Abstract
There have been discussed various data hiding methods which can embed the secret data in an image. However, the image gets destroyed after extraction of the secret data at the receiving end. Thus, there exists a need to have data hiding methods which can recover the image after extraction of the secret data. Such types of schemes are called reversible data hiding schemes which are commonly used in sensitive military, legal, and medical applications. The existing reversible data hiding schemes either provide good hiding capacity but low quality stego-image or good quality stego-image but poor data hiding capacity because the stego-image quality and the hiding capacity are diametrically related metrics. To address this problem, we propose a high capacity reversible data hiding scheme using recovery strategy. It hides the secret data into a cover image in two phases. In the first phase, the cover image is scanned in a specific scan order andconstructs a location map in which even valued pixels are denoted by ‘1’ and odd valued pixels by ‘0’. It embeds the secret data into every pixel of the image by changing its value at most by 1. The second phase repeats the process of the first phase embedding so that some of the pixels can berecovered to its original form as well as the secret data can further be embedded. Experimentally, it is proved that the proposed scheme provides good quality of stego-image and having the high data hiding capacity at the same time. Further, it is able to maintain the image quality even when the secret data is embedded in layers.
Similar content being viewed by others
References
Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156
Artz D (2001) Digital steganography: hiding data within data. IEEE Internet Comput 5(3):75–80
Barton JM (1997) Method and apparatus for embedding authentication information within digital data. US patent, 5 646 997
Carpenter B (2002) Compression via arithmetic coding <http://www.colloquial.com/ArithmeticCoding/>
Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253–266
Chang CC, Kieu TD (2010) A reversible data hiding scheme using complementary embedding strategy. Inf Sci 180:3045–3058
Chang CC, Lin CY, Fan YH (2008) Lossless data hiding for color images based on block truncation coding. Pattern Recogn 41(7):2347–2357
De. Vleeschouwer C, Delaigle JF, Macq B (2003) Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimedia 5(1):97–105
Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscaleimages. Proc ACM Workshop Multimed Secur:27–30
Hongand W, Chen TS (2011) Reversible data embedding for high quality images using interpolation andreference pixel distribution mechanism. J Vis Commun Image Represent 22(2):131–140
Honsinger CW, Jones PW, Rabbani M, Stoffel JC (2001) Lossless recovery of an original image containing embedded data. US Patent:6278791
Horng G, Huang YH, Chang CC, Liu Y (2014) (k, n)-image reversible data hiding. J Inf Hiding Multimed Signal Process 5(2):152–164
Huang HC, Fang WC, Tsai IT (2009) Reversible data hiding using histogram-based difference expansion. IEEE Int Symp Circuits Syst:1661–1664
Kumar R, Chand S (2016) A reversible high capacity data hiding scheme using pixel value adjusting feature. Multimedia Tools Appl 75(1):241–259
Kumar R, Chand S, Singh S (2016) A high capacity email based text steganography scheme using Huffman compression. Int Conf on Signal Processing & Integrated Networks, SPIN 2016:53–56
Kumar R, Malik A, Singh S, Kumar B, Chand S (2016) A Space based reversible high capacity text steganography scheme using Font type and style. Int. Conf. on Computing, Communication and Automation, ICCCA 2016, 29–30 April 2016, pp 1090–1094
Kumar R, Chand S, Singh S (2016) A reversible high capacity data hiding scheme using combinatorial strategy. Int J Multimed Intell Secur, Inderscience
Kumar R, Chand S, Singh S (2017) An Improved Histogram-Shifting-Imitated reversible data hiding based on HVS characteristics. Multimed Tools Appl:1–13. https://doi.org/10.1007/s11042-017-4960-y
Lee CC, Wu HC, Tsai CS, Chu YP (2008) Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recogn 41:2097–2106
Li S, Leung K, Cheng LM, Chan CK (2006) A novel image-hiding scheme based on block difference. Pattern Recogn 39(6):1168–1176
Lin CC, Tai WL, Chang CC (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41(12):3582–3591
Lin IC, Lin YB, Wang CM (2009) Hiding data in spatial domain images with distortion tolerance. Comput Stand Interfaces 31(2):458–464
Lin SL, Huang CF, Liou MH, Chen CY (2013) Improving histogram-based reversible information hiding by an optimal weight-based prediction scheme. J Inf Hiding Multimed Signal Process 4(1):19–33
Lu ZM, Wang JX, Liu BB (2009) An improved lossless data hiding scheme based on image VQ-index residual value coding. J Syst Softw 82(6):1016–1024
Lu TC, Chang CC, Huang YH High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multimed Tools Appl. https://doi.org/10.1007/s11042-013-1369-0
Macq B (2000) Lossless multiresolution transform for image authenticating watermarking. Proceedings of EUSIPCO, Tampere, pp 533–536
Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362
Qin C, Hu Y-C (2016) Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism. Signal Process 129:48–55
Qin C, Chang C-C, Huang Y-H, Liao L-T (2013) An inpainting-assisted reversible Steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23(7):1109–1118
Qin C, Chang C-C, Hsu T-J (2015) Reversible data hiding scheme based on exploiting modification direction with two Steganographic images. Multimed Tools App 74(15):5861–5872
Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circuits Syst Video Technol 19(6):906–910
Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896
Wang ZH, Lee CF, Chang CY (2013) Histogram-shifting-imitated reversible data hiding. J Syst Softw 86(2):315–323
Weng S, Zhao Y, Pan JS (2008) A novel reversible data hiding scheme. Int J Innov Comput Inf Control 4(2):351–358
Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Sec Commun Netw 7(8):1283–1291
Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools App 75(4):1947–1962
Xuan G, Shi YQ, Yao Q, Ni Z, Yang C, Gao J (2006) Lossless data hiding using histogram shifting method based on integer wavelets. International Workshop on Digital Watermarking, Lect Notes Comput Sci 4823:323–332
Yang B, Schmucker M, Funk W, Brush C, Sun S (2011) Integer DCT-based reversible watermarking for images using companding technique. Proc Int J Elect Commun 65:814–826
Yoo HM, Lee SK, Suh JW (2009) High capacity reversible data hiding using the histogram modification of block image. IEEE Content Engineering Publishing Technology, Piscataway, LNCS Neural Information Processing
Zhao Z, Luo H, Pan JS (2011) Reversible data hiding based on multilevel histogram modification and sequential recovery. Int J Electron Commun 65:814–826
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Malik, A., Singh, S. & Kumar, R. Recovery based high capacity reversible data hiding scheme using even-odd embedding. Multimed Tools Appl 77, 15803–15827 (2018). https://doi.org/10.1007/s11042-017-5156-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-5156-1