Skip to main content

Generalized Histogram Shifting-Based Blind Reversible Data Hiding with Balanced and Guarded Double Side Modification

  • Conference paper
  • First Online:
Digital-Forensics and Watermarking (IWDW 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8389))

Included in the following conference series:

  • 1603 Accesses

Abstract

This paper proposes a method of reversible data hiding based on generalized histogram shifting where the proposed method is free from memorizing embedding parameters. A generalized histogram shifting-based reversible data hiding (GHS-RDH) method increases (or decreases) particular pixel values in the image by \((q - 1)\), based on the tonal distribution of the image, to hide \(q\)-ary data symbols to the image. The method not only extracts hidden data but also restores the original image from the distorted image carrying hidden data. Whereas conventional GHS-RDH should memorize a set of image-dependent parameters for hidden data extraction and original image recovery, the proposed method is free from parameter memorization and from embedding parameters in the image by introducing three mechanisms; guard zero histogram bins, double side modification, and histogram peak shifting. The proposed method does not need to identify the distorted image conveying hidden data among all possible images before the hidden data extraction, and it makes generalized HS-RDH feasible. In addition, the proposed method is naturally free from overflow/underflow problem. Experimental results show the effectiveness of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Whereas the method [24] seems to be an HS-RDH method for prediction error images, it not only shifts a portion of the histogram bins but also interchanges the portion through its embedding process.

  2. 2.

    The capacity for a payload is \(h\left( v_\text {peak} - 1 \right) + h \left( v_\text {peak} + 1 \right) - 2K\), because two of parameters represented by \(K\)-bits are also hidden into the image.

  3. 3.

    As mentioned at Step 2 in the previous section entitled “Data Hiding” which describes the algorithm for data hiding, \(h\left( \tilde{v}_{0_-} - 1 \right) = 0\) when \(q\) is even.

References

  1. Wu, M., Liu, B.: Multimedia Data Hiding. Springer, New York (2003)

    Book  MATH  Google Scholar 

  2. Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers, San Francisco (2008)

    Google Scholar 

  3. Fridrich, J.: Steganography in Digital Media. Cambridge University Press, Cambridge (2010)

    MATH  Google Scholar 

  4. Langelaar, G.C., Setyawan, I., Lagendijk, R.L.: Watermarking digital image and video data. IEEE Signal Process. Mag. 17(5), 20–46 (2000)

    Article  Google Scholar 

  5. Barni, M.: What is the future for watermarking? (Part I). IEEE Signal Process. Mag. 20(5), 55–59 (2003)

    Article  Google Scholar 

  6. Kuo, C.-C.J., Kalker, T., Zhou, W. (eds.): Digital rights management. IEEE Signal Process. Mag. 21(2), 11–117 (2004)

    Google Scholar 

  7. Barni, M.: What is the future for watermarking? (Part II). IEEE Signal Process. Mag. 20(6), 53–59 (2003)

    Article  Google Scholar 

  8. Tachibana, T., Fujiyoshi, M., Kiya, H.: A removable watermarking scheme retaining the desired image quality. In: Proceedings of 2003 IEEE International Symposium on Intelligent Signal Processing and Communication Systems, pp. 538–542, December 2003

    Google Scholar 

  9. Fujiyoshi, M., Seki, Y., Kobayashi, H., Kiya, H.: Modulo arithmetic-based image watermarking and its theoretical analysis of image-quality. In: Proceedings of 2005 IEEE International Conference on Image Processing, pp. I-969–I-972, September 2005

    Google Scholar 

  10. Caldelli, R., Filippini, F., Becarelli, R.: Reversible watermarking techniques: an overview and a classification. EURASIP J. Inf. Secur. 2010(134546), 1–19 (2010)

    Article  Google Scholar 

  11. Fujiyoshi, M., Sato, S., Jin, H.L., Kiya, H.: A location-map free reversible data hiding method using block-based single parameter. In: Proceedings of 2007 IEEE International Conference on Image Processing, pp. III-257-III-260, September 2007

