Abstract
Over the past few years, many methods have been proposed for reversible data hiding in digital images, but few have been applied to binary images. The existing methods mainly employ run-length to embed the secret message, but the capacity is low. In this paper, we propose a reversible data hiding method based on image magnification. Firstly, image cross-shape patterns are analyzed to select the reference block pattern. Then, to improve the capacity and ensure reversibility, an image magnification strategy based on the reference block pattern is designed to scale up the original image to get the reference image. Finally, to ensure the visual quality of stego image, an inner-block flippable pixel selection strategy is designed to embed data. Experimental results have demonstrated that the proposed reversible data hiding scheme can restore the original image after extracting the embedded message, and achieve high embedding capacity and good visual quality.


















Similar content being viewed by others
References
Abd El-Latif A, Abd-El-Atty B, Hossain MS, Rahman A, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing acknowledgement. IEEE Access 6:21,075–21,083
Cao H, Kot AC (2013) On establishing edge adaptive grid for bilevel image data hiding. IEEE Trans Inf Forensic Secur 8(9):1508–1518
Cao G, Zhao Y, Ni R, Li X (2014) Contrast enhancement-based forensics in digital images. IEEE Trans Inf Forensic Secur 9(3):515–525
Chen L, Lu W, Ni J (2012) An image region description method based on step sector statistics and its application in image copy-rotate/flip-move forgery detection. Int J Digit Crime Forensic 4(1):49–62
Chen L, Lu W, Ni J, Sun W, Huang J (2013) Region duplication detection based on harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244–254
Chen X, Weng J, Lu W, Xu J, Weng J (2017) Deep manifold learning combined with convolutional neural networks for action recognition. IEEE Trans Neural Netw Learn Syst 29(9):3938–3952
Chen J, Lu W, Yeung Y, Xue Y, Liu X, Lin C, Zhang Y (2018) Binary image steganalysis based on distortion level co-occurrence matrix. Comput Mater Contin 55(2):201–211
Chen J, Lu W, Fang Y, Liu X, Yeung Y, Xue Y (2018) Binary image steganalysis based on local texture pattern. J Vis Commun Image Represent 55:149–156
Chen X, Weng J, Lu W, Xu J (2018) Multi-gait recognition based on attribute discovery. IEEE Trans Pattern Anal Mach Intell 40(7):1697–1710
Cheng J, Kot AC (2007) Objective distortion measure for binary text image based on edge line segment similarity. IEEE Trans Image Process 16(6):1691–1695
Chiew KL, Pieprzyk J (2010) Binary image steganographic techniques classification based on multi-class steganalysis. In: International conference on information security practice and experience, Seoul, pp 341–358
Dragoi IC, Coltuc D (2014) Local-prediction-based difference expansion reversible watermarking. IEEE Trans Image Process 23(4):1779–1790
Feng B, Lu W, Sun W (2014) High capacity data hiding scheme for binary images based on minimizing flipping distortion. In: International workshop on digital watermarking, Auckland, pp 514–528
Feng B, Lu W, Sun W (2015) Binary image steganalysis based on pixel mesh markov transition matrix. J Vis Commun Image Represent 26(C):284–295
Feng B, Lu W, Sun W (2015) Novel steganographic method based on generalized k-distance n-dimensional pixel matching. Multimed Tools Appl 74(21):9623–9646
Feng B, Lu W, Sun W (2015) Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans Inf Forensic Secur 10(2):243–255
Feng B, Lu W, Sun W, Huang J, Shi YQ (2016) Robust image watermarking based on tucker decomposition and adaptive-lattice quantization index modulation. Signal Process Image Commun 41(C):1–14
Feng B, Weng J, Lu W, Pei B (2017) Multiple watermarking using multilevel quantization index modulation. In: International workshop on digital watermarking, Beijing, China, pp 312–326
Feng B, Weng J, Lu W, Pei B (2017) Steganalysis of content-adaptive binary image data hiding. J Vis Commun Image Represent 46:119–127
Grangier D, Bengio S (2008) A discriminative kernel-based approach to rank images from text queries. IEEE Trans Pattern Anal Mach Intell 30(8):1371–1384
Guo M, Zhang H (2010) High capacity data hiding for binary image authentication. In: International conference on pattern recognition, Istanbul, Turkey, pp 1441–1444
He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on markov features in dct and dwt domain. Pattern Recogn 45(12):4292–4299
Ho YA, Chan YK, Wu H, Chu YP (2009) High-capacity reversible data hiding in binary images using pattern substitution. Comput Stand Interfaces 31 (4):787–794
Huang D, Shan C, Ardabilian M, Wang Y, Chen L (2011) Local binary patterns and its application to facial image analysis: a survey. IEEE Trans Syst Man Cybern, Part C 41(6):765–781
Jung KH, Yoo KY (2009) Data hiding method using image interpolation. Comput Stand Interfaces 31(2):465–470
Kim C, Baek J, Fisher PS (2014) Lossless data hiding for binary document images using n -pairs pattern. In: International conference on information security and cryptology, pp 317–327
Li X, Li B, Yang B, Zeng T (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans Image Process 22 (6):2181–2191
Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Inf Forensic Secur 8(7):1091–1100
Li J, Lu W (2016) Blind image motion deblurring with l0-regularized priors. J Vis Commun Image Represent 40:14–23
Li J, Yang F, Lu W, Sun W (2016) Keypoint-based copy-move detection scheme by adopting mscrs and improved feature matching. Multimed Tools Appl 76 (20):20,483–20,497
Li J, Lu W, Weng J, Mao Y, Li G (2018) Double jpeg compression detection based on block statistics. Multimedia Tools and Applications 77:31895–31910
Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76 (20):20,739–20,753
Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156
Liao X, Guo S, Wang H, Li X, Sangaiah AK (2018) New cubic reference table based image steganography. Multimed Tools Appl 77(8):10,033–10,050
Lin C, Lu W, Huang X, Liu K, Sun W, Lin H (2018) Copy-move forgery detection using combined features and transitive matching. In: International conference on cloud computing and security, pp 1–12
Lin C, Lu W, Sun W, Zeng J, Xu T, Lai JH (2018) Region duplication detection based on image segmentation and keypoint contexts. Multimed Tools Appl 77(11):14,241–14,258
Liu J, Lu W, Liu K, Huang X, Lin C, Liu X (2018) Copy-move forgery detection based on super pixel segmentation. Journal of Applied Sciences
Liu X, Lu W, Huang T, Liu H, Xue Y, Yeung Y (2018) Scaling factor estimation on jpeg compressed images by cyclostationarity analysis. Multimedia Tools and Applications:1–18. https://doi.org/10.1007/s11042-018-6411-9
Liu X, Lu W, Zhang Q, Huang J, Shi YQ (2019) Downscaling factor estimation on pre-jpeg compressed images. IEEE Transactions on Circuits and Systems for Video Technology
Lu H, Kot AC, Cheng J (2003) Secure data hiding in binary document images for authentication. In: International symposium on circuits and systems, Bangkok, Thailand, pp 806–809
Lu H, Kot AC, Shi YQ (2004) Distance-reciprocal distortion measure for binary document images. IEEE Signal Process Lett 11(2):228–231
Lu W, He L, Yeung Y, Xue Y, Liu H, Feng B (2018) Secure binary image steganography based on fused distortion measurement. IEEE Transactions on Circuits and Systems for Video Technology
Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensic Secur 5(1):187–193
Luo X, Song X, Li X, Zhang W, Lu J, Yang C, Liu F (2016) Steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75(21):13,557–13,583
Malik A, Sikka G, Verma HK (2017) An image interpolation based reversible data hiding scheme using pixel value adjusting feature. Multimed Tools Appl 76(11):13,025–13,046
Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Trans Internet Inf Syst 9(5):1938–1962
Muhammad K, Sajjad M, Baik SW (2016) Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy. J Med Syst 40(5):1–16
Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic lsb substitution method (m-lsb-sm) using multi-level encryption and achromatic component of an image. Multimed Tools Appl 75(22):14,867–14,893
Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) Cisska-lsb: color image steganography using stego key-directed adaptive lsb substitution method. Multimed Tools Appl 76(6):8597–8626
Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2018) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Futur Gener Comput Syst 86:951–960
Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16(3):354–362
Ogiela L, Ogiela MR (2017) Insider threats and cryptographic techniques in secure information management. IEEE J Mag 11(2):405–414
Ogiela L, Ogiela MR (2017) Security of visual codes in service management in the cloud. In: International conference on intelligent informatics and biomedical sciences, pp 165–168
Ogiela U, Takizawa M, Ogiela L (2018) Visual captcha application in linguistic cryptography. Concurr Comput Pract Exper 30(2):1–8
Ou B, Li X, Zhao Y, Ni R, Shi Y-Q (2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans Image Process 22(12):5010–5021
Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted jpeg bitstream. IEEE Trans Multimed 16(5):1486–1491
Shi YQ, Sun H (1999) Image and video compression for multimedia engineering: fundamentals, algorithms, and standards. CRC Press, Boca Raton
Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circ Syst Video Technol 19(6):906–910
Tsai CL, Chiang HF, Fan KC, Chung CD (2005) Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism. Pattern Recogn 38(11):1993–2006
Tseng Y-C, Chen Y-Y, Pan H-K (2002) A secure data hiding scheme for binary images. IEEE Trans Commun 50(8):1227–1231
Wang R, Lu W, Xiang S, Zhao X, Wang J (2018) Digital image splicing detection based on markov features in qdct and qwt domain. International Journal of Digital Crime and Forensics 10(4):271117–024038
