Skip to main content
Log in

Reversible data hiding in binary images based on image magnification

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Over the past few years, many methods have been proposed for reversible data hiding in digital images, but few have been applied to binary images. The existing methods mainly employ run-length to embed the secret message, but the capacity is low. In this paper, we propose a reversible data hiding method based on image magnification. Firstly, image cross-shape patterns are analyzed to select the reference block pattern. Then, to improve the capacity and ensure reversibility, an image magnification strategy based on the reference block pattern is designed to scale up the original image to get the reference image. Finally, to ensure the visual quality of stego image, an inner-block flippable pixel selection strategy is designed to embed data. Experimental results have demonstrated that the proposed reversible data hiding scheme can restore the original image after extracting the embedded message, and achieve high embedding capacity and good visual quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Abd El-Latif A, Abd-El-Atty B, Hossain MS, Rahman A, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing acknowledgement. IEEE Access 6:21,075–21,083

    Article  Google Scholar 

  2. Cao H, Kot AC (2013) On establishing edge adaptive grid for bilevel image data hiding. IEEE Trans Inf Forensic Secur 8(9):1508–1518

    Article  Google Scholar 

  3. Cao G, Zhao Y, Ni R, Li X (2014) Contrast enhancement-based forensics in digital images. IEEE Trans Inf Forensic Secur 9(3):515–525

    Article  Google Scholar 

  4. Chen L, Lu W, Ni J (2012) An image region description method based on step sector statistics and its application in image copy-rotate/flip-move forgery detection. Int J Digit Crime Forensic 4(1):49–62

    Article  Google Scholar 

  5. Chen L, Lu W, Ni J, Sun W, Huang J (2013) Region duplication detection based on harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244–254

    Article  Google Scholar 

  6. Chen X, Weng J, Lu W, Xu J, Weng J (2017) Deep manifold learning combined with convolutional neural networks for action recognition. IEEE Trans Neural Netw Learn Syst 29(9):3938–3952

    Article  Google Scholar 

  7. Chen J, Lu W, Yeung Y, Xue Y, Liu X, Lin C, Zhang Y (2018) Binary image steganalysis based on distortion level co-occurrence matrix. Comput Mater Contin 55(2):201–211

    Google Scholar 

  8. Chen J, Lu W, Fang Y, Liu X, Yeung Y, Xue Y (2018) Binary image steganalysis based on local texture pattern. J Vis Commun Image Represent 55:149–156

    Article  Google Scholar 

  9. Chen X, Weng J, Lu W, Xu J (2018) Multi-gait recognition based on attribute discovery. IEEE Trans Pattern Anal Mach Intell 40(7):1697–1710

    Article  Google Scholar 

  10. Cheng J, Kot AC (2007) Objective distortion measure for binary text image based on edge line segment similarity. IEEE Trans Image Process 16(6):1691–1695

    Article  MathSciNet  Google Scholar 

  11. Chiew KL, Pieprzyk J (2010) Binary image steganographic techniques classification based on multi-class steganalysis. In: International conference on information security practice and experience, Seoul, pp 341–358

  12. Dragoi IC, Coltuc D (2014) Local-prediction-based difference expansion reversible watermarking. IEEE Trans Image Process 23(4):1779–1790

    Article  MathSciNet  MATH  Google Scholar 

  13. Feng B, Lu W, Sun W (2014) High capacity data hiding scheme for binary images based on minimizing flipping distortion. In: International workshop on digital watermarking, Auckland, pp 514–528

  14. Feng B, Lu W, Sun W (2015) Binary image steganalysis based on pixel mesh markov transition matrix. J Vis Commun Image Represent 26(C):284–295

    Article  Google Scholar 

  15. Feng B, Lu W, Sun W (2015) Novel steganographic method based on generalized k-distance n-dimensional pixel matching. Multimed Tools Appl 74(21):9623–9646

    Article  Google Scholar 

  16. Feng B, Lu W, Sun W (2015) Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans Inf Forensic Secur 10(2):243–255

    Article  Google Scholar 

  17. Feng B, Lu W, Sun W, Huang J, Shi YQ (2016) Robust image watermarking based on tucker decomposition and adaptive-lattice quantization index modulation. Signal Process Image Commun 41(C):1–14

    Article  Google Scholar 

  18. Feng B, Weng J, Lu W, Pei B (2017) Multiple watermarking using multilevel quantization index modulation. In: International workshop on digital watermarking, Beijing, China, pp 312–326

