Skip to main content
Log in

Recovery based high capacity reversible data hiding scheme using even-odd embedding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

There have been discussed various data hiding methods which can embed the secret data in an image. However, the image gets destroyed after extraction of the secret data at the receiving end. Thus, there exists a need to have data hiding methods which can recover the image after extraction of the secret data. Such types of schemes are called reversible data hiding schemes which are commonly used in sensitive military, legal, and medical applications. The existing reversible data hiding schemes either provide good hiding capacity but low quality stego-image or good quality stego-image but poor data hiding capacity because the stego-image quality and the hiding capacity are diametrically related metrics. To address this problem, we propose a high capacity reversible data hiding scheme using recovery strategy. It hides the secret data into a cover image in two phases. In the first phase, the cover image is scanned in a specific scan order andconstructs a location map in which even valued pixels are denoted by ‘1’ and odd valued pixels by ‘0’. It embeds the secret data into every pixel of the image by changing its value at most by 1. The second phase repeats the process of the first phase embedding so that some of the pixels can berecovered to its original form as well as the secret data can further be embedded. Experimentally, it is proved that the proposed scheme provides good quality of stego-image and having the high data hiding capacity at the same time. Further, it is able to maintain the image quality even when the secret data is embedded in layers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156

    Article  MathSciNet  Google Scholar 

  2. Artz D (2001) Digital steganography: hiding data within data. IEEE Internet Comput 5(3):75–80

    Article  Google Scholar 

  3. Barton JM (1997) Method and apparatus for embedding authentication information within digital data. US patent, 5 646 997

  4. Carpenter B (2002) Compression via arithmetic coding <http://www.colloquial.com/ArithmeticCoding/>

  5. Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253–266

    Article  Google Scholar 

  6. Chang CC, Kieu TD (2010) A reversible data hiding scheme using complementary embedding strategy. Inf Sci 180:3045–3058

    Article  Google Scholar 

  7. Chang CC, Lin CY, Fan YH (2008) Lossless data hiding for color images based on block truncation coding. Pattern Recogn 41(7):2347–2357

    Article  MATH  Google Scholar 

  8. De. Vleeschouwer C, Delaigle JF, Macq B (2003) Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimedia 5(1):97–105

    Article  Google Scholar 

  9. Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscaleimages. Proc ACM Workshop Multimed Secur:27–30

  10. Hongand W, Chen TS (2011) Reversible data embedding for high quality images using interpolation andreference pixel distribution mechanism. J Vis Commun Image Represent 22(2):131–140

    Article  Google Scholar 

  11. Honsinger CW, Jones PW, Rabbani M, Stoffel JC (2001) Lossless recovery of an original image containing embedded data. US Patent:6278791

  12. Horng G, Huang YH, Chang CC, Liu Y (2014) (k, n)-image reversible data hiding. J Inf Hiding Multimed Signal Process 5(2):152–164

    Google Scholar 

  13. Huang HC, Fang WC, Tsai IT (2009) Reversible data hiding using histogram-based difference expansion. IEEE Int Symp Circuits Syst:1661–1664

  14. Kumar R, Chand S (2016) A reversible high capacity data hiding scheme using pixel value adjusting feature. Multimedia Tools Appl 75(1):241–259

    Article  MathSciNet  Google Scholar 

  15. Kumar R, Chand S, Singh S (2016) A high capacity email based text steganography scheme using Huffman compression. Int Conf on Signal Processing & Integrated Networks, SPIN 2016:53–56

    Google Scholar 

  16. Kumar R, Malik A, Singh S, Kumar B, Chand S (2016) A Space based reversible high capacity text steganography scheme using Font type and style. Int. Conf. on Computing, Communication and Automation, ICCCA 2016, 29–30 April 2016, pp 1090–1094

  17. Kumar R, Chand S, Singh S (2016) A reversible high capacity data hiding scheme using combinatorial strategy. Int J Multimed Intell Secur, Inderscience