Wei Z, Ma K-K (2013) Contrast-guided image interpolation. IEEE Trans Image Process 22(11):4271–4285
Weng S, Yao Z, Pan JS, Ni R (2008) Reversible watermarking based on invariability and adjustment on pixel pairs. IEEE Signal Process Lett 15(20):721–724
Wu M, Liu B (2004) Data hiding in binary image for authentication and annotation. IEEE Trans Multimed 6(4):528–538
Wu H, Weng J, Chen X, Lu W (2018) Feedback weight convolutional neural network for gait recognition. J Vis Commun Image Represent 55:424–432
Xiao H, Lu W, Li R, Zhong N, Yeung Y, Chen J, Xue F, Sun W (2019) Defocus blur detection based on multiscale SVD fusion in gradient domain. J Vis Commun Image Represent 59:52–61
Xie Z, Lu W, Liu X, Xue Y, Yeung Y (2018) Copy-move detection of digital audio based on multi-feature decision. J Inf Secur Appl 43:37–46
Xu Z, Lu W, Zhang Q, Yeung Y, Chen X (2018) Gait recognition based on capsule network. IEEE Transactions on Circuits and Systems for Video Technology
Xuan G, Shi YQ, Chai P, Tong X, Teng J, Li J (2008) Reversible binary image data hiding by run-length histogram modification. In: International Conference on Pattern Recognition, Tampa, FL, pp 1–4
Xue F, Ye Z, Lu W, Liu H, Li B (2017) Mse period based estimation of first quantization step in double compressed jpeg images. Signal Process Image Commun 57:76–83
Xue F, Lu W, Ye Z, Liu H (2018) JPEG image tampering localization based on normalized gray level co-occurrence matrix. Multimedia Tools and Applications
Xue Y, Liu W, Lu W, Yeung Y, Liu X, Liu H (2018) Efficient halftone image steganography based on dispersion degree optimization. J Real-Time Image Proc:1–9. https://doi.org/10.1007/s11554-018-0822-8
Yang H, Kot AC (2007) Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans Multimed 9(3):475–486
Yang CHT, Hsu YT, Wu CC, Chang JW (2014) Reversible data hiding method based on exclusive-or with two host images. In: International conference on trustworthy systems and their applications, pp 69–74
Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell 59:73–83
Yang H, Kot AC, Rahardja S (2008) Orthogonal data embedding for binary images in morphological transform domain-a high-capacity approach. IEEE Trans Multimed 10(3):339–351
Yi Z, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99–111
Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608
Yuan Y, Lu W, Feng B, Weng J (2017) Steganalysis with CNN using multi-channels filtered residuals. International Conference on Cloud Computing and Security 10602:110–120
Zhang L, Wu X (2006) An edge-guided image interpolation algorithm via directional filtering and data fusion. IEEE Trans Image Process 15(8):2226–2238
Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783
Zhang X, Wu X (2008) Image interpolation by adaptive 2-d autoregressive modeling and soft-decision estimation. IEEE Trans Image Process 17(6):887–896
Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495
Zhang Q, Lu W, Weng J (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449–458
Zhang F, Lu W, Liu H, Xue F (2018) Natural image deblurring based on l0-regularization and kernel shape optimization. Multimedia Tools and Applications 77(20):26239–26257
Zhang Q, Lu W, Wang R, Li G (2018) Digital image splicing detection based on markov features in block dwt domain. Multimedia Tools and Applications 77(23):31239–31260
Zhang J, Lu W, Yin X, Liu W, Yeung Y (2019) Binary image steganography based on joint distortion measurement. J Vis Commun Image Represent 58:600–605
Zhao Z, Luo H, Lu ZM, Pan JS (2011) Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU - Int J Electron Commun 65(10):814–826
Zheng Q, Wang X, Khan MK, Zhang W, Gupta BB, Guo W (2018) A lightweight authenticated encryption scheme based on chaotic scml for railway cloud service. IEEE Access 6(99):711–722
Zou L, Sun J, Gao M, Wan W, Gupta BB (2018) A novel coverless information hiding method based on the average pixel value of the sub-images. Multimedia Tools and Applications:1–16. https://doi.org/10.1007/s11042-018-6444-0
Acknowledgments
This work is supported by the National Natural Science Foundation of China (No. U1736118), the Natural Science Foundation of Guangdong (No. 2016A030313350), the Special Funds for Science and Technology Development of Guangdong (No. 2016KZ010103), the Key Project of Scientific Research Plan of Guangzhou (No. 201804020068), Shanghai Minsheng Science and Technology Support Program (17DZ1205500), Shanghai Sailing Program (17YF1420000), the Fundamental Research Funds for the Central Universities (No. 16lgjc83 and No. 17lgjc45).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhang, F., Lu, W., Liu, H. et al. Reversible data hiding in binary images based on image magnification. Multimed Tools Appl 78, 21891–21915 (2019). https://doi.org/10.1007/s11042-019-7519-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-7519-2