. IEEE Int. Symp. Circuits Syst., Vancouver, BC, Canada, vol. II, pp. 33–36 (May 2004)Google Scholar
  16. 16.
    Ni, Z., Shi, Y.-Q., Ansari, N., Su, W.: Reversible Data Hiding. IEEE Transactions on Circuit and Systems for Video Technology 16(3) (March 2006)Google Scholar
  17. 17.
    Tsai, P., Hu, Y.-C., Yeh, H.-L.: Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting. Signal Processing 89, 1129–1143 (2009)CrossRefzbMATHGoogle Scholar
  18. 18.
    Lin, C.-C., Tai, W.-L., Chang, C.-C.: Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images. Pattern Recognition 41, 3582–3591 (2008)CrossRefzbMATHGoogle Scholar
  19. 19.
    Lin, C.-C., Hsueh, N.-L.: A Lossless Ddata Hiding Scheme Based on Three-Pixel Block Differences. Pattern Recognition 41, 1415–1425 (2008)CrossRefzbMATHGoogle Scholar
  20. 20.
    Kim, K.-S., Lee, M.-J., Lee, H.-Y., Leea, H.-K.: Reversible Data Hiding Exploiting Spatial Correlation Between Sub-sampled Images. Pattern Recognition 42, 3083–3096 (2009)CrossRefzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Yasaman Zandi Mehran
    • 1
  • Mona Nafari
    • 2
  • Alireza Nafari
    • 3
  • Nazanin Zandi Mehran
    • 4
  1. 1.Islamic Azad UniversityTehranIran
  2. 2.Department of Electrical EngineeringRazi University of KermanshahKermanshahIran
  3. 3.Department of Electrical and Mechanical EngineeringAmir Kabir University of TechnologyTehranIran
  4. 4.Department of Biomedical EngineeringAmir Kabir University of TechnologyTehranIran

Personalised recommendations