skip to main content
10.1145/2536853.2536876acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

Improving reversible histogram based data hiding schemes with an image preprocessing method

Published: 02 December 2013 Publication History

Abstract

This paper presents two edge detectors and a preprocessing algorithm for histogram based data hiding schemes. The proposed technique takes advantage of the edge detectors to segment the image into plain and textured areas. The plain areas are selected for embedding where a histogram based scheme is used to embed information in these areas. Since in the plain areas, pixel intensities are close to each other, with the proposed preprocessing algorithm the number of shifted pixels for the same amount of hidden data capacity are decreased which results in a better transparency. To validate the efficiency of the technique two of the best known histogram based schemes which use prediction and interpolation are implemented and results are compared with and without the preprocessing scheme. The experimental results show that the histogram based methods with preprocessing algorithm, under the same capacity, have better transparency than the schemes without preprocessing. This scheme improves capacity, even by 200%, at equal distortion, or about 4 dB improvement in PSNR, at the same hiding capacity.

References

[1]
Y. Q. Shi, Z. Ni, D. Zou, C. Liang, and G. Xuan, 2004 "Lossless data hiding: Fundamentals, algorithms and applications," in Proc. IEEE Int. Symp. Circuits Syst., Vancouver, BC, Canada, (May 2004), vol. II, pp. 33--36.
[2]
J. B. Feng, I. C. Lin, C. S. Tsai, and Y. P. Chu, 2006 "Reversible watermarking: current status and key issues," International Journal of Network Security, vol. 2, No. 3, pp. 161--171.
[3]
J. Fridrich, M. Goljan, R. Du, 2001, "Invertible authentication" Proceedings of SPIE Photonics West, vol. 3971, Security and Watermarking of Multimedia Contents III, San Jose, CA, pp. 197--208.
[4]
M.U. Celik, G. Sharma, A.M. Tekalp, and E. Saber, 2005, "Lossless generalized-LSB data embedding," IEEE Trans. Image Process., vol. 14, no.2, pp.253--266.
[5]
M. Fallahpour, D, Megias, and M. Ghanbari, 'Reversible and high capacity data hiding in medical images', IET Image Processing, Vol. 5, No. 2, pp. 190--197, 2011.
[6]
J. Tian, 2003 "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no.8, pp.890--896.
[7]
A. M. Alattar, 2004 "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Trans. Image Process., vol. 13, no. 8, pp. 1147--1156.
[8]
L. Kamstra, J.A.M Heijmans., 2005: 'Reversible data embedding into images using wavelet techniques and sorting', IEEE Trans. Image Process., 14, (12), pp. 2082--2090.
[9]
C.C. Chang, W.L. Tai, C.C. Lin, 2006 'A reversible data hiding scheme based on side match vector quantization', IEEE Trans. Circuits Syst. Video Technol., 16, (10), pp. 1301--1308.
[10]
C.C. Chang, C.Y Lin, 2006 'Reversible steganography for VQ-compressed images using side matching and relocation', IEEE Trans. Inf. Forensics Secur., 1, (4), pp. 493--501.
[11]
Z. Ni, Y.Q. Shi, N.Ansari, and W. Su, 2006 "Reversible data hiding," IEEE Trans. on Circuits and Systems for Video technology, 16(3):354--362.
[12]
M.Fallahpour, M.H. Sedaaghi, 2007 "High capacity lossless data hiding based on histogram modification," IEICE Transactions on Electronics Express Vol. 4, No. 7 pp.205--210.
[13]
C.C Lin, N.L Hsueh, 2007 "Hiding Data Reversibly in an Image via Increasing Differences between Two Neighboring Pixels," IEICE TRANS. INF. & SYST., Vol.E90--D, NO.12 pp 2053--2059.
[14]
G. Xuan, Y. Q. Shi, P. Chai, X. Cui, Z. Ni, X. Tong, 2007, "Optimum Histogram Pair Based Image Lossless Data Embedding," Proc. International Workshop on DigitalWatermarking (IWDW07), Guangzhou, China.
[15]
H. J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, and H. G. Choo, 2008 "A novel difference expansion transform for reversible data embedding". IEEE Trans. Information Forensics and Security, 3, 3, 456--465.
[16]
D. M. Thodi and J. J. Rodriquez, 2004 "Reversible watermarking by prediction-error expansion," in Proc. IEEE Southwest Symp. Image Analysis and Interpretation, pp. 28--30.
[17]
D. M. Thodi and J. J. Rodriguez, 2007 "Expansion embedding techniques for reversible watermarking", IEEE Transactions on Image Processing, vol. 16, no. 3, pp. 721--730.
[18]
M. Fallahpour, 2008 "Reversible image data hiding based on gradient adjusted prediction", IEICE Electron. Express, Vol. 5, No. 20, pp.870--876.
[19]
X. Wu, N. Memon, 1997 "Context-based, adaptive, lossless image coding", IEEE Trans. Commun. 45 (4) 437--444.
[20]
Xin Wang, "Laplacian Operator-Based Edge Detectors", IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 29, NO. 5, MAY 2007
[21]
L. X. Luo, Z. Y. Chen, M. Chen, et al. "Reversible image watermarking using interpolation technique". IEEE Trans. Inf. Forensics and Security, 5(1), 187--193, 2010
[22]
Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," in Proc. IEEE Int. Symp. Circuits Syst., Bangkok, Thailand, pp. 912--915, May 2003.
[23]
http://links.uwaterloo.ca/Repository.html
[24]
Carolyn L. Phillipsa, Joshua A. Anderson, Sharon C. Glotzer, "Pseudo-random number generation for Brownian Dynamics and Dissipative Particle Dynamics simulations on GPU devices", Journal of Computational Physics, Vol. 230, No. 19, pp. 7191--7201, 2011.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MoMM '13: Proceedings of International Conference on Advances in Mobile Computing & Multimedia
December 2013
599 pages
ISBN:9781450321068
DOI:10.1145/2536853
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • @WAS: International Organization of Information Integration and Web-based Applications and Services

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 December 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Data hiding
  2. Multimedia Information Systems
  3. Security and Protection
  4. Watermarking

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

MoMM '13

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 129
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media