  19. Feng B, Weng J, Lu W, Pei B (2017) Steganalysis of content-adaptive binary image data hiding. J Vis Commun Image Represent 46:119–127

    Article  Google Scholar 

  20. Grangier D, Bengio S (2008) A discriminative kernel-based approach to rank images from text queries. IEEE Trans Pattern Anal Mach Intell 30(8):1371–1384

    Article  Google Scholar 

  21. Guo M, Zhang H (2010) High capacity data hiding for binary image authentication. In: International conference on pattern recognition, Istanbul, Turkey, pp 1441–1444

  22. He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on markov features in dct and dwt domain. Pattern Recogn 45(12):4292–4299

    Article  Google Scholar 

  23. Ho YA, Chan YK, Wu H, Chu YP (2009) High-capacity reversible data hiding in binary images using pattern substitution. Comput Stand Interfaces 31 (4):787–794

    Article  Google Scholar 

  24. Huang D, Shan C, Ardabilian M, Wang Y, Chen L (2011) Local binary patterns and its application to facial image analysis: a survey. IEEE Trans Syst Man Cybern, Part C 41(6):765–781

    Article  Google Scholar 

  25. Jung KH, Yoo KY (2009) Data hiding method using image interpolation. Comput Stand Interfaces 31(2):465–470

    Article  Google Scholar 

  26. Kim C, Baek J, Fisher PS (2014) Lossless data hiding for binary document images using n -pairs pattern. In: International conference on information security and cryptology, pp 317–327

  27. Li X, Li B, Yang B, Zeng T (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans Image Process 22 (6):2181–2191

    Article  MathSciNet  MATH  Google Scholar 

  28. Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Inf Forensic Secur 8(7):1091–1100

    Article  Google Scholar 

  29. Li J, Lu W (2016) Blind image motion deblurring with l0-regularized priors. J Vis Commun Image Represent 40:14–23

    Article  Google Scholar 

  30. Li J, Yang F, Lu W, Sun W (2016) Keypoint-based copy-move detection scheme by adopting mscrs and improved feature matching. Multimed Tools Appl 76 (20):20,483–20,497

    Article  Google Scholar 

  31. Li J, Lu W, Weng J, Mao Y, Li G (2018) Double jpeg compression detection based on block statistics. Multimedia Tools and Applications 77:31895–31910

    Article  Google Scholar 

  32. Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76 (20):20,739–20,753

    Article  Google Scholar 

  33. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156

    Article  Google Scholar 

  34. Liao X, Guo S, Wang H, Li X, Sangaiah AK (2018) New cubic reference table based image steganography. Multimed Tools Appl 77(8):10,033–10,050

    Article  Google Scholar 

  35. Lin C, Lu W, Huang X, Liu K, Sun W, Lin H (2018) Copy-move forgery detection using combined features and transitive matching. In: International conference on cloud computing and security, pp 1–12

  36. Lin C, Lu W, Sun W, Zeng J, Xu T, Lai JH (2018) Region duplication detection based on image segmentation and keypoint contexts. Multimed Tools Appl 77(11):14,241–14,258

    Article  Google Scholar 

  37. Liu J, Lu W, Liu K, Huang X, Lin C, Liu X (2018) Copy-move forgery detection based on super pixel segmentation. Journal of Applied Sciences

  38. Liu X, Lu W, Huang T, Liu H, Xue Y, Yeung Y (2018) Scaling factor estimation on jpeg compressed images by cyclostationarity analysis. Multimedia Tools and Applications:1–18. https://doi.org/10.1007/s11042-018-6411-9

  39. Liu X, Lu W, Zhang Q, Huang J, Shi YQ (2019) Downscaling factor estimation on pre-jpeg compressed images. IEEE Transactions on Circuits and Systems for Video Technology

  40. Lu H, Kot AC, Cheng J (2003) Secure data hiding in binary document images for authentication. In: International symposium on circuits and systems, Bangkok, Thailand, pp 806–809

  41. Lu H, Kot AC, Shi YQ (2004) Distance-reciprocal distortion measure for binary document images. IEEE Signal Process Lett 11(2):228–231

    Article  Google Scholar 

  42. Lu W, He L, Yeung Y, Xue Y, Liu H, Feng B (2018) Secure binary image steganography based on fused distortion measurement. IEEE Transactions on Circuits and Systems for Video Technology

