Skip to main content

A New High Capacity and Reversible Data Hiding Technique for Images

  • Conference paper
  • First Online:
Information Systems Security (ICISS 2019)

Abstract

The growth in the internet has paved the way for an increase in digital communication. Cryptography and data hiding provide security of the data being communicated. In cryptography, the fact that the information is hidden is not concealed, whereas, in data hiding, it is hard to tell if a cover media contains embedded information. Data hiding can be used for covert communication, or to embed extra information about the image. Often the original cover image cannot be restored once the embedded data has been extracted. However, for certain applications like those belonging to medical and military, the data hiding process cannot distort the cover image. Medical images contain important diagnostic information, and military images serve some legal purpose. Any change in these images can lead to negative consequences. Therefore, a data hiding mechanism is needed for applications in which both the image as well as the data being hidden are important to hide data in such a way which will enable the extraction of embedded data and also restore the original image. Reversible data hiding (RDH) techniques have been proposed to embed data in such sensitive images. In this paper, we discuss a histogram shifting based two pass RDH scheme. Experimental results illustrate that the proposed technique, other than being reversible provides fairly high quality marked image along with high embedding capacity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kumar, C., Singh, A.K., Kumar, P.: A recent survey on image watermarking techniques and its application in e-governance. Multimed. Tools Appl. 77(3), 3597–3622 (2018)

    Article  Google Scholar 

  2. Islam, S., Das, A., Gupta, S., Gupta, P.: Data hiding in medical images. J. Comput. 9(3) (2014). https://doi.org/10.4304/jcp.9.3.513-518

  3. Liu, Y., Qu, X., Xin, G.: A ROI-based reversible data hiding scheme in encrypted medical images. J. Vis. Commun. Image Represent. 39, 51–57 (2016)

    Article  Google Scholar 

  4. Barton, J.M.: Method and apparatus for embedding authentication information within digital data, 8 July 1997. US Patent 5,646,997

    Google Scholar 

  5. Prathap, I., Natarajan, V., Anitha, R.: Hybrid robust watermarking for color images. Comput. Electr. Eng. 40(3), 920–930 (2014). https://doi.org/10.1016/j.compeleceng.2014.01.006

    Article  Google Scholar 

  6. Parah, S.A., Ahad, F., Sheikh, J.A., Bhat, G.M.: Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J. Biomed. Inform. 66, 214–230 (2017)

    Article  Google Scholar 

  7. Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)

    Article  Google Scholar 

  8. Peng, F., Li, X., Yang, B.: Improved PVO-based reversible data hiding. Digit. Sig. Process. 25, 255–265 (2014). https://doi.org/10.1016/j.dsp.2013.11.002

    Article  Google Scholar 

  9. Qu, X., Kim, H.J.: Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Sig. Process. 111, 249–260 (2015). https://doi.org/10.1016/j.sigpro.2015.01.002

    Article  Google Scholar 

  10. Ni, Z., Shi, Y., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16, 354–362 (2006)

    Article  Google Scholar 

  11. Lee, S.K., Suh, Y.H., Ho, Y.S.: Reversiblee image authentication based on watermarking. In: 2006 IEEE International Conference on Multimedia and Expo, pp. 1321–1324. IEEE (2006)

    Google Scholar 

  12. Tai, W.L., Yeh, C.M., Chang, C.C.: Reversible data hiding based on histogram modification of pixel differences. IEEE Trans. Circuits Syst. Video Technol. 19(6), 906–910 (2009). https://doi.org/10.1109/tcsvt.2009.2017409

    Article  Google Scholar 

  13. Pan, Z., Hu, S., Ma, X., Wang, L.: Reversible data hiding based on local histogram shifting with multilayer embedding. J. Vis. Commun. Image Represent. 31, 64–74 (2015). https://doi.org/10.1016/j.jvcir.2015.05.005

    Article  Google Scholar 

  14. Zhao, Z., Luo, H., Lu, Z.M., Pan, J.S.: Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU - Int. J. Electron. Commun. 65(10), 814–826 (2011)

    Article  Google Scholar 

  15. Fu, D.S., Jing, Z.J., Zhao, S.G., Fan, J.: Reversible data hiding based on prediction-error histogram shifting and EMD mechanism. AEU - Int. J. Electron. Commun. 68(10), 933–943 (2014). https://doi.org/10.1016/j.aeue.2014.04.015

    Article  Google Scholar 

  16. He, W., Xiong, G., Zhou, K., Cai, J.: Reversible data hiding based on multilevel histogram modification and pixel value grouping. J. Vis. Commun. Image Represent. 40, 459–469 (2016)

    Article  Google Scholar 

  17. Luo, H., Yu, F.X., Chen, H., Huang, Z.L., Li, H., Wang, P.H.: Reversible data hiding based on block median preservation. Inf. Sci. 181(2), 308–328 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saiful Islam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fatima, E., Islam, S. (2019). A New High Capacity and Reversible Data Hiding Technique for Images. In: Garg, D., Kumar, N., Shyamasundar, R. (eds) Information Systems Security. ICISS 2019. Lecture Notes in Computer Science(), vol 11952. Springer, Cham. https://doi.org/10.1007/978-3-030-36945-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36945-3_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36944-6

  • Online ISBN: 978-3-030-36945-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics