Abstract
To reduce the distortion resulting from the large number of crossing quantization cells and resist steganalysis, a reversible data hiding scheme for 2D engineering graphics is put forward based on reversible dual-direction quantization index modulation (RDQIM). The quantization cell index of the host data is first computed, and its distances to the embedding cells in both the left and the right directions are calculated. After that, the data hiding is performed by modifying the data to the nearest embedding cell. To guarantee the reversibility, each quantization cell is further subdivided into three sub-cells, and the source quantization interval of the host data is marked by the index of the located sub-cell. The data extraction is accomplished by calculating the index of the quantization cell where the stego data is in. Meanwhile, the lossless recovery of the stego data is realized by combining the index of the located sub-cell and the relative distance within the sub-cell. Besides, different embedding strategies are adopted for different types of entities to achieve steganalysis-resistant ability. Experimental results and analysis show that the proposed scheme can strike a good balance among imperceptibility, semi-fragility, and steganalysis-resistant ability. Moreover, under the same conditions, the average imperceptibility and the average capacity are, respectively, improved by at least 7.487% and 41.045% compared with the existing methods.
- [1] . 2003. An overview of reversible data hiding. In Proceedings of the 6th International Conference on Computer and Information Technology. 75–79.Google Scholar
- [2] . 2008. Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks. ACM Trans. Multim. Comput., Commun. Applic. 5, 2 (2008), 1–22.Google ScholarDigital Library
- [3] . 2011. Reversible watermarking: A complete review. Int. J. Comput. Sci. Telecommun. 2, 3 (2011), 46–50.Google Scholar
- [4] . 2014. A brief review on reversible data hiding: Current techniques and future prospects. In Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP’14). IEEE, 426–430.Google ScholarCross Ref
- [5] . 2016. Reversible data hiding: Advances in the past two decades. IEEE Access 4 (2016), 3210–3237.Google ScholarCross Ref
- [6] . 2020. Data hiding: Current trends, innovation and potential challenges. ACM Trans. Multim. Comput., Commun. Applic. 16, 3s (2020), 1–16.Google ScholarDigital Library
- [7] . 1998. Digital watermarking and information embedding using dither modulation. In Proceedings of the IEEE 2nd Workshop on Multimedia Signal Processing. IEEE, 273–278.Google ScholarCross Ref
- [8] . 2000. Preprocessed and postprocessed quantization index modulation methods for digital watermarking. In Security and Watermarking of Multimedia Contents II, Vol. 3971. International Society for Optics and Photonics, 48–59.Google Scholar
- [9] . 2001. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theor. 47, 4 (2001), 1423–1443.Google ScholarDigital Library
- [10] . 2011. An effective reversible watermarking for 2D CAD engineering graphics based on improved QIM. Int. J. Digit. Crime Forens. 3, 1 (2011), 53–69.Google ScholarCross Ref
- [11] . 2007. Reversible data-hiding scheme for 2-D vector maps based on difference expansion. IEEE Trans. Inf. Forens. Secur. 2, 3 (2007), 311–320.Google ScholarDigital Library
- [12] . 2011. A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput.-aid. Des. 43, 8 (2011), 1018–1024.Google ScholarCross Ref
- [13] . 2015. A high capacity combined reversible watermarking scheme for 2-D CAD engineering graphics. Multim. Tools Applic. 74, 6 (2015), 2109–2126.Google ScholarDigital Library
- [14] . 2014. A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates. Comput.-aid. Des. 47 (2014), 108–117.Google ScholarDigital Library
- [15] . 2019. A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates. Multim. Tools Applic. 78, 19 (2019), 26885–26905.Google ScholarDigital Library
- [16] . 2012. Reversible watermarking based on invariant sum value for 2D vector maps. In Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content. IEEE, 521–525.Google ScholarCross Ref
- [17] . 2013. A reversible watermark scheme for 2D vector map based on reversible contrast mapping. Secur. Commun. Netw. 6, 9 (2013), 1117–1125.Google ScholarCross Ref
- [18] . 2008. Steganalysis of data hiding for two-dimensional engineering graphics based on characters statistic. In Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 1516–1519.Google ScholarDigital Library
- [19] . 2011. A steganalysis method for 2D engineering graphics based on the statistic of geometric features. Int. J. Digit. Crime Forens. 3, 2 (2011), 35–40.Google ScholarCross Ref
- [20] . 2016. High payload reversible data hiding scheme using weighted matrix. Optik 127, 6 (2016), 3347–3358.Google ScholarCross Ref
- [21] . 2016. Dual-image based reversible data hiding scheme using pixel value difference expansion.Int. J. Netw. Secur. 18, 4 (2016), 633–643.Google Scholar
- [22] . 2017. Partial reversible data hiding scheme using (7, 4) Hamming code. Multim. Tools Applic. 76, 20 (2017), 21691–21706.Google ScholarDigital Library
- [23] . 2018. Dual image based reversible data hiding scheme using (7, 4) Hamming code. Multim. Tools Applic. 77, 1 (2018), 763–785.Google ScholarDigital Library
- [24] . 2018. Directional PVO for reversible data hiding scheme with image interpolation. Multim. Tools Applic. 77, 23 (2018), 31281–31311.Google ScholarDigital Library
- [25] . 2018. Reversible data hiding scheme using sub-sampled image exploiting Lagrange’s interpolating polynomial. Multim. Tools Applic. 77, 7 (2018), 8805–8821.Google ScholarDigital Library
- [26] . 2021. Privacy-preserving reversible data hiding based on quad-tree block encoding and integer wavelet transform. J. Visual Commun. Image Repres. 79 (2021), 103203.Google ScholarDigital Library
- [27] . 2021. CNN prediction based reversible data hiding. IEEE Sig. Process. Lett. 28 (2021), 464–468.Google ScholarCross Ref
- [28] . 2021. Dual-JPEG-image reversible data hiding. Inf. Sci. 563 (2021), 130–149.Google ScholarCross Ref
- [29] . 2021. Reversible data hiding with automatic contrast enhancement for medical images. Sig. Process. 178 (2021), 107817.Google ScholarCross Ref
- [30] . 2013. Reversible watermarking based on prediction-error expansion for 2D vector maps. In Emerging Technologies for Information Systems, Computing, and Management. Springer, 443–451.Google Scholar
- [31] . 2017. Reversible watermarking for 2D vector maps based on normalized vertices. Multim. Tools Applic. 76, 20 (2017), 20935–20953.Google ScholarDigital Library
- [32] . 2018. A low-distortion reversible watermarking for 2D engineering graphics based on region nesting. IEEE Trans. Inf. Forens. Secur. 13, 9 (2018), 2372–2382.Google ScholarDigital Library
- [33] . 2004. Reversible watermarking of 2D-vector data. In Proceedings of the Workshop on Multimedia and Security. 160–165.Google ScholarDigital Library
- [34] . 2010. A lossless watermarking algorithm for vector graphics based on wavelet transform. Comput. Knowl. Technol. 4 (2010).Google Scholar
- [35] . 2010. A perception-based reversible watermarking algorithm for 2D-vector maps. Chinese High Technol. Lett. 4 (2010).Google Scholar
- [36] . 2003. Steganalysis using image quality metrics. IEEE Trans. Image Process. 12, 2 (2003), 221–229.Google ScholarDigital Library
- [37] . 2006. Steganalysis using higher-order image statistics. IEEE Trans. Inf. Forens. Secur. 1, 1 (2006), 111–119.Google ScholarDigital Library
- [38] . 2012. Rich models for steganalysis of digital images. IEEE Trans. Inf. Forens. Secur. 7, 3 (2012), 868–882.Google ScholarDigital Library
- [39] . 2014. Mesh discriminative features for 3D steganalysis. ACM Trans. Multim. Comput., Commun. Applic. 10, 3 (2014), 1–13.Google ScholarDigital Library
- [40] . 2016. A 3D steganalytic algorithm and steganalysis-resistant watermarking. IEEE Trans. Visualiz. Comput. Graph. 23, 2 (2016), 1002–1013.Google ScholarDigital Library
- [41] . 2017. Steganalysis of 3D objects using statistics of local feature sets. Inf. Sci. 415 (2017), 85–99.Google ScholarCross Ref
- [42] . 2003. Steganalysis of audio based on audio quality metrics. In Security and Watermarking of Multimedia Contents V, Vol. 5020. International Society for Optics and Photonics, 55–66.Google Scholar
- [43] . 2009. Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forens. Secur. 4, 3 (2009), 359–368.Google ScholarDigital Library
- [44] . 2011. Derivative-based audio steganalysis. ACM Trans. Multim. Comput., Commun. Applic. 7, 3 (2011), 1–19.Google ScholarDigital Library
- [45] . 2006. Digital video steganalysis exploiting statistical visibility in the temporal domain. IEEE Trans. Inf. Forens. Secur. 1, 4 (2006), 502–516.Google ScholarDigital Library
- [46] . 2011. Video steganalysis exploiting motion vector reversion-based features. IEEE Sig. Process. Lett. 19, 1 (2011), 35–38.Google ScholarCross Ref
- [47] . 2014. Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Trans. Inf. Forens. Secur. 9, 5 (2014), 741–751.Google ScholarDigital Library
- [48] . 2019. High-capacity and robust watermarking scheme for small-scale vector data. KSII Trans. Internet Inf. Syst. 13, 12 (2019), 6190–6213.Google Scholar
Index Terms
- A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering Graphics
Recommendations
High-Performance Reversible Data Hiding
This paper proposes a high-performance reversible data hiding algorithm based on the block difference histogram of a cover image. If a message is to be embedded into an image, the difference of the block at the maximum point is increased by 1 or left ...
Reversible data hiding scheme with high payload for JPEG images
ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and CommunicationIn 2008 Lin et al. proposed a reversible steganographic method with a high payload for JPEG images. Because modifying the quantized DCT coefficients may lead to serious image distortion, Lin et al. embedded the secrets into the middle frequency of the ...
High-Performance Reversible Data Hiding
This paper proposes a high-performance reversible data hiding algorithm based on the block difference histogram of a cover image. If a message is to be embedded into an image, the difference of the block at the maximum point is increased by 1 or left ...
Comments