[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Difference expansion and histogram shifting methods are two popular hiding strategies that have been widely used in many researches. For example, Hong and Chen developed a reversible hiding method based on interpolation and histogram shifting. The image quality of their scheme is exceptional; however, their scheme needs to keep and transmit two peak points for secret data extraction and pixel recovering. Moreover, the reference pixels in their scheme cannot be used to embed secret data that will decrease the hiding capacity. Therefore, this paper shall propose a reversible hiding method to enhance their scheme. The proposed method applies the difference expansion, histogram shifting and interpolation strategies to conceal secret data in the reference pixels for increasing the hiding payload. Experimental results indicate that the proposed method performs better in terms of hiding capacity than recently developed methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156

    Article  MathSciNet  Google Scholar 

  2. Awrangjeb M, Kankanhalli MS (2005) Reversible watermarking using a perceptual model. J Electron Imaging 14(1):1–8

    Article  Google Scholar 

  3. Berson TA (1993) Differential cryptanalysis mod 232 with applications to MD5. Advances in Cryptology — EUROCRYPT’ 92 658:71–80

  4. Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253–266

    Article  Google Scholar 

  5. Chan YK, Chen WT, Yu SS, Ho YA, Tsai CS, Chu YP (2009) A HDWT-based reversible data hiding method. J Syst Softw 82(3):411–421

    Article  Google Scholar 

  6. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474

    Article  MATH  Google Scholar 

  7. Chang CC, Huang YH, Tsai HY, Qin C (2012) Prediction-based reversible data hiding using the difference of neighboring pixels. Int J Electron Commun (AEÜ) 66(9):758–766

    Article  Google Scholar 

  8. Chu YH, Chang S (1999) Dynamical cryptography based on synchronized chaotic systems. IEE Electron Lett 35(12):974–975

    Article  Google Scholar 

  9. Highland HJ (1997) Data encryption: a non-mathematical approach. Comput Secur 16(5):369–386

    Article  Google Scholar 

  10. Hong W, Chen TS (2011) Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism. J Vis Commun Image Represent 22(2):131–140

    Article  MathSciNet  Google Scholar 

  11. Hu Y, Lee HK, Li J (2009) DE-based reversible data hiding with improved overflow location map. IEEE Trans Circ Syst Video Technol 19(2):250–260

    Article  Google Scholar 

  12. Kieu TD, Chang CC (2011) A steganographic scheme by fully exploiting modification directions. Expert Syst Appl 38:10648–10657

    Article  Google Scholar 

  13. Lee CF, Chen HL, Tso HK (2010) Embedding capacity raising in reversible data hiding based on prediction of difference expansion. J Syst Softw 83(10):1864–1872

    Article  Google Scholar 

  14. Li YC, Yeh CM, Chang CC (2009) Data hiding based on the similarity between neighboring pixels with reversibility. Digit Signal Proc 20(4):1116–1128

    Article  Google Scholar 

  15. Lin CC (2011) An information hiding scheme with minimal image distortion. Comput Stand Interfaces 33(5):477–484

    Article  Google Scholar 

  16. Liu YC, Wu HC, Yu SS (2011) Adaptive DE-based reversible steganographic technique using bilinear interpolation and simplified location map. Multimed Tools Appl 52(2–3):263–276

    Article  Google Scholar 

  17. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16(3):354–362

    Article  Google Scholar 

  18. Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding - a survey. Proc IEEE 87(7):1062–1078

    Article  Google Scholar 

  19. Qin C, Wang S, Zhang X (2012) Simultaneous inpainting for image structure and texture using anisotropic heat transfer model. Multimed Tools Appl 56(3):469–483

    Article  Google Scholar 

  20. Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circ Syst Video Technol 19(6):906–910

    Article  Google Scholar 

  21. Thodi DM, Rodriguez JJ (2004) Prediction-error based reversible watermarking. Proc 2004 Int Conf Image Process 3:1549–1552

    Google Scholar 

  22. Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730

    Article  MathSciNet  Google Scholar 

  23. Tian J (2011) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890–896

    Article  Google Scholar 

  24. Tsai P, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129–1143

    Article  MATH  Google Scholar 

  25. Tseng HW, Hsieh CP (2009) Prediction-based reversible data hiding. Inform Sci 179(14):2460–2469

    Article  MATH  Google Scholar 

  26. Wu HT, Huang J (2012) Reversible image watermarking on prediction errors by efficient histogram modification. Signal Process 92(12):3000–3009

    Article  Google Scholar 

  27. Yang CY, Hu WC (2011) High-performance reversible data hiding with overflow/underflow avoidance. ETRI J 33(4):580–588

    Article  Google Scholar 

  28. Yang HW, Hwang KF, Liao IE (2009) Reversible data hiding based on interleaving max-min difference histogram. Proceedings of the 2009 Joint Conferences on Pervasive Computing 823–828. doi: 10.1109/JCPC.2009.5420071

  29. Yang CH, Weng CY, Tso HK, Wang SJ (2011) A data hiding scheme using the varieties of pixel-value differencing in multimedia images. J Syst Softw 84(4):669–678

    Article  Google Scholar 

  30. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Article  Google Scholar 

  31. Zhao ZF, Luo H, Lu ZM, Pan JS (2011) Reversible data hiding based on multilevel histogram modification and sequential recovery. Int J Electron Commun (AEÜ) 65(10):814–826

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Chen Chang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lu, TC., Chang, CC. & Huang, YH. High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multimed Tools Appl 72, 417–435 (2014). https://doi.org/10.1007/s11042-013-1369-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1369-0

Keywords

Navigation