  43. Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensic Secur 5(1):187–193

    Article  Google Scholar 

  44. Luo X, Song X, Li X, Zhang W, Lu J, Yang C, Liu F (2016) Steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75(21):13,557–13,583

    Article  Google Scholar 

  45. Malik A, Sikka G, Verma HK (2017) An image interpolation based reversible data hiding scheme using pixel value adjusting feature. Multimed Tools Appl 76(11):13,025–13,046

    Article  Google Scholar 

  46. Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Trans Internet Inf Syst 9(5):1938–1962

    Google Scholar 

  47. Muhammad K, Sajjad M, Baik SW (2016) Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy. J Med Syst 40(5):1–16

    Article  Google Scholar 

  48. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic lsb substitution method (m-lsb-sm) using multi-level encryption and achromatic component of an image. Multimed Tools Appl 75(22):14,867–14,893

    Article  Google Scholar 

  49. Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) Cisska-lsb: color image steganography using stego key-directed adaptive lsb substitution method. Multimed Tools Appl 76(6):8597–8626

    Article  Google Scholar 

  50. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2018) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Futur Gener Comput Syst 86:951–960

    Article  Google Scholar 

  51. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16(3):354–362

    Article  Google Scholar 

  52. Ogiela L, Ogiela MR (2017) Insider threats and cryptographic techniques in secure information management. IEEE J Mag 11(2):405–414

    Google Scholar 

  53. Ogiela L, Ogiela MR (2017) Security of visual codes in service management in the cloud. In: International conference on intelligent informatics and biomedical sciences, pp 165–168

  54. Ogiela U, Takizawa M, Ogiela L (2018) Visual captcha application in linguistic cryptography. Concurr Comput Pract Exper 30(2):1–8

    Google Scholar 

  55. Ou B, Li X, Zhao Y, Ni R, Shi Y-Q (2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans Image Process 22(12):5010–5021

    Article  MathSciNet  MATH  Google Scholar 

  56. Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted jpeg bitstream. IEEE Trans Multimed 16(5):1486–1491

    Article  Google Scholar 

  57. Shi YQ, Sun H (1999) Image and video compression for multimedia engineering: fundamentals, algorithms, and standards. CRC Press, Boca Raton

    Book  Google Scholar 

  58. Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circ Syst Video Technol 19(6):906–910

    Article  Google Scholar 

  59. Tsai CL, Chiang HF, Fan KC, Chung CD (2005) Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism. Pattern Recogn 38(11):1993–2006

    Article  Google Scholar 

  60. Tseng Y-C, Chen Y-Y, Pan H-K (2002) A secure data hiding scheme for binary images. IEEE Trans Commun 50(8):1227–1231

    Article  Google Scholar 

  61. Wang R, Lu W, Xiang S, Zhao X, Wang J (2018) Digital image splicing detection based on markov features in qdct and qwt domain. International Journal of Digital Crime and Forensics 10(4):271117–024038

  62. Wei Z, Ma K-K (2013) Contrast-guided image interpolation. IEEE Trans Image Process 22(11):4271–4285

    Article  MathSciNet  MATH  Google Scholar 

  63. Weng S, Yao Z, Pan JS, Ni R (2008) Reversible watermarking based on invariability and adjustment on pixel pairs. IEEE Signal Process Lett 15(20):721–724

    Article  Google Scholar 

  64. Wu M, Liu B (2004) Data hiding in binary image for authentication and annotation. IEEE Trans Multimed 6(4):528–538

    Article  Google Scholar 

  65. Wu H, Weng J, Chen X, Lu W (2018) Feedback weight convolutional neural network for gait recognition. J Vis Commun Image Represent 55:424–432

    Article  Google Scholar 

  66. Xiao H, Lu W, Li R, Zhong N, Yeung Y, Chen J, Xue F, Sun W (2019) Defocus blur detection based on multiscale SVD fusion in gradient domain. J Vis Commun Image Represent 59:52–61

    Article  Google Scholar 

  67. Xie Z, Lu W, Liu X, Xue Y, Yeung Y (2018) Copy-move detection of digital audio based on multi-feature decision. J Inf Secur Appl 43:37–46

    Google Scholar 

  68. Xu Z, Lu W, Zhang Q, Yeung Y, Chen X (2018) Gait recognition based on capsule network. IEEE Transactions on Circuits and Systems for Video Technology

  69. Xuan G, Shi YQ, Chai P, Tong X, Teng J, Li J (2008) Reversible binary image data hiding by run-length histogram modification. In: International Conference on Pattern Recognition, Tampa, FL, pp 1–4

  70. Xue F, Ye Z, Lu W, Liu H, Li B (2017) Mse period based estimation of first quantization step in double compressed jpeg images. Signal Process Image Commun 57:76–83

    Article  Google Scholar 

  71. Xue F, Lu W, Ye Z, Liu H (2018) JPEG image tampering localization based on normalized gray level co-occurrence matrix. Multimedia Tools and Applications

  72. Xue Y, Liu W, Lu W, Yeung Y, Liu X, Liu H (2018) Efficient halftone image steganography based on dispersion degree optimization. J Real-Time Image Proc:1–9. https://doi.org/10.1007/s11554-018-0822-8

  73. Yang H, Kot AC (2007) Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans Multimed 9(3):475–486

    Article  Google Scholar 

  74. Yang CHT, Hsu YT, Wu CC, Chang JW (2014) Reversible data hiding method based on exclusive-or with two host images. In: International conference on trustworthy systems and their applications, pp 69–74

  75. Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell 59:73–83

    Article  Google Scholar 

  76. Yang H, Kot AC, Rahardja S (2008) Orthogonal data embedding for binary images in morphological transform domain-a high-capacity approach. IEEE Trans Multimed 10(3):339–351

    Article  Google Scholar 

  77. Yi Z, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99–111

    Article  Google Scholar 

  78. Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608

    Article  Google Scholar 

  79. Yuan Y, Lu W, Feng B, Weng J (2017) Steganalysis with CNN using multi-channels filtered residuals. International Conference on Cloud Computing and Security 10602:110–120

  80. Zhang L, Wu X (2006) An edge-guided image interpolation algorithm via directional filtering and data fusion. IEEE Trans Image Process 15(8):2226–2238

    Article  Google Scholar 

  81. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Article  Google Scholar 

  82. Zhang X, Wu X (2008) Image interpolation by adaptive 2-d autoregressive modeling and soft-decision estimation. IEEE Trans Image Process 17(6):887–896

    Article  MathSciNet  Google Scholar 

  83. Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495

    Article  MathSciNet  MATH  Google Scholar 

  84. Zhang Q, Lu W, Weng J (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449–458

    Article  Google Scholar 

  85. Zhang F, Lu W, Liu H, Xue F (2018) Natural image deblurring based on l0-regularization and kernel shape optimization. Multimedia Tools and Applications 77(20):26239–26257

    Article  Google Scholar 

  86. Zhang Q, Lu W, Wang R, Li G (2018) Digital image splicing detection based on markov features in block dwt domain. Multimedia Tools and Applications 77(23):31239–31260

    Article  Google Scholar 

  87. Zhang J, Lu W, Yin X, Liu W, Yeung Y (2019) Binary image steganography based on joint distortion measurement. J Vis Commun Image Represent 58:600–605

    Article  Google Scholar 

  88. Zhao Z, Luo H, Lu ZM, Pan JS (2011) Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU - Int J Electron Commun 65(10):814–826

    Article  Google Scholar 

  89. Zheng Q, Wang X, Khan MK, Zhang W, Gupta BB, Guo W (2018) A lightweight authenticated encryption scheme based on chaotic scml for railway cloud service. IEEE Access 6(99):711–722

    Article  Google Scholar 

  90. Zou L, Sun J, Gao M, Wan W, Gupta BB (2018) A novel coverless information hiding method based on the average pixel value of the sub-images. Multimedia Tools and Applications:1–16. https://doi.org/10.1007/s11042-018-6444-0

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (No. U1736118), the Natural Science Foundation of Guangdong (No. 2016A030313350), the Special Funds for Science and Technology Development of Guangdong (No. 2016KZ010103), the Key Project of Scientific Research Plan of Guangzhou (No. 201804020068), Shanghai Minsheng Science and Technology Support Program (17DZ1205500), Shanghai Sailing Program (17YF1420000), the Fundamental Research Funds for the Central Universities (No. 16lgjc83 and No. 17lgjc45).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Lu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, F., Lu, W., Liu, H. et al. Reversible data hiding in binary images based on image magnification. Multimed Tools Appl 78, 21891–21915 (2019). https://doi.org/10.1007/s11042-019-7519-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7519-2

Keywords

Navigation