Generalized Histogram Shifting-Based Blind Reversible Data Hiding with Balanced and Guarded Double Side Modification

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8389)


This paper proposes a method of reversible data hiding based on generalized histogram shifting where the proposed method is free from memorizing embedding parameters. A generalized histogram shifting-based reversible data hiding (GHS-RDH) method increases (or decreases) particular pixel values in the image by \((q - 1)\), based on the tonal distribution of the image, to hide \(q\)-ary data symbols to the image. The method not only extracts hidden data but also restores the original image from the distorted image carrying hidden data. Whereas conventional GHS-RDH should memorize a set of image-dependent parameters for hidden data extraction and original image recovery, the proposed method is free from parameter memorization and from embedding parameters in the image by introducing three mechanisms; guard zero histogram bins, double side modification, and histogram peak shifting. The proposed method does not need to identify the distorted image conveying hidden data among all possible images before the hidden data extraction, and it makes generalized HS-RDH feasible. In addition, the proposed method is naturally free from overflow/underflow problem. Experimental results show the effectiveness of the proposed method.


Digital watermarking Steganography Annotation 



This work has been partly supported by the Grant-in-Aid for Young Scientists (B), No. 20336522, from the Ministry of Education, Culture, Sports, Science and Technology of Japan and from the Japan Society for the Promotion of Science.


  1. 1.
    Wu, M., Liu, B.: Multimedia Data Hiding. Springer, New York (2003)CrossRefMATHGoogle Scholar
  2. 2.
    Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers, San Francisco (2008)Google Scholar
  3. 3.
    Fridrich, J.: Steganography in Digital Media. Cambridge University Press, Cambridge (2010)MATHGoogle Scholar
  4. 4.
    Langelaar, G.C., Setyawan, I., Lagendijk, R.L.: Watermarking digital image and video data. IEEE Signal Process. Mag. 17(5), 20–46 (2000)CrossRefGoogle Scholar
  5. 5.
    Barni, M.: What is the future for watermarking? (Part I). IEEE Signal Process. Mag. 20(5), 55–59 (2003)CrossRefGoogle Scholar
  6. 6.
    Kuo, C.-C.J., Kalker, T., Zhou, W. (eds.): Digital rights management. IEEE Signal Process. Mag. 21(2), 11–117 (2004)Google Scholar
  7. 7.
    Barni, M.: What is the future for watermarking? (Part II). IEEE Signal Process. Mag. 20(6), 53–59 (2003)CrossRefGoogle Scholar
  8. 8.
    Tachibana, T., Fujiyoshi, M., Kiya, H.: A removable watermarking scheme retaining the desired image quality. In: Proceedings of 2003 IEEE International Symposium on Intelligent Signal Processing and Communication Systems, pp. 538–542, December 2003Google Scholar
  9. 9.
    Fujiyoshi, M., Seki, Y., Kobayashi, H., Kiya, H.: Modulo arithmetic-based image watermarking and its theoretical analysis of image-quality. In: Proceedings of 2005 IEEE International Conference on Image Processing, pp. I-969–I-972, September 2005Google Scholar
  10. 10.
    Caldelli, R., Filippini, F., Becarelli, R.: Reversible watermarking techniques: an overview and a classification. EURASIP J. Inf. Secur. 2010(134546), 1–19 (2010)CrossRefGoogle Scholar
  11. 11.
    Fujiyoshi, M., Sato, S., Jin, H.L., Kiya, H.: A location-map free reversible data hiding method using block-based single parameter. In: Proceedings of 2007 IEEE International Conference on Image Processing, pp. III-257-III-260, September 2007Google Scholar
  12. 12.
    Zhou, J., Au, O.C.: Determining the capacity parameters in PEE-based reversible image watermarking. IEEE Signal Process. Lett. 19(5), 287–290 (2012)CrossRefGoogle Scholar
  13. 13.
    Li, J., Li, X., Yang, B.: A new PEE-based reversible watermarking algorithm for color image. In: Proceedings of 2012 IEEE International Conference on Image Processing, pp. 2181–2184, October 2012Google Scholar
  14. 14.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16(3), 354–362 (2006)CrossRefGoogle Scholar
  15. 15.
    Fallahpour, M., Megias, D., Ghanbari, M.: High capacity, reversible data hiding in medical images. In: Proceedings of 2009 IEEE International Conference on Image Processing, pp. 4241–4244, November 2009Google Scholar
  16. 16.
    Lin, C.C., Tai, W.L., Chang, C.C.: Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn. 41(12), 3582–3591 (2008)CrossRefMATHGoogle Scholar
  17. 17.
    Huang, H.C., Fang, W.C., Lai, W.H.: Secure medical information exchange with reversible data hiding. In: Proceedings of 2012 IEEE International Symposium on Circuits and Systems, pp. 1424–1427, May 2012Google Scholar
  18. 18.
    Fujiyoshi, M., Kiya, H.: Reversible data hiding for sparse histogram images. In: Proceedings of 2011 International Technical Conference on Circuits/Systems, Computers and Communications, pp. 510–513, June 2011Google Scholar
  19. 19.
    Arabzadeh, M., Helfroush, M.S., Danyali, H., Kasiri, K.: Reversible watermarking based on generalized histogram shifting. In: Proceedings of 2011 IEEE International Conference on Image Processing, pp. 2797–2800, September 2011Google Scholar
  20. 20.
    Fujiyoshi, M., Kiya, H.: Generalized histogram shifting-based reversible data hiding with an adaptive binary-to-\(q\)-ary converter. In: Proceedings of 2012 APSIPA Annual Sumit and Conference, December 2012Google Scholar
  21. 21.
    Han, S., Fujiyoshi, M., Kiya, H.: A reversible image authentication method without memorization of hiding parameters. IEICE Trans. Fundam. E92–A(10), 2572–2579 (2009)CrossRefGoogle Scholar
  22. 22.
    Hwang, J.H., Kim, J., Choi, J.: A reversible watermarking based on histogram shifting. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 348–361. Springer, Heidelberg (2006) CrossRefGoogle Scholar
  23. 23.
    Kuo, W.-C., Jiang, D.-J., Huang, Y.-C.: Reversible data hiding based on histogram. In: Huang, D.-S., Heutte, L., Loog, M. (eds.) ICIC 2007. LNCS (LNAI), vol. 4682, pp. 1152–1161. Springer, Heidelberg (2007) Google Scholar
  24. 24.
    Wang, X., Li, X., Yang, B., Guo, Z.: A reversible watermarking scheme for high-fidelity applications. In: Muneesawang, P., Wu, F., Kumazawa, I., Roeksabutr, A., Liao, M., Tang, X. (eds.) PCM 2009. LNCS, vol. 5879, pp. 613–624. Springer, Heidelberg (2009) CrossRefGoogle Scholar
  25. 25.
    Fujiyoshi, M., Tsuneyoshi, T., Kiya, H.: A reversible data hiding method free from location map and parameter memorization. In: Proceedings of 2010 IEEE International Symposium on Communications and Information Technologies, pp. 767–772, October 2010Google Scholar
  26. 26.
    Signal and Image Processing Institute: The USC-SIPI Image Database. University of Southern CaliforniaGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  1. 1.Department of Information and Communication SystemsTokyo Metropolitan UniversityHino-shi, TokyoJapan

Personalised recommendations