Skip to main content

A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding

  • Conference paper
Digital Forensics and Watermarking (IWDW 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7128))

Included in the following conference series:

Abstract

In this paper, we present a new histogram shifting based multi-layer reversible data hiding scheme. By incorporating a flexible framework of two-step embedding (TSE), the proposed scheme can solve the problem of communicating and adoption of optimal pairs of peak and zero points and work in both pixel difference and predictive error domain for high performance reversible data hiding. A modified location map, which indicates only the actual overflow/underflow pixels, is constructed to facilitate the compression of location map. Compared with similar schemes, experimental results demonstrate the superior performance of the proposed scheme in the terms of embedding capacity and stego-image quality.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barton, J.M.: Method and Apparatus for Embedding Authentication Information within Digital Data. U.S. Patent 5646997 (1997)

    Google Scholar 

  2. Fridrich, J., Goljan, M., Du, R.: Invertible Authentication. In: Proc. SPIE Security and Watermarking of Multimedia Contents III, San Jose, CA, pp. 197–208 (2001)

    Google Scholar 

  3. Fridrich, J., Goljan, M., Du, R.: Lossless Data Embedding for All Image Formats. In: Proc:SPIE Security Watermarking Multimedia Contents IV, San Jose, CA, pp. 185–196 (2002)

    Google Scholar 

  4. Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless Generalized-LSB Data Embedding. IEEE Trans. Image Process 14(2), 253–266 (2005)

    Article  Google Scholar 

  5. Tian, J.: Reversible Watermarking Using A Difference Expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)

    Article  Google Scholar 

  6. Kamstra, L., Heijmans, A.M.: Reversible Data Embedding into Images Using Wavelet Techniques and Sorting. IEEE Trans. Image Process 14(12), 2082–2090 (2005)

    Article  MathSciNet  Google Scholar 

  7. Kim, H.J., Sachnev, V., Shi, Y.Q., Nam, J., Choo, H.G.: A Novel Difference Expansion Transform for Reversible Data Embedding. IEEE Trans. Inf. Forensic Security 3(3), 456–465 (2008)

    Article  Google Scholar 

  8. Hu, Y., Lee, H.K., Li, J.: DE-based Reversible Data Hiding with Improved Overflow Location Map. IEEE Trans. Circuits Syst. Video Technol. 19(2), 250–260 (2009)

    Article  Google Scholar 

  9. Lee, S., Yoo, C.D., Kalker, T.: Reversible Image Watermarking Based on Integer-To-Integer Wavelet Transform. IEEE Trans. Inf. Forensics Security 2(3), 321–330 (2007)

    Article  Google Scholar 

  10. Thodi, D.M., Rodriguez, J.J.: Expansion Embedding Techniques for Reversible Watermarking. IEEE Trans. Image Process 16(3), 721–730 (2007)

    Article  MathSciNet  Google Scholar 

  11. Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.Q.: Reversible Watermarking Algorithm Using Sorting and Prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7), 989–999 (2009)

    Article  Google Scholar 

  12. Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible Data Hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)

    Article  Google Scholar 

  13. Hwang, J., Kim, J., Choi, J.: A Reversible Watermarking Based on Histogram Shifting. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 348–361. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Xuan, G., Yao, Q., Yang, C., Gao, J., Chai, P., Shi, Y.Q., Ni, Z.: Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 323–332. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Wu, X.: Reversible Semi-fragile Watermarking Based on Histogram Shifting of Integer Wavelet Coefficients. In: Proc. Digital Ecosystems and Technologies, Cairns, Australia, pp. 501–505 (2007)

    Google Scholar 

  16. Lin, C.C., Tai, W.L., Chang, C.C.: Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images. Pattern Recognition 41(12), 2582–3591 (2008)

    Article  Google Scholar 

  17. Tsai, P., Hu, Y.C., Yeh, H.L.: Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting. Signal Processing 89(6), 1129–1143 (2009)

    Article  MATH  Google Scholar 

  18. Tai, W.L., Yeh, C.M., Chang, C.C.: Reversible Data Hiding Based on Histogram Modification of Pixel Differences. IEEE Trans. Circuits Syst. Video Technol. 19(6), 906–910 (2009)

    Article  Google Scholar 

  19. Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible Image Watermarking Using Interpolation Technique. IEEE Trans. Inf. Forensics Security 5(1), 187–193 (2010)

    Article  Google Scholar 

  20. Yang, B., Schmucker, M., Niu, X., Busch, C., Sun, S.: Approaching Optimal Value Expansion for Reversible Watermarking. In: Proceedings of ACM Multimedia and Security Workshop, New York, USA, pp. 95–101 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, J., Ni, J., Pan, J. (2012). A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32205-1_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32204-4

  • Online ISBN: 978-3-642-32205-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics