Skip to main content

Reversible Data Hiding Based on Histogram

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4682))

Abstract

Recently, the reversible data hiding technology has been discussed extensively. Its major characteristic is that allows an original image to be completely reconstructed from the stego-image after the extraction of the embedded data. 2006, the reversible data hiding based on histogram is proposed by Ni,et al. (NSAS). However, the embedded data can not be recovered unless the knowledge of peak point is known to the receiver in NSAS. More recently, Hwang, et al. (HKC) proposed a robust reversible data hiding scheme based on histogram shifting method to improve this shortcoming. At the same time, they also discuss when the element of selected minimum point is not zero and then give the solution to this problem. Unfortunately, the proposed solution will decrease the original data hiding capacity. In order to enhance the data hiding capacity and keep the goal of reversible data, we use one bit to record the change of the selected minimum point to replace the method using in [6]. According to our proposed method and experience analysis, this reversible data hiding scheme is not only to improve the original data hiding capacity but also to reach the goal of data recovering.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. In: Proc. IEEE Int. Conf. Image Processing, Rochester, NY, pp. 157–160. IEEE Computer Society Press, Los Alamitos (2002)

    Google Scholar 

  2. Chang, C.C., Tai, W.L., Lin, C.C.: A Reversible Data Hiding Scheme Based on Side Match Vector Quantization. IEEE Transactions on Circuits and Systems for Video Technology 16(10), 1301–1308 (2006)

    Article  Google Scholar 

  3. Chang, C.C., Hsiao, J.Y., Chan, C.S.: Finding optimal LSB substitution in image hiding by dynamic programming strategy. Pattern Recognit 36(7), 1583–1595 (2003)

    Article  Google Scholar 

  4. Fridrich, J., Goljan, M., Du, R.: Invertible Authentication. Security and Watermarking of Multimedia Contents III, 197–208 (2001)

    Google Scholar 

  5. Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data, US Patent application, Docket No: 77102/E-D (2001)

    Google Scholar 

  6. Hwang, J.H., Kim, J.W., Choi, J.U.: A Reversible Watermarking Based on Histogram Shifting. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 348–361. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. S. Katzenbeisser and F. A. P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking. Norwood, MA: Artech House, 2000

    Google Scholar 

  8. Liu, S.H., Chen, T.H., Yao, H.X., Gao, W.: A variable depth LSB data hiding technique in images, Machine Learning and Cybernetics, 2004, pp. 3990–3994 (2004)

    Google Scholar 

  9. Lu, Z.M., Pan, J.S., Sun, S.H.: VQ-based digital image watermarking method, Electron. Lett. 36(14), 1201–1202 (2000)

    Google Scholar 

  10. Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3), 354–362 (2006)

    Article  Google Scholar 

  11. Podilchuk, C.I., Delp, E.J.: Digital watermarking: Algorithms and applications. IEEE Signal Process. Mag. 18(4), 33–46 (2001)

    Article  Google Scholar 

  12. Tian, J.: Reversible Data Embedding Using a Difference Expansion. IEEE Transactions on Circuits and Systems for Video Technology 13(8), 890–896 (2003)

    Article  Google Scholar 

  13. Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image Steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc.-Vis. Image Signal Process 152(5), 611–615 (2005)

    Article  Google Scholar 

  14. Xuan, G., Yang, C., Zhen, Y., Shi, Y.Q., Ni, Z.: Reversible data hiding based on wavelet spread spectrum. In: IEEE Workshop on Multimedia Signal Processing, pp. 211–214 (2004)

    Google Scholar 

  15. Xuan, G., Yao, Q., Yang, C., Gao, J.: Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 323–332. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  16. Yang, B., Schmucker, M., Funk, W., Busch, C., Sun, S.: Integer DCT-based Reversible Watermarking for Images Using Companding Technique. Steganography and Watermarking of Multimedia Contents VI, pp. 405–415 (2004)

    Google Scholar 

  17. Yu, Y.H., Chang, C.C., Hu, Y.C.: Hiding Secret Data in Images via Predictive Coding. Pattern Recognit 38(5), 691–705 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

De-Shuang Huang Laurent Heutte Marco Loog

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kuo, WC., Jiang, DJ., Huang, YC. (2007). Reversible Data Hiding Based on Histogram. In: Huang, DS., Heutte, L., Loog, M. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence. ICIC 2007. Lecture Notes in Computer Science(), vol 4682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74205-0_119

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74205-0_119

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74201-2

  • Online ISBN: 978-3-540-74205-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics