Kuo-Ming Hung1 , Ching-Tang Hsieh This email address is being protected from spambots. You need JavaScript enabled to view it.2, Ting-Wen Chen2 and Li-Ming Chen2

1Department of Information Management, Kainan University, Taoyuan, Taiwan 338, R.O.C.
2Department of Electrical Engineering, Tamkang University, Tamsui, Taiwan 251, R.O.C.


 

Received: November 18, 2015
Accepted: July 5, 2016
Publication Date: December 1, 2016

Download Citation: ||https://doi.org/10.6180/jase.2016.19.4.12  

ABSTRACT


The technique of reversible data hiding recovers the original image without distortion from a stego-image after the hidden data have been extracted. In this paper, we modify Zhao et al.’s method to propose a reversible data hiding algorithm based on improved histogram modification of pixel differences. Experimental results show that our proposed scheme uses improved multilevel histogram modification of pixel differences to achieve large hiding capacity and keep distortion low. We alsoadopt a histogram shifting technique to prevent overflow and underflow. Performance comparisons with other existing schemes are provided to demonstrate the superiority of the proposed scheme.


Keywords: Reversible Data Hiding, Watermarking, Multilevel Histogram Modification


REFERENCES


  1. [1] Alattar, A. M., “Reversible Watermark Using Difference Expansion Ofquads,” IEEE Int’l Conf. on Acoustics, Speech and Signal Processing, Vol. 3, pp. 377 380 (2004). doi: 10.1109/ICASSP.2004.1326560
  2. [2] Alattar, A. M., “Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform,” IEEE Trans. Image Process., Vol. 13, No. 8, pp. 11471156 (2004). doi: 10.1109/TIP.2004.828418
  3. [3] Thodi, D. M. and Rodriguez, J. J., “Expansion Embedding Techniques for Reversible Watermarking,” IEEE Trans. Image Process., Vol. 16, No.3, pp. 721730 (2007). doi: 10.1109/TIP.2006.891046
  4. [4] Tian, J., “Reversible Data Embedding Using a Difference Expansion,” IEEE Trans. Circuits Syst, Video Technol., Vol. 13, No. 8, pp. 890896 (2003). doi: 10. 1109/TCSVT.2003.815962
  5. [5] Coltuc, D. and Chassery, J. M., “Very Fast Watermarking by Reversible Contrast Mapping,” IEEE Signal Process. Lett., Vol. 14, No. 4, pp. 255258 (2007). doi: 10.1109/LSP.2006.884895
  6. [6] Kim, H. J., Sachnev, V., Shi, Y. Q., Nam, J. and Choo, H. G., “A Novel Difference Expansion Transform for Reversible Data Embedding,” IEEE Trans. Information Forensics and Security, Vol. 3, No. 3, pp. 456465 (2008). doi: 10.1109/TIFS.2008.924600
  7. [7] Ni, Z., Shi, Y. Q., Ansari, N. and Su, W., “Reversible Data Hiding,” IEEE Trans. Circuits Syst, Video Technol., Vol. 16, No. 3, pp. 354362 (2006). doi: 10.1109/ TCSVT.2006.869964
  8. [8] Ni, Z., Shi, Y. Q., Ansari, N. and Su, W., “Reversible Data Hiding,” IEEE Proceedings of ISCAS’03, Vol. 2, pp. II-912915 (2003). doi: 10.1109/ISCAS.2003.1206 123
  9. [9] Fallahpour, M. and Sedaaghi, M. H., “High Capacity Lossless Data Hiding Based on Histogram Modification,” IEICE Electron. Exp., Vol. 4, No. 7, pp. 205 210 (2007). doi: 10.1587/elex.4.205
  10. [10] Lee, S. K., Suh, Y. H. and Ho, Y. S., “Reversible Image Authentication Based on Watermarking,” Proc. IEEE Int. Conf. Multimedia Expo, Toronto, on Canada, pp. 13211324 (2006). doi: 10.1109/ICME.2006.262782
  11. [11] Tai, W. L., Yeh, C. M. and Chang, C. C., Reversible Data Hiding Based on Histogram Modification of Pixel Differences, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 19, No. 6, pp. 906 910 (2009). doi: 10.1109/TCSVT.2009.2017409
  12. [12] Zhao, Z. F., Luo, H., Lu, Z. M. and Pan, J. S., “Reversible Data Hiding Based on Multilevel Histogram Modification and Sequential Recovery,” International Journal of Electronics and Communications (AEU), In Press, Corrected Proof, March (2011). doi: 10.1016/j. aeue.2011.01.014
  13. [13] Zhang, X. P., “Reversible Data Hiding with Optimal Value Transfer,” IEEE Transactions on Multimedia, Vol. 15, No. 2, pp. 316326 (2013). doi: 10.1109/TMM. 2012.2229262
  14. [14] Qian, Z. X., Zhang, X. P. and Wang, S. Z., “Reversible Data Hiding in Encrypted JPEG Bitstream,” IEEE Transactions on Multimedia, Vol. 16, No. 5, pp. 1486 1491 (2014). doi: 10.1109/TMM.2014.2316154
  15. [15] Hu, X. C., Zhang, W. M., Li, X. L. and Yu, N. H., “Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding,” IEEE Transactions on Information Forensics and Security, Vol. 10, No. 3, pp. 653664 (2015). doi: 10.1109/TIFS.2015. 2392556