skip to main content
research-article

A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering Graphics

Published:06 February 2023Publication History
Skip Abstract Section

Abstract

To reduce the distortion resulting from the large number of crossing quantization cells and resist steganalysis, a reversible data hiding scheme for 2D engineering graphics is put forward based on reversible dual-direction quantization index modulation (RDQIM). The quantization cell index of the host data is first computed, and its distances to the embedding cells in both the left and the right directions are calculated. After that, the data hiding is performed by modifying the data to the nearest embedding cell. To guarantee the reversibility, each quantization cell is further subdivided into three sub-cells, and the source quantization interval of the host data is marked by the index of the located sub-cell. The data extraction is accomplished by calculating the index of the quantization cell where the stego data is in. Meanwhile, the lossless recovery of the stego data is realized by combining the index of the located sub-cell and the relative distance within the sub-cell. Besides, different embedding strategies are adopted for different types of entities to achieve steganalysis-resistant ability. Experimental results and analysis show that the proposed scheme can strike a good balance among imperceptibility, semi-fragility, and steganalysis-resistant ability. Moreover, under the same conditions, the average imperceptibility and the average capacity are, respectively, improved by at least 7.487% and 41.045% compared with the existing methods.

REFERENCES

  1. [1] Awrangjeb Mohammad. 2003. An overview of reversible data hiding. In Proceedings of the 6th International Conference on Computer and Information Technology. 7579.Google ScholarGoogle Scholar
  2. [2] Mohanty Saraju P. and Bhargava Bharat K.. 2008. Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks. ACM Trans. Multim. Comput., Commun. Applic. 5, 2 (2008), 122.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Narawade Navnath and Kanphade Rajendra. 2011. Reversible watermarking: A complete review. Int. J. Comput. Sci. Telecommun. 2, 3 (2011), 4650.Google ScholarGoogle Scholar
  4. [4] Li Xiaolong, Zhang Weiming, Ou Bo, and Yang Bin. 2014. A brief review on reversible data hiding: Current techniques and future prospects. In Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP’14). IEEE, 426430.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Shi Yun-Qing, Li Xiaolong, Zhang Xinpeng, Wu Hao-Tian, and Ma Bin. 2016. Reversible data hiding: Advances in the past two decades. IEEE Access 4 (2016), 32103237.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Singh Amit Kumar. 2020. Data hiding: Current trends, innovation and potential challenges. ACM Trans. Multim. Comput., Commun. Applic. 16, 3s (2020), 116.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Chen Brian and Wornell Gregory W.. 1998. Digital watermarking and information embedding using dither modulation. In Proceedings of the IEEE 2nd Workshop on Multimedia Signal Processing. IEEE, 273278.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Chen Brian and Wornell Gregory W.. 2000. Preprocessed and postprocessed quantization index modulation methods for digital watermarking. In Security and Watermarking of Multimedia Contents II, Vol. 3971. International Society for Optics and Photonics, 4859.Google ScholarGoogle Scholar
  9. [9] Chen Brian and Wornell Gregory W.. 2001. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theor. 47, 4 (2001), 14231443.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Peng Fei and Lei Yu-Zhou. 2011. An effective reversible watermarking for 2D CAD engineering graphics based on improved QIM. Int. J. Digit. Crime Forens. 3, 1 (2011), 5369.Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Wang XiaoTong, Shao ChengYong, Xu XiaoGang, and Niu XiaMu. 2007. Reversible data-hiding scheme for 2-D vector maps based on difference expansion. IEEE Trans. Inf. Forens. Secur. 2, 3 (2007), 311320.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Peng Fei, Lei Yu-Zhou, Long Min, and Sun Xing-Ming. 2011. A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput.-aid. Des. 43, 8 (2011), 10181024.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Xiao Di, Hu Shulei, and Zheng Hongying. 2015. A high capacity combined reversible watermarking scheme for 2-D CAD engineering graphics. Multim. Tools Applic. 74, 6 (2015), 21092126.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Wang Nana, Zhang Han, and Men Chaoguang. 2014. A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates. Comput.-aid. Des. 47 (2014), 108117.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Peng Fei, Long Qin, Lin Zi-Xing, and Long Min. 2019. A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates. Multim. Tools Applic. 78, 19 (2019), 2688526905.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Geng Mingqin, Yu Puyi, Han Hongmei, Teng Zhengcen, Hu Jing, and Gao Yifu. 2012. Reversible watermarking based on invariant sum value for 2D vector maps. In Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content. IEEE, 521525.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Peng Fei, Chen Li, and Long Min. 2013. A reversible watermark scheme for 2D vector map based on reversible contrast mapping. Secur. Commun. Netw. 6, 9 (2013), 11171125.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Peng Fei and Sun Xingming. 2008. Steganalysis of data hiding for two-dimensional engineering graphics based on characters statistic. In Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 15161519.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Peng Fei and Li Honglin. 2011. A steganalysis method for 2D engineering graphics based on the statistic of geometric features. Int. J. Digit. Crime Forens. 3, 2 (2011), 3540.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Jana Biswapati. 2016. High payload reversible data hiding scheme using weighted matrix. Optik 127, 6 (2016), 33473358.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Jana Biswapati, Giri Debasis, and Mondal Shyamal Kumar. 2016. Dual-image based reversible data hiding scheme using pixel value difference expansion.Int. J. Netw. Secur. 18, 4 (2016), 633643.Google ScholarGoogle Scholar
  22. [22] Jana Biswapati, Giri Debasis, and Mondal Shyamal Kumar. 2017. Partial reversible data hiding scheme using (7, 4) Hamming code. Multim. Tools Applic. 76, 20 (2017), 2169121706.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Jana Biswapati, Giri Debasis, and Mondal Shyamal Kumar. 2018. Dual image based reversible data hiding scheme using (7, 4) Hamming code. Multim. Tools Applic. 77, 1 (2018), 763785.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Meikap Sudipta and Jana Biswapati. 2018. Directional PVO for reversible data hiding scheme with image interpolation. Multim. Tools Applic. 77, 23 (2018), 3128131311.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Jana Biswapati. 2018. Reversible data hiding scheme using sub-sampled image exploiting Lagrange’s interpolating polynomial. Multim. Tools Applic. 77, 7 (2018), 88058821.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Wang Xu, Chang Ching-Chun, Lin Chia-Chen, and Chang Chin-Chen. 2021. Privacy-preserving reversible data hiding based on quad-tree block encoding and integer wavelet transform. J. Visual Commun. Image Repres. 79 (2021), 103203.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Hu Runwen and Xiang Shijun. 2021. CNN prediction based reversible data hiding. IEEE Sig. Process. Lett. 28 (2021), 464468.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Yao Heng, Mao Fanyu, Qin Chuan, and Tang Zhenjun. 2021. Dual-JPEG-image reversible data hiding. Inf. Sci. 563 (2021), 130149.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Gao Guangyong, Tong Shikun, Xia Zhihua, Wu Bin, Xu Liya, and Zhao Zhiqiang. 2021. Reversible data hiding with automatic contrast enhancement for medical images. Sig. Process. 178 (2021), 107817.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Geng Mingqin, Zhang Yuqing, Yu Puyi, and Gao Yifu. 2013. Reversible watermarking based on prediction-error expansion for 2D vector maps. In Emerging Technologies for Information Systems, Computing, and Management. Springer, 443451.Google ScholarGoogle Scholar
