A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding

  • Junxiang Wang
  • Jiangqun Ni
  • Jinwei Pan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7128)

Abstract

In this paper, we present a new histogram shifting based multi-layer reversible data hiding scheme. By incorporating a flexible framework of two-step embedding (TSE), the proposed scheme can solve the problem of communicating and adoption of optimal pairs of peak and zero points and work in both pixel difference and predictive error domain for high performance reversible data hiding. A modified location map, which indicates only the actual overflow/underflow pixels, is constructed to facilitate the compression of location map. Compared with similar schemes, experimental results demonstrate the superior performance of the proposed scheme in the terms of embedding capacity and stego-image quality.

Keywords

Reversible data hiding Multi-layer embedding Two-step embedding Location map Histogram shifting Pixel difference 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Barton, J.M.: Method and Apparatus for Embedding Authentication Information within Digital Data. U.S. Patent 5646997 (1997)Google Scholar
  2. 2.
    Fridrich, J., Goljan, M., Du, R.: Invertible Authentication. In: Proc. SPIE Security and Watermarking of Multimedia Contents III, San Jose, CA, pp. 197–208 (2001)Google Scholar
  3. 3.
    Fridrich, J., Goljan, M., Du, R.: Lossless Data Embedding for All Image Formats. In: Proc:SPIE Security Watermarking Multimedia Contents IV, San Jose, CA, pp. 185–196 (2002)Google Scholar
  4. 4.
    Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless Generalized-LSB Data Embedding. IEEE Trans. Image Process 14(2), 253–266 (2005)CrossRefGoogle Scholar
  5. 5.
    Tian, J.: Reversible Watermarking Using A Difference Expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)CrossRefGoogle Scholar
  6. 6.
    Kamstra, L., Heijmans, A.M.: Reversible Data Embedding into Images Using Wavelet Techniques and Sorting. IEEE Trans. Image Process 14(12), 2082–2090 (2005)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Kim, H.J., Sachnev, V., Shi, Y.Q., Nam, J., Choo, H.G.: A Novel Difference Expansion Transform for Reversible Data Embedding. IEEE Trans. Inf. Forensic Security 3(3), 456–465 (2008)CrossRefGoogle Scholar
  8. 8.
    Hu, Y., Lee, H.K., Li, J.: DE-based Reversible Data Hiding with Improved Overflow Location Map. IEEE Trans. Circuits Syst. Video Technol. 19(2), 250–260 (2009)CrossRefGoogle Scholar
  9. 9.
    Lee, S., Yoo, C.D., Kalker, T.: Reversible Image Watermarking Based on Integer-To-Integer Wavelet Transform. IEEE Trans. Inf. Forensics Security 2(3), 321–330 (2007)CrossRefGoogle Scholar
  10. 10.
    Thodi, D.M., Rodriguez, J.J.: Expansion Embedding Techniques for Reversible Watermarking. IEEE Trans. Image Process 16(3), 721–730 (2007)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.Q.: Reversible Watermarking Algorithm Using Sorting and Prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7), 989–999 (2009)CrossRefGoogle Scholar
  12. 12.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible Data Hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)CrossRefGoogle Scholar
  13. 13.
    Hwang, J., Kim, J., Choi, J.: A Reversible Watermarking Based on Histogram Shifting. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 348–361. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  14. 14.
    Xuan, G., Yao, Q., Yang, C., Gao, J., Chai, P., Shi, Y.Q., Ni, Z.: Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 323–332. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  15. 15.
    Wu, X.: Reversible Semi-fragile Watermarking Based on Histogram Shifting of Integer Wavelet Coefficients. In: Proc. Digital Ecosystems and Technologies, Cairns, Australia, pp. 501–505 (2007)Google Scholar
  16. 16.
    Lin, C.C., Tai, W.L., Chang, C.C.: Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images. Pattern Recognition 41(12), 2582–3591 (2008)CrossRefGoogle Scholar
  17. 17.
    Tsai, P., Hu, Y.C., Yeh, H.L.: Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting. Signal Processing 89(6), 1129–1143 (2009)MATHCrossRefGoogle Scholar
  18. 18.
    Tai, W.L., Yeh, C.M., Chang, C.C.: Reversible Data Hiding Based on Histogram Modification of Pixel Differences. IEEE Trans. Circuits Syst. Video Technol. 19(6), 906–910 (2009)CrossRefGoogle Scholar
  19. 19.
    Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible Image Watermarking Using Interpolation Technique. IEEE Trans. Inf. Forensics Security 5(1), 187–193 (2010)CrossRefGoogle Scholar
  20. 20.
    Yang, B., Schmucker, M., Niu, X., Busch, C., Sun, S.: Approaching Optimal Value Expansion for Reversible Watermarking. In: Proceedings of ACM Multimedia and Security Workshop, New York, USA, pp. 95–101 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Junxiang Wang
    • 1
    • 2
  • Jiangqun Ni
    • 1
  • Jinwei Pan
    • 1
  1. 1.School of Information Science and TechnologySun Yat-Sen UniversityGuangzhouP.R. China
  2. 2.School of Mechanical & Electronic EngineeringJingdezhen Ceramic InstituteJingdezhenP.R. China

Personalised recommendations