Abstract
This paper proposes a method of reversible data hiding based on generalized histogram shifting where the proposed method is free from memorizing embedding parameters. A generalized histogram shifting-based reversible data hiding (GHS-RDH) method increases (or decreases) particular pixel values in the image by \((q - 1)\), based on the tonal distribution of the image, to hide \(q\)-ary data symbols to the image. The method not only extracts hidden data but also restores the original image from the distorted image carrying hidden data. Whereas conventional GHS-RDH should memorize a set of image-dependent parameters for hidden data extraction and original image recovery, the proposed method is free from parameter memorization and from embedding parameters in the image by introducing three mechanisms; guard zero histogram bins, double side modification, and histogram peak shifting. The proposed method does not need to identify the distorted image conveying hidden data among all possible images before the hidden data extraction, and it makes generalized HS-RDH feasible. In addition, the proposed method is naturally free from overflow/underflow problem. Experimental results show the effectiveness of the proposed method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Whereas the method [24] seems to be an HS-RDH method for prediction error images, it not only shifts a portion of the histogram bins but also interchanges the portion through its embedding process.
- 2.
The capacity for a payload is \(h\left( v_\text {peak} - 1 \right) + h \left( v_\text {peak} + 1 \right) - 2K\), because two of parameters represented by \(K\)-bits are also hidden into the image.
- 3.
As mentioned at Step 2 in the previous section entitled “Data Hiding” which describes the algorithm for data hiding, \(h\left( \tilde{v}_{0_-} - 1 \right) = 0\) when \(q\) is even.
References
Wu, M., Liu, B.: Multimedia Data Hiding. Springer, New York (2003)
Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers, San Francisco (2008)
Fridrich, J.: Steganography in Digital Media. Cambridge University Press, Cambridge (2010)
Langelaar, G.C., Setyawan, I., Lagendijk, R.L.: Watermarking digital image and video data. IEEE Signal Process. Mag. 17(5), 20–46 (2000)
Barni, M.: What is the future for watermarking? (Part I). IEEE Signal Process. Mag. 20(5), 55–59 (2003)
Kuo, C.-C.J., Kalker, T., Zhou, W. (eds.): Digital rights management. IEEE Signal Process. Mag. 21(2), 11–117 (2004)
Barni, M.: What is the future for watermarking? (Part II). IEEE Signal Process. Mag. 20(6), 53–59 (2003)
Tachibana, T., Fujiyoshi, M., Kiya, H.: A removable watermarking scheme retaining the desired image quality. In: Proceedings of 2003 IEEE International Symposium on Intelligent Signal Processing and Communication Systems, pp. 538–542, December 2003
Fujiyoshi, M., Seki, Y., Kobayashi, H., Kiya, H.: Modulo arithmetic-based image watermarking and its theoretical analysis of image-quality. In: Proceedings of 2005 IEEE International Conference on Image Processing, pp. I-969–I-972, September 2005
Caldelli, R., Filippini, F., Becarelli, R.: Reversible watermarking techniques: an overview and a classification. EURASIP J. Inf. Secur. 2010(134546), 1–19 (2010)
Fujiyoshi, M., Sato, S., Jin, H.L., Kiya, H.: A location-map free reversible data hiding method using block-based single parameter. In: Proceedings of 2007 IEEE International Conference on Image Processing, pp. III-257-III-260, September 2007
Zhou, J., Au, O.C.: Determining the capacity parameters in PEE-based reversible image watermarking. IEEE Signal Process. Lett. 19(5), 287–290 (2012)
Li, J., Li, X., Yang, B.: A new PEE-based reversible watermarking algorithm for color image. In: Proceedings of 2012 IEEE International Conference on Image Processing, pp. 2181–2184, October 2012
Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16(3), 354–362 (2006)
Fallahpour, M., Megias, D., Ghanbari, M.: High capacity, reversible data hiding in medical images. In: Proceedings of 2009 IEEE International Conference on Image Processing, pp. 4241–4244, November 2009
Lin, C.C., Tai, W.L., Chang, C.C.: Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn. 41(12), 3582–3591 (2008)
Huang, H.C., Fang, W.C., Lai, W.H.: Secure medical information exchange with reversible data hiding. In: Proceedings of 2012 IEEE International Symposium on Circuits and Systems, pp. 1424–1427, May 2012
Fujiyoshi, M., Kiya, H.: Reversible data hiding for sparse histogram images. In: Proceedings of 2011 International Technical Conference on Circuits/Systems, Computers and Communications, pp. 510–513, June 2011
Arabzadeh, M., Helfroush, M.S., Danyali, H., Kasiri, K.: Reversible watermarking based on generalized histogram shifting. In: Proceedings of 2011 IEEE International Conference on Image Processing, pp. 2797–2800, September 2011
Fujiyoshi, M., Kiya, H.: Generalized histogram shifting-based reversible data hiding with an adaptive binary-to-\(q\)-ary converter. In: Proceedings of 2012 APSIPA Annual Sumit and Conference, December 2012
Han, S., Fujiyoshi, M., Kiya, H.: A reversible image authentication method without memorization of hiding parameters. IEICE Trans. Fundam. E92–A(10), 2572–2579 (2009)
Hwang, J.H., Kim, J., Choi, J.: A reversible watermarking based on histogram shifting. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 348–361. Springer, Heidelberg (2006)
Kuo, W.-C., Jiang, D.-J., Huang, Y.-C.: Reversible data hiding based on histogram. In: Huang, D.-S., Heutte, L., Loog, M. (eds.) ICIC 2007. LNCS (LNAI), vol. 4682, pp. 1152–1161. Springer, Heidelberg (2007)
Wang, X., Li, X., Yang, B., Guo, Z.: A reversible watermarking scheme for high-fidelity applications. In: Muneesawang, P., Wu, F., Kumazawa, I., Roeksabutr, A., Liao, M., Tang, X. (eds.) PCM 2009. LNCS, vol. 5879, pp. 613–624. Springer, Heidelberg (2009)
Fujiyoshi, M., Tsuneyoshi, T., Kiya, H.: A reversible data hiding method free from location map and parameter memorization. In: Proceedings of 2010 IEEE International Symposium on Communications and Information Technologies, pp. 767–772, October 2010
Signal and Image Processing Institute: The USC-SIPI Image Database. University of Southern California
Acknowledgment
This work has been partly supported by the Grant-in-Aid for Young Scientists (B), No. 20336522, from the Ministry of Education, Culture, Sports, Science and Technology of Japan and from the Japan Society for the Promotion of Science.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fujiyoshi, M. (2014). Generalized Histogram Shifting-Based Blind Reversible Data Hiding with Balanced and Guarded Double Side Modification. In: Shi, Y., Kim, HJ., Pérez-González, F. (eds) Digital-Forensics and Watermarking. IWDW 2013. Lecture Notes in Computer Science(), vol 8389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43886-2_35
Download citation
DOI: https://doi.org/10.1007/978-3-662-43886-2_35
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43885-5
Online ISBN: 978-3-662-43886-2
eBook Packages: Computer ScienceComputer Science (R0)