Skip to main content
Log in

Recursive code construction for reversible data hiding in DCT domain

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Reversible data hiding has extensive applications in fields like data authentication, medical data management and error concealment. In this paper, we formulate the model of reversible data hiding over a special ternary cover that is suitable for any transform domain, such as DCT domain, where the probability density function of the transformed coefficients has a Laplacian distribution with a small variance. After deriving rate-distortion function for this model, we propose a code construction that can approach the rate-distortion bound. Based on the code construction, a reversible data hiding method for JPEG images is proposed. Experimental results demonstrate that proposed method has a good balance among image quality, filesize increment and computation time. The excellent performance of proposed method also demonstrate the power of our code construction for reversible data hiding on DCT based media.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Uncompressed Colour Image Database [Online]. Available: http://homepages.lboro.ac.uk/~cogs/datasets/ucid/ucid.html. Link is still valid on May 4th, 2013

  2. Caldelli R, Filippini F, Becarelli R (2010) Reversible watermarking techniques: an overview and a classification. EURASIP J Inf Secur 2010:1–19

    Article  Google Scholar 

  3. Celik M, Sharma G, Tekalp A, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253–266

    Google Scholar 

  4. Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177(13):2768–2786

    Article  Google Scholar 

  5. Chung K, Huang Y, Chang P et al (2010) Reversible data hiding-based approach for intra-frame error concealment in H.264/AVC. IEEE Trans Circuits Syst Video Technol 20(11):1643–1647

    Article  Google Scholar 

  6. Feng J, Lin I, Tsai C et al (2006) Reversible watermarking: current status and key issues. Int J Netw Secur 2(3):161–171

    Google Scholar 

  7. Fridrich J, Goljan M, Du R (2001) Invertible authentication watermark for JPEG images. In: Proc. of IEEE conference on information technology: computing and coding, pp 223–227

  8. Fridrich J, Goljan M (2002) Lossless data embedding for all image formats. In: SPIE proceedings of photonics west, electronic imaging, security and watermarking of multimedia contents, vol 4675. San Jose, pp 572–583

  9. Honsinger C, Jones P, Rabbani M, Stoffel J (2001) Lossless recovery of an original image containing embedded data. US Patent 6278791

  10. Hu Y, Lee H, Li J (2009) DE-based reversible data hiding with improved overflow location map. IEEE Trans Circuits Syst Video Technol 19(2):250–260

    Article  Google Scholar 

  11. Hwang K, Li D (2010) Trusted cloud computing with secure resources and data coloring. IEEE Internet Comput 14(5):14–22

    Article  Google Scholar 

  12. Kalker T, Willems F (2003) Capacity bounds and constructions for reversible data hiding. In: Proc. Of EI SPIE, security and watermarking of multimedia contents V, vol 5020. Santa Clara, pp 604–611

  13. Li Q, Wu Y, Bao F (2010) A reversible data hiding scheme for JPEG images. In: PCM 2010, LNCS 6297, pp 653–664

  14. Li X, Yang B, Zeng T (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20(12):3524–3533

    Article  MathSciNet  Google Scholar 

  15. Lin CC, Shiu PF (2010) DCT-based reversible data hiding scheme. J Softw 5(2):214–224

    Google Scholar 

  16. Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187–193

    Article  Google Scholar 

  17. Ni Z, Shi Y, Ansari N, Wei S (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362

    Article  Google Scholar 

  18. Peng F, Li X, Yang B (2012) Adaptive reversible data hiding scheme based on integer transform. Signal Process 92(1):54–62

    Article  Google Scholar 

  19. Petitcolas F, Anderson R, Kuhn M (1999) Information hiding: a survey. Proc IEEE 87:1062–1078

    Article  Google Scholar 

  20. Thodi D, Rodriguez J (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730

    Article  MathSciNet  Google Scholar 

  21. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896

    Article  Google Scholar 

  22. Tsai P, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89:1129–1143

    Article  MATH  Google Scholar 

  23. Wong K, Tanaka K (2010) DCT based scalable scrambling method with reversible data hiding functionality. In: Proceedings of 2010 4th International symposium on communications, control and signal processing (ISCCSP), pp 1–4

  24. Xuan G, Shi Q, Ni Z et al (2007) Reversible data hiding for JPEG images based on histogram pairs. In: ICIAR 2007, LNCS 4633, pp 715–727

  25. Zhang X, Wang S, Qian Z, Feng G (2010) Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process 90(12):3026–3036

    Article  MATH  Google Scholar 

  26. Zhang W, Chen B, Yu N (2011) Capacity-approaching codes for reversible data hiding. In: Proc. of 13th information hiding conference, LNCS 6958. Prague, pp 255–269

  27. Zhang W, Chen B, Yu N (2012) Improving various reversible data hiding schemes via optimal codes for binary covers. IEEE Trans Image Process 21(6):2991–3003

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weiming Zhang.

Additional information

This work was supported in part by the Natural Science Foundation of China under Grant 61170234 and Grant 60803155, by the Strategic and Piloted Project of CAS under Grant XDA06030601, and by the funding of Science and Technology on Information Assurance Laboratory under Grant KJ-13-02.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chen, B., Zhang, W., Ma, K. et al. Recursive code construction for reversible data hiding in DCT domain. Multimed Tools Appl 72, 1985–2009 (2014). https://doi.org/10.1007/s11042-013-1493-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1493-x

Keywords

Navigation