skip to main content
research-article

A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering Graphics

Published: 06 February 2023 Publication History

Abstract

To reduce the distortion resulting from the large number of crossing quantization cells and resist steganalysis, a reversible data hiding scheme for 2D engineering graphics is put forward based on reversible dual-direction quantization index modulation (RDQIM). The quantization cell index of the host data is first computed, and its distances to the embedding cells in both the left and the right directions are calculated. After that, the data hiding is performed by modifying the data to the nearest embedding cell. To guarantee the reversibility, each quantization cell is further subdivided into three sub-cells, and the source quantization interval of the host data is marked by the index of the located sub-cell. The data extraction is accomplished by calculating the index of the quantization cell where the stego data is in. Meanwhile, the lossless recovery of the stego data is realized by combining the index of the located sub-cell and the relative distance within the sub-cell. Besides, different embedding strategies are adopted for different types of entities to achieve steganalysis-resistant ability. Experimental results and analysis show that the proposed scheme can strike a good balance among imperceptibility, semi-fragility, and steganalysis-resistant ability. Moreover, under the same conditions, the average imperceptibility and the average capacity are, respectively, improved by at least 7.487% and 41.045% compared with the existing methods.

References

[1]
Mohammad Awrangjeb. 2003. An overview of reversible data hiding. In Proceedings of the 6th International Conference on Computer and Information Technology. 75–79.
[2]
Saraju P. Mohanty and Bharat K. Bhargava. 2008. Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks. ACM Trans. Multim. Comput., Commun. Applic. 5, 2 (2008), 1–22.
[3]
Navnath Narawade and Rajendra Kanphade. 2011. Reversible watermarking: A complete review. Int. J. Comput. Sci. Telecommun. 2, 3 (2011), 46–50.
[4]
Xiaolong Li, Weiming Zhang, Bo Ou, and Bin Yang. 2014. A brief review on reversible data hiding: Current techniques and future prospects. In Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP’14). IEEE, 426–430.
[5]
Yun-Qing Shi, Xiaolong Li, Xinpeng Zhang, Hao-Tian Wu, and Bin Ma. 2016. Reversible data hiding: Advances in the past two decades. IEEE Access 4 (2016), 3210–3237.
[6]
Amit Kumar Singh. 2020. Data hiding: Current trends, innovation and potential challenges. ACM Trans. Multim. Comput., Commun. Applic. 16, 3s (2020), 1–16.
[7]
Brian Chen and Gregory W. Wornell. 1998. Digital watermarking and information embedding using dither modulation. In Proceedings of the IEEE 2nd Workshop on Multimedia Signal Processing. IEEE, 273–278.
[8]
Brian Chen and Gregory W. Wornell. 2000. Preprocessed and postprocessed quantization index modulation methods for digital watermarking. In Security and Watermarking of Multimedia Contents II, Vol. 3971. International Society for Optics and Photonics, 48–59.
[9]
Brian Chen and Gregory W. Wornell. 2001. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theor. 47, 4 (2001), 1423–1443.
[10]
Fei Peng and Yu-Zhou Lei. 2011. An effective reversible watermarking for 2D CAD engineering graphics based on improved QIM. Int. J. Digit. Crime Forens. 3, 1 (2011), 53–69.
[11]
XiaoTong Wang, ChengYong Shao, XiaoGang Xu, and XiaMu Niu. 2007. Reversible data-hiding scheme for 2-D vector maps based on difference expansion. IEEE Trans. Inf. Forens. Secur. 2, 3 (2007), 311–320.
[12]
Fei Peng, Yu-Zhou Lei, Min Long, and Xing-Ming Sun. 2011. A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput.-aid. Des. 43, 8 (2011), 1018–1024.
[13]
Di Xiao, Shulei Hu, and Hongying Zheng. 2015. A high capacity combined reversible watermarking scheme for 2-D CAD engineering graphics. Multim. Tools Applic. 74, 6 (2015), 2109–2126.
[14]
Nana Wang, Han Zhang, and Chaoguang Men. 2014. A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates. Comput.-aid. Des. 47 (2014), 108–117.
[15]
Fei Peng, Qin Long, Zi-Xing Lin, and Min Long. 2019. A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates. Multim. Tools Applic. 78, 19 (2019), 26885–26905.
[16]
Mingqin Geng, Puyi Yu, Hongmei Han, Zhengcen Teng, Jing Hu, and Yifu Gao. 2012. Reversible watermarking based on invariant sum value for 2D vector maps. In Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content. IEEE, 521–525.
[17]
Fei Peng, Li Chen, and Min Long. 2013. A reversible watermark scheme for 2D vector map based on reversible contrast mapping. Secur. Commun. Netw. 6, 9 (2013), 1117–1125.
[18]
Fei Peng and Xingming Sun. 2008. Steganalysis of data hiding for two-dimensional engineering graphics based on characters statistic. In Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 1516–1519.
[19]
Fei Peng and Honglin Li. 2011. A steganalysis method for 2D engineering graphics based on the statistic of geometric features. Int. J. Digit. Crime Forens. 3, 2 (2011), 35–40.
[20]
Biswapati Jana. 2016. High payload reversible data hiding scheme using weighted matrix. Optik 127, 6 (2016), 3347–3358.
[21]
Biswapati Jana, Debasis Giri, and Shyamal Kumar Mondal. 2016. Dual-image based reversible data hiding scheme using pixel value difference expansion.Int. J. Netw. Secur. 18, 4 (2016), 633–643.
[22]
Biswapati Jana, Debasis Giri, and Shyamal Kumar Mondal. 2017. Partial reversible data hiding scheme using (7, 4) Hamming code. Multim. Tools Applic. 76, 20 (2017), 21691–21706.
[23]
Biswapati Jana, Debasis Giri, and Shyamal Kumar Mondal. 2018. Dual image based reversible data hiding scheme using (7, 4) Hamming code. Multim. Tools Applic. 77, 1 (2018), 763–785.
[24]
Sudipta Meikap and Biswapati Jana. 2018. Directional PVO for reversible data hiding scheme with image interpolation. Multim. Tools Applic. 77, 23 (2018), 31281–31311.
[25]
Biswapati Jana. 2018. Reversible data hiding scheme using sub-sampled image exploiting Lagrange’s interpolating polynomial. Multim. Tools Applic. 77, 7 (2018), 8805–8821.
[26]
Xu Wang, Ching-Chun Chang, Chia-Chen Lin, and Chin-Chen Chang. 2021. Privacy-preserving reversible data hiding based on quad-tree block encoding and integer wavelet transform. J. Visual Commun. Image Repres. 79 (2021), 103203.
[27]
Runwen Hu and Shijun Xiang. 2021. CNN prediction based reversible data hiding. IEEE Sig. Process. Lett. 28 (2021), 464–468.
[28]
Heng Yao, Fanyu Mao, Chuan Qin, and Zhenjun Tang. 2021. Dual-JPEG-image reversible data hiding. Inf. Sci. 563 (2021), 130–149.
[29]
Guangyong Gao, Shikun Tong, Zhihua Xia, Bin Wu, Liya Xu, and Zhiqiang Zhao. 2021. Reversible data hiding with automatic contrast enhancement for medical images. Sig. Process. 178 (2021), 107817.
[30]
Mingqin Geng, Yuqing Zhang, Puyi Yu, and Yifu Gao. 2013. Reversible watermarking based on prediction-error expansion for 2D vector maps. In Emerging Technologies for Information Systems, Computing, and Management. Springer, 443–451.
[31]
Nana Wang. 2017. Reversible watermarking for 2D vector maps based on normalized vertices. Multim. Tools Applic. 76, 20 (2017), 20935–20953.
[32]
Zi-Xing Lin, Fei Peng, and Min Long. 2018. A low-distortion reversible watermarking for 2D engineering graphics based on region nesting. IEEE Trans. Inf. Forens. Secur. 13, 9 (2018), 2372–2382.
[33]
Michael Voigt, Bian Yang, and Christoph Busch. 2004. Reversible watermarking of 2D-vector data. In Proceedings of the Workshop on Multimedia and Security. 160–165.
[34]
L. P. Deng and He Xiao. 2010. A lossless watermarking algorithm for vector graphics based on wavelet transform. Comput. Knowl. Technol. 4 (2010).
[35]
Chaoguang Men, Liujuan Cao, and Jianguo Sun. 2010. A perception-based reversible watermarking algorithm for 2D-vector maps. Chinese High Technol. Lett. 4 (2010).
[36]
Ismail Avcibas, Nasir Memon, and Bülent Sankur. 2003. Steganalysis using image quality metrics. IEEE Trans. Image Process. 12, 2 (2003), 221–229.
[37]
Siwei Lyu and Hany Farid. 2006. Steganalysis using higher-order image statistics. IEEE Trans. Inf. Forens. Secur. 1, 1 (2006), 111–119.
[38]
Jessica Fridrich and Jan Kodovsky. 2012. Rich models for steganalysis of digital images. IEEE Trans. Inf. Forens. Secur. 7, 3 (2012), 868–882.
[39]
Ying Yang and Ioannis Ivrissimtzis. 2014. Mesh discriminative features for 3D steganalysis. ACM Trans. Multim. Comput., Commun. Applic. 10, 3 (2014), 1–13.
[40]
Ying Yang, Ruggero Pintus, Holly Rushmeier, and Ioannis Ivrissimtzis. 2016. A 3D steganalytic algorithm and steganalysis-resistant watermarking. IEEE Trans. Visualiz. Comput. Graph. 23, 2 (2016), 1002–1013.
[41]
Zhenyu Li and Adrian G. Bors. 2017. Steganalysis of 3D objects using statistics of local feature sets. Inf. Sci. 415 (2017), 85–99.
[42]
Hamza Ozer, Ismail Avcibas, Bulent Sankur, and Nasir D. Memon. 2003. Steganalysis of audio based on audio quality metrics. In Security and Watermarking of Multimedia Contents V, Vol. 5020. International Society for Optics and Photonics, 55–66.
[43]
Qingzhong Liu, Andrew H. Sung, and Mengyu Qiao. 2009. Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forens. Secur. 4, 3 (2009), 359–368.
[44]
Qingzhong Liu, Andrew H. Sung, and Mengyu Qiao. 2011. Derivative-based audio steganalysis. ACM Trans. Multim. Comput., Commun. Applic. 7, 3 (2011), 1–19.
[45]
Udit Budhia, Deepa Kundur, and Takis Zourntos. 2006. Digital video steganalysis exploiting statistical visibility in the temporal domain. IEEE Trans. Inf. Forens. Secur. 1, 4 (2006), 502–516.
[46]
Yun Cao, Xianfeng Zhao, and Dengguo Feng. 2011. Video steganalysis exploiting motion vector reversion-based features. IEEE Sig. Process. Lett. 19, 1 (2011), 35–38.
[47]
Keren Wang, Hong Zhao, and Hongxia Wang. 2014. Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Trans. Inf. Forens. Secur. 9, 5 (2014), 741–751.
[48]
Deyu Tong, Changqing Zhu, Na Ren, and Wenzhong Shi. 2019. High-capacity and robust watermarking scheme for small-scale vector data. KSII Trans. Internet Inf. Syst. 13, 12 (2019), 6190–6213.

Cited By

View all
  • (2024)A Multi-Scale Graph Attention-Based Transformer for Occluded Person Re-IdentificationApplied Sciences10.3390/app1418827914:18(8279)Online publication date: 13-Sep-2024
  • (2024)A Frequency Reinforce and Information Mutual Embedding Network for Occluded Person Re-IdentificationProceedings of the 19th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and its Applications in Industry10.1145/3703619.3706038(1-8)Online publication date: 1-Dec-2024
  • (2024)Attack-Defending Contrastive Learning for Volumetric Medical Image Zero-WatermarkingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/370223021:2(1-23)Online publication date: 26-Dec-2024
  • Show More Cited By

Index Terms

  1. A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering Graphics

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 19, Issue 2
    March 2023
    540 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/3572860
    • Editor:
    • Abdulmotaleb El Saddik
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 February 2023
    Online AM: 08 June 2022
    Accepted: 24 May 2022
    Revised: 29 August 2021
    Received: 27 January 2021
    Published in TOMM Volume 19, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Steganalysis-resistant data hiding
    2. quantization index modulation
    3. reversible data hiding
    4. 2D engineering graphics

    Qualifiers

    • Research-article
    • Refereed

    Funding Sources

    • National Natural Science Foundation of China

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)61
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 20 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Multi-Scale Graph Attention-Based Transformer for Occluded Person Re-IdentificationApplied Sciences10.3390/app1418827914:18(8279)Online publication date: 13-Sep-2024
    • (2024)A Frequency Reinforce and Information Mutual Embedding Network for Occluded Person Re-IdentificationProceedings of the 19th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and its Applications in Industry10.1145/3703619.3706038(1-8)Online publication date: 1-Dec-2024
    • (2024)Attack-Defending Contrastive Learning for Volumetric Medical Image Zero-WatermarkingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/370223021:2(1-23)Online publication date: 26-Dec-2024
    • (2024)Adaptive Robust Watermarking for Resisting Multiple Distortions in Real ScenesIEEE Internet of Things Journal10.1109/JIOT.2024.342551911:20(33229-33246)Online publication date: 15-Oct-2024

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media