  31. [31] Wang Nana. 2017. Reversible watermarking for 2D vector maps based on normalized vertices. Multim. Tools Applic. 76, 20 (2017), 2093520953.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Lin Zi-Xing, Peng Fei, and Long Min. 2018. A low-distortion reversible watermarking for 2D engineering graphics based on region nesting. IEEE Trans. Inf. Forens. Secur. 13, 9 (2018), 23722382.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Voigt Michael, Yang Bian, and Busch Christoph. 2004. Reversible watermarking of 2D-vector data. In Proceedings of the Workshop on Multimedia and Security. 160165.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Deng L. P. and Xiao He. 2010. A lossless watermarking algorithm for vector graphics based on wavelet transform. Comput. Knowl. Technol. 4 (2010).Google ScholarGoogle Scholar
  35. [35] Men Chaoguang, Cao Liujuan, and Sun Jianguo. 2010. A perception-based reversible watermarking algorithm for 2D-vector maps. Chinese High Technol. Lett. 4 (2010).Google ScholarGoogle Scholar
  36. [36] Avcibas Ismail, Memon Nasir, and Sankur Bülent. 2003. Steganalysis using image quality metrics. IEEE Trans. Image Process. 12, 2 (2003), 221229.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Lyu Siwei and Farid Hany. 2006. Steganalysis using higher-order image statistics. IEEE Trans. Inf. Forens. Secur. 1, 1 (2006), 111119.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Fridrich Jessica and Kodovsky Jan. 2012. Rich models for steganalysis of digital images. IEEE Trans. Inf. Forens. Secur. 7, 3 (2012), 868882.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. [39] Yang Ying and Ivrissimtzis Ioannis. 2014. Mesh discriminative features for 3D steganalysis. ACM Trans. Multim. Comput., Commun. Applic. 10, 3 (2014), 113.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. [40] Yang Ying, Pintus Ruggero, Rushmeier Holly, and Ivrissimtzis Ioannis. 2016. A 3D steganalytic algorithm and steganalysis-resistant watermarking. IEEE Trans. Visualiz. Comput. Graph. 23, 2 (2016), 10021013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. [41] Li Zhenyu and Bors Adrian G.. 2017. Steganalysis of 3D objects using statistics of local feature sets. Inf. Sci. 415 (2017), 8599.Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Ozer Hamza, Avcibas Ismail, Sankur Bulent, and Memon Nasir D.. 2003. Steganalysis of audio based on audio quality metrics. In Security and Watermarking of Multimedia Contents V, Vol. 5020. International Society for Optics and Photonics, 5566.Google ScholarGoogle Scholar
  43. [43] Liu Qingzhong, Sung Andrew H., and Qiao Mengyu. 2009. Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forens. Secur. 4, 3 (2009), 359368.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. [44] Liu Qingzhong, Sung Andrew H., and Qiao Mengyu. 2011. Derivative-based audio steganalysis. ACM Trans. Multim. Comput., Commun. Applic. 7, 3 (2011), 119.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. [45] Budhia Udit, Kundur Deepa, and Zourntos Takis. 2006. Digital video steganalysis exploiting statistical visibility in the temporal domain. IEEE Trans. Inf. Forens. Secur. 1, 4 (2006), 502516.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. [46] Cao Yun, Zhao Xianfeng, and Feng Dengguo. 2011. Video steganalysis exploiting motion vector reversion-based features. IEEE Sig. Process. Lett. 19, 1 (2011), 3538.Google ScholarGoogle ScholarCross RefCross Ref
  47. [47] Wang Keren, Zhao Hong, and Wang Hongxia. 2014. Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Trans. Inf. Forens. Secur. 9, 5 (2014), 741751.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. [48] Tong Deyu, Zhu Changqing, Ren Na, and Shi Wenzhong. 2019. High-capacity and robust watermarking scheme for small-scale vector data. KSII Trans. Internet Inf. Syst. 13, 12 (2019), 61906213.Google ScholarGoogle Scholar

Index Terms

  1. A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering Graphics

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 19, Issue 2
      March 2023
      540 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/3572860
      • Editor:
      • Abdulmotaleb El Saddik
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 February 2023
      • Online AM: 8 June 2022
      • Accepted: 24 May 2022
      • Revised: 29 August 2021
      • Received: 27 January 2021
      Published in tomm Volume 19, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Refereed
    • Article Metrics

      • Downloads (Last 12 months)89
      • Downloads (Last 6 weeks)7

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format