  18. Kumar R, Chand S, Singh S (2017) An Improved Histogram-Shifting-Imitated reversible data hiding based on HVS characteristics. Multimed Tools Appl:1–13. https://doi.org/10.1007/s11042-017-4960-y

  19. Lee CC, Wu HC, Tsai CS, Chu YP (2008) Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recogn 41:2097–2106

    Article  MATH  Google Scholar 

  20. Li S, Leung K, Cheng LM, Chan CK (2006) A novel image-hiding scheme based on block difference. Pattern Recogn 39(6):1168–1176

    Article  MATH  Google Scholar 

  21. Lin CC, Tai WL, Chang CC (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41(12):3582–3591

    Article  MATH  Google Scholar 

  22. Lin IC, Lin YB, Wang CM (2009) Hiding data in spatial domain images with distortion tolerance. Comput Stand Interfaces 31(2):458–464

    Article  MathSciNet  Google Scholar 

  23. Lin SL, Huang CF, Liou MH, Chen CY (2013) Improving histogram-based reversible information hiding by an optimal weight-based prediction scheme. J Inf Hiding Multimed Signal Process 4(1):19–33

    Google Scholar 

  24. Lu ZM, Wang JX, Liu BB (2009) An improved lossless data hiding scheme based on image VQ-index residual value coding. J Syst Softw 82(6):1016–1024

    Article  Google Scholar 

  25. Lu TC, Chang CC, Huang YH High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multimed Tools Appl. https://doi.org/10.1007/s11042-013-1369-0

  26. Macq B (2000) Lossless multiresolution transform for image authenticating watermarking. Proceedings of EUSIPCO, Tampere, pp 533–536

  27. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362

    Article  Google Scholar 

  28. Qin C, Hu Y-C (2016) Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism. Signal Process 129:48–55

    Article  Google Scholar 

  29. Qin C, Chang C-C, Huang Y-H, Liao L-T (2013) An inpainting-assisted reversible Steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23(7):1109–1118

    Article  Google Scholar 

  30. Qin C, Chang C-C, Hsu T-J (2015) Reversible data hiding scheme based on exploiting modification direction with two Steganographic images. Multimed Tools App 74(15):5861–5872

    Article  Google Scholar 

  31. Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circuits Syst Video Technol 19(6):906–910

    Article  Google Scholar 

  32. Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730

    Article  MathSciNet  Google Scholar 

  33. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896

    Article  Google Scholar 

  34. Wang ZH, Lee CF, Chang CY (2013) Histogram-shifting-imitated reversible data hiding. J Syst Softw 86(2):315–323

    Article  Google Scholar 

  35. Weng S, Zhao Y, Pan JS (2008) A novel reversible data hiding scheme. Int J Innov Comput Inf Control 4(2):351–358

    Google Scholar 

  36. Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Sec Commun Netw 7(8):1283–1291

    Article  Google Scholar 

  37. Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools App 75(4):1947–1962

    Article  Google Scholar 

  38. Xuan G, Shi YQ, Yao Q, Ni Z, Yang C, Gao J (2006) Lossless data hiding using histogram shifting method based on integer wavelets. International Workshop on Digital Watermarking, Lect Notes Comput Sci 4823:323–332

    Article  Google Scholar 

  39. Yang B, Schmucker M, Funk W, Brush C, Sun S (2011) Integer DCT-based reversible watermarking for images using companding technique. Proc Int J Elect Commun 65:814–826

    Article  Google Scholar 

  40. Yoo HM, Lee SK, Suh JW (2009) High capacity reversible data hiding using the histogram modification of block image. IEEE Content Engineering Publishing Technology, Piscataway, LNCS Neural Information Processing

    Google Scholar 

  41. Zhao Z, Luo H, Pan JS (2011) Reversible data hiding based on multilevel histogram modification and sequential recovery. Int J Electron Commun 65:814–826

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samayveer Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Malik, A., Singh, S. & Kumar, R. Recovery based high capacity reversible data hiding scheme using even-odd embedding. Multimed Tools Appl 77, 15803–15827 (2018). https://doi.org/10.1007/s11042-017-5156-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5156-1

Keywords

Navigation