    Google Scholar 

  12. Zhou, J., Au, O.C.: Determining the capacity parameters in PEE-based reversible image watermarking. IEEE Signal Process. Lett. 19(5), 287–290 (2012)

    Article  Google Scholar 

  13. Li, J., Li, X., Yang, B.: A new PEE-based reversible watermarking algorithm for color image. In: Proceedings of 2012 IEEE International Conference on Image Processing, pp. 2181–2184, October 2012

    Google Scholar 

  14. Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16(3), 354–362 (2006)

    Article  Google Scholar 

  15. Fallahpour, M., Megias, D., Ghanbari, M.: High capacity, reversible data hiding in medical images. In: Proceedings of 2009 IEEE International Conference on Image Processing, pp. 4241–4244, November 2009

    Google Scholar 

  16. Lin, C.C., Tai, W.L., Chang, C.C.: Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn. 41(12), 3582–3591 (2008)

    Article  MATH  Google Scholar 

  17. Huang, H.C., Fang, W.C., Lai, W.H.: Secure medical information exchange with reversible data hiding. In: Proceedings of 2012 IEEE International Symposium on Circuits and Systems, pp. 1424–1427, May 2012

    Google Scholar 

  18. Fujiyoshi, M., Kiya, H.: Reversible data hiding for sparse histogram images. In: Proceedings of 2011 International Technical Conference on Circuits/Systems, Computers and Communications, pp. 510–513, June 2011

    Google Scholar 

  19. Arabzadeh, M., Helfroush, M.S., Danyali, H., Kasiri, K.: Reversible watermarking based on generalized histogram shifting. In: Proceedings of 2011 IEEE International Conference on Image Processing, pp. 2797–2800, September 2011

    Google Scholar 

  20. Fujiyoshi, M., Kiya, H.: Generalized histogram shifting-based reversible data hiding with an adaptive binary-to-\(q\)-ary converter. In: Proceedings of 2012 APSIPA Annual Sumit and Conference, December 2012

    Google Scholar 

  21. Han, S., Fujiyoshi, M., Kiya, H.: A reversible image authentication method without memorization of hiding parameters. IEICE Trans. Fundam. E92–A(10), 2572–2579 (2009)

    Article  Google Scholar 

  22. Hwang, J.H., Kim, J., Choi, J.: A reversible watermarking based on histogram shifting. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 348–361. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  23. Kuo, W.-C., Jiang, D.-J., Huang, Y.-C.: Reversible data hiding based on histogram. In: Huang, D.-S., Heutte, L., Loog, M. (eds.) ICIC 2007. LNCS (LNAI), vol. 4682, pp. 1152–1161. Springer, Heidelberg (2007)

    Google Scholar 

  24. Wang, X., Li, X., Yang, B., Guo, Z.: A reversible watermarking scheme for high-fidelity applications. In: Muneesawang, P., Wu, F., Kumazawa, I., Roeksabutr, A., Liao, M., Tang, X. (eds.) PCM 2009. LNCS, vol. 5879, pp. 613–624. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  25. Fujiyoshi, M., Tsuneyoshi, T., Kiya, H.: A reversible data hiding method free from location map and parameter memorization. In: Proceedings of 2010 IEEE International Symposium on Communications and Information Technologies, pp. 767–772, October 2010

    Google Scholar 

  26. Signal and Image Processing Institute: The USC-SIPI Image Database. University of Southern California

    Google Scholar 

Download references

Acknowledgment

This work has been partly supported by the Grant-in-Aid for Young Scientists (B), No. 20336522, from the Ministry of Education, Culture, Sports, Science and Technology of Japan and from the Japan Society for the Promotion of Science.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Masaaki Fujiyoshi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fujiyoshi, M. (2014). Generalized Histogram Shifting-Based Blind Reversible Data Hiding with Balanced and Guarded Double Side Modification. In: Shi, Y., Kim, HJ., Pérez-González, F. (eds) Digital-Forensics and Watermarking. IWDW 2013. Lecture Notes in Computer Science(), vol 8389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43886-2_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43886-2_35

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43885-5

  • Online ISBN: 978-3-662-43886-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics