skip to main content
survey

A Survey on Reversible Data Hiding for Uncompressed Images

Published:09 April 2024Publication History
Skip Abstract Section

Abstract

Reversible data hiding (RDH) has developed various theories and algorithms since the early 1990s. The existing works involve a large amount of specialized knowledge, making it difficult for researchers, especially primary learners, to have a good grounding in the basic ideas. In this survey, we will review the mainstream RDH algorithms in uncompressed images and analyze their unique features to provide readers with an introduction to basic topics in RDH. We analyze the most effective RDH frameworks and their common extensions. The classic techniques, including lossless compression-based RDH, difference expansion, integer transform, histogram shifting, prediction-error expansion (PEE), and their extensions, will be reviewed first. Then, three currently popular investigated schemes, i.e., multiple histograms modification, pairwise PEE, and pixel-value-ordering, are presented in detail. Four aspects of these mainstream techniques are reviewed and analyzed, including the evolution of embedding frameworks, detailed technological features, extensions, and the current state of the art. Furthermore, we look forward the possible future research based on early-age motivations.

REFERENCES

  1. [1] Alattar Adnan M.. 2004. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process. 13, 8 (2004), 11471156.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Celik Mehmet Utku, Sharma Gaurav, Tekalp Ahmet Murat, and Saber Eli. 2005. Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 14, 2 (2005), 253266.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Chang Jie, Zhu Guopu, Zhang Hongli, Zhou Yicong, Luo Xiangyang, and Wu Ligang. 2022. Reversible data hiding for color images based on adaptive 3D prediction-error expansion and double deep q-network. IEEE Trans. Circ. Syst. Vid. Technol. 32, 8 (2022), 50555067.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Chang Qi, Li Xiaolong, and Zhao Yao. 2022. Reversible data hiding for color images based on adaptive three-dimensional histogram modification. IEEE Trans. Circ. Syst. Vid. Technol. 32, 9 (2022), 57255735.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Chang Qi, Li Xiaolong, Zhao Yao, and Ni Rongrong. 2021. Adaptive pairwise prediction-error expansion and multiple histograms modification for reversible data hiding. IEEE Trans. Circ. Syst. Vid. Technol. 31, 12 (2021), 48504863.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Chen Kaimeng and Chang Chin-Chen. 2019. High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement. J. Vis. Commun. Image Represent. 58 (2019), 334344.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Chen Xianyi, Sun Xingming, Sun Huiyu, Zhou Zhili, and Zhang Jianjun. 2013. Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. J. Syst. Soft. 86, 10 (2013), 26202626.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Coltuc Dinu. 2011. Improved embedding for prediction-based reversible watermarking. IEEE Trans. Inf. Forens. Secur. 6, 3 (2011), 873882.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Coltuc Dinu and Chassery Jean-Marc. 2007. Very fast watermarking by reversible contrast mapping. IEEE Sign. Process. Lett. 14, 4 (2007), 255258.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Dragoi Ioan-Catalin and Coltuc Dinu. 2014. Local-prediction-based difference expansion reversible watermarking. IEEE Trans. Image Process. 23, 4 (2014), 17791790.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Dragoi Ioan-Catalin and Coltuc Dinu. 2015. On local prediction based reversible watermarking. IEEE Trans. Image Process. 24, 4 (2015), 12441246.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Dragoi Ioan-Catalin and Coltuc Dinu. 2016. Adaptive pairing reversible watermarking. IEEE Trans. Inf. Forens. Secur. 25, 5 (2016), 24202422.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Du Yang, Yin Zhaoxia, and Zhang Xinpeng. 2022. High capacity lossless data hiding in JPEG bitstream based on general VLC mapping. IEEE Trans. Depend. Secure Comput. 19, 2 (2022), 14201433.Google ScholarGoogle Scholar
  14. [14] Fallahpour Mehdi. 2008. Reversible image data hiding based on gradient adjusted prediction. EICE Electr. Exp. 5 (2008), 870876.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Fang Guojun, Pan Zhibin, Quan Zhou, Xinyi Gao, and Xiaoran Zhang. 2021. Multiple histogram based adaptive pairwise prediction-error modification for efficient reversible image watermarking. Inf. Sci. 581 (2021), 515535.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Fridrich Jiri, Goljan Miroslav, and Du Rui. 2001. Invertible authentication. In Proceedings of the SPIE: Security and Watermarking of Multimedia Contents III, Vol. 4314 (SPIE, Bellingham, WA, 2001), 197208.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Guan Xiquan, Feng Huamin, Zhang Weiming, Zhou Hang, Zhang Jie, and Yu Nenghai. 2020. Reversible watermarking in deep convolutional neural networks for integrity authentication. In Proceedings of the 28th ACM International Conference on Multimedia (MM’20). Association for Computing Machinery, New York, NY, 22732280.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Gui Xinlu, Li Xiaolong, and Yang Bin. 2014. A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Sign. Process. 98 (2014), 370380.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] He Junhui, Chen Junxi, Luo Weiqi, Tang Shaohua, and Huang Jiwu. 2019. A novel high-capacity reversible data hiding scheme for encrypted JPEG bitstreams. IEEE Trans. Circ. Syst. Vid. Technol. 29, 12 (2019), 35013515.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] He Junhui, Chen Junxi, and Tang Shaohua. 2020. Reversible data hiding in JPEG images based on negative influence models. IEEE Trans. Inf. Forens. Secur. 15 (2020), 21212133.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] He Wenguang and Cai Zhanchuan. 2021. Reversible data hiding based on dual pairwise prediction-error expansion. IEEE Trans. Image Process. 30 (2021), 50455055.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] He Wenguang, Xiong Gangqiang, and Wang Yaomin. 2021. Reversible data hiding based on adaptive multiple histograms modification. IEEE Trans. Infor. Forens. Secur. 16 (2021), 30003012.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] He Wenguang, Zhou Ke, Cai Jie, Wang Long, and Xiong Gangqiang. 2017. Reversible data hiding using multi-pass pixel value ordering and prediction-error expansion. J. Vis. Commun. Image Represent. 49 (2017), 351360.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Hong Wien, Horng Gwoboa, Shiu Chih-Wei, Chen Tung-Shou, and Chen Yu-Chi. 2015. Reversible steganographic method using complexity control and human visual system. Comp. J. 58 (2015), 25832594.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Hou Dongdong, Wang Haoqian, Zhang Weiming, and Yu Nenghai. 2018. Reversible data hiding in JPEG image based on DCT frequency and block selection. Sign. Process. 148 (Jul.2018), 4147.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Hou Dongdong, Zhang Weiming, Chen Kejiang, Lin Sian-Jheng, and Yu Nenghai. 2019. Reversible data hiding in color image with grayscale invariance. IEEE Trans. Circ. Syst. Vid. Technol. 29, 2 (2019), 363374.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Hou Jiacheng, Ou Bo, Tian Huawei, and Qin Zheng. 2021. Reversible data hiding based on multiple histograms modification and deep neural networks. Sign. Process. Image Commun. 92 (2021), 116118.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Hu Runwen and Xiang Shijun. 2021. CNN prediction based reversible data hiding. IEEE Sign. Process. Lett. 28 (2021), 464468.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Hu Runwen and Xiang Shijun. 2022. Reversible data hiding by using CNN prediction and adaptive embedding. IEEE Trans. Pattern Anal. Mach. Intell. 44, 12 (2022), 1019610208.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Hu Yongjian, Lee Heung-Kyu, and Li Jianwei. 2009. DE-based reversible data hiding with improved overflow location map. IEEE Trans. Circ. Syst. Video Technol. 19, 2 (2009), 250260.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Hu Yongjian, Wang Kan, and Lu Zhe-Ming. 2013. An improved VLC-based lossless data hiding scheme for JPEG images. J. Syst. Softw. 86, 8 (2013), 21662173.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Huang Fangjun, Qu Xiaochao, Kim Hyoung Joong, and Huang Jiwu. 2016. Reversible data hiding in JPEG images. IEEE Trans. Circ. Syst. Vid. Technol. 26, 9 (2016), 16101621.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Jhong Chun-Liang and Wu Hsin-Lung. 2022. Grayscale-invariant reversible data hiding based on multiple histograms modification. IEEE Trans. Circ. Syst. Vid. Technol. 32, 9 (2022), 58885901.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Jia Yujie, Yin Zhaoxia, Zhang Xinpeng, and Luo Yonglong. 2019. Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Sign. Process. 163 (2019), 238246.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Jiang Ruiqi, Zhou Hang, Zhang Weiming, and Yu Nenghai. 2018. Reversible data hiding in encrypted three-dimensional mesh models. IEEE Trans. Multimedia 20, 1 (2018), 5567.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Jung Seung-Won, Ha Le Thanh, and Ko Sung-Jea. 2011. A new histogram modification based reversible data hiding algorithm considering the human visual system. IEEE Sign. Process. Lett. 18 (2011), 9598.Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Ke Yan, Zhang Minqing, Zhang Xinpeng, Liu Jia, Su Tingting, and Yang Xiaoyuan. 2022. A reversible data hiding scheme in encrypted domain for secret image sharing based on chinese remainder theorem. IEEE Trans. Circ. Syst. Vid. Technol. 32, 4 (2022), 24692481.Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Kim Hyoung Joong, Sachnev Vasiliy, Shi Yun-Qing, Nam Jeho, and Choo Hyon-Gon. 2008. A novel difference expansion transform for reversible data embedding. IEEE Trans. Inf. Forens. Secur. 3, 3 (2008), 456465.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. [39] Kim Suah, Lussi Rolf, Qu Xiaochao, Huang Fangjun, and Kim Hyoung Joong. 2019. Reversible data hiding with automatic brightness preserving contrast enhancement. IEEE Trans. Circ. Syst. Vid. Technol. 29, 8 (2019), 22712284.Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Kim Suah, Qu Xiaochao, Sachnev Vasily, and Kim Hyoung Joong. 2019. Skewed histogram shifting for reversible data hiding using a pair of extreme predictions. IEEE Trans. Circ. Syst. Vid. Technol. 29, 11 (2019), 32363246.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. [41] Kouhi Abolfazl and Sedaaghi Mohammad Hossein. 2021. Prediction error distribution with dynamic asymmetry for reversible data hiding. Expert Syst. Appl. 184 (2021), 115475.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. [42] Lee Sang-kwang, Suh Young-ho, and Ho Yo-sung. 2006. Reversible image authentication based on watermarking. In Proceedings of the IEEE International Conference on Multimedia and Expo. IEEE, 13211324.Google ScholarGoogle ScholarCross RefCross Ref
  43. [43] Li Jingxuan and Xiang Shijun. 2022. Audio-lossless robust watermarking against desynchronization attacks. Sign. Process. 198 (2022), 108561.Google ScholarGoogle ScholarCross RefCross Ref
  44. [44] Li Wenjie, Li Xiaolong, Ni Rongrong, and Zhao Yao. 2021. PVO-based reversible data hiding using adaptive multiple histogram generation and modification. Sign. Process. Image Commun. 99 (2021), 116405.Google ScholarGoogle ScholarCross RefCross Ref
  45. [45] Li Xiaolong, Li Bin, Yang Bin, and Zeng Tieyong. 2013. General framework to histogram-shifting-based reversible data hiding. IEEE Trans. Image Process. 22, 6 (2013), 21812191.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. [46] Li Xiaolong, Li Jian, Li Bin, and Yang Bin. 2013. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Sign. Process. 93, 1 (2013), 198205.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Li Xiaolong, Yang Bin, and Zeng Tieyong. 2011. Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans. Image Process. 20, 12 (2011), 35243533.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. [48] Li Xiaolong, Zhang Weiming, Gui Xinlu, and Yang Bin. 2013. A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans. Inf. Forens. Secur. 8, 7 (2013), 10911100.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. [49] Li Xiaolong, Zhang Weiming, Gui Xinlu, and Yang Bin. 2015. Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forens. Secur. 10, 9 (Sep.2015), 20162027.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. [50] Liang Xingyun and Xiang Shijun. 2020. Robust reversible audio watermarking based on high-order difference statistics. Sign. Process. 173 (2020), 107584.Google ScholarGoogle ScholarCross RefCross Ref
  51. [51] Lin Chia-Chen, Tai Wei-Liang, and Chang Chin-Chen. 2008. Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn. 41, 12 (2008), 35823591.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. [52] Lin Zi-Xing, Peng Fei, and Long Min. 2018. A low-distortion reversible watermarking for 2D engineering graphics based on region nesting. IEEE Trans. Inf. Forens. Secur. 13, 9 (2018), 23722382.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. [53] Liu Jiayang, Zhang Weiming, Fukuchi Kazuto, Akimoto Youhei, and Sakuma Jun. 2023. Unauthorized AI cannot recognize me: Reversible adversarial example. Pattern Recogn. 134 (2023), 109048.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. [54] Long Min, Peng Fei, and Li Han-Yun. 2018. Separable reversible data hiding and encryption for HEVC video. J. Real-Time Image Process. 14 (2018), 171182.Google ScholarGoogle ScholarCross RefCross Ref
  55. [55] Luo Ting, Jiang Gangyi, Yu Mei, Zhong Caiming, Xu Haiyong, and Pan Zhiyong. 2019. Convolutional neural networks-based stereo image reversible data hiding method. J. Vis. Commun. Image Represent. 61 (2019), 6173.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. [56] Lyu Wan-Li, Cheng Lulu, and Yin Zhaoxia. 2022. High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction. Sign. Process. 201 (2022), 108686.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. [57] Ma Bin and Shi Yun-Qing. 2016. A reversible data hiding scheme based on code division multiplexing. IEEE Trans. Inf. Forens. Secur. 11, 9 (2016), 19141927.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. [58] Ma Bin, Wang Xiaoyu, Li Qi, Li Bing, Li Jian, Wang Chunpeng, and Shi Yun-Qing. 2019. Adaptive error prediction method based on multiple linear regression for reversible data hiding. J. Real-Time Image Process. 16 (2019), 821834.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. [59] Ma Kede, Zhang Weiming, Zhao Xianfeng, Yu Nenghai, and Li Fenghua. 2013. Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forens. Secur. 8, 3 (2013), 553562.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. [60] Ma Shimei, Li Xiaolong, Xiao Mengyao, Ma Bin, and Zhao Yao. 2022. Fast expansion-bins-determination for multiple histograms modification based reversible data hiding. IEEE Sign. Process. Lett. 29 (2022), 662666.Google ScholarGoogle ScholarCross RefCross Ref
  61. [61] Mao Ningxiong, Chen Fan, He Hongjie, and Yang Yaolin. 2022. Reversible data hiding based on adaptive IPVO and two-segment pairwise PEE. Sign. Process. 198 (2022), 108577.Google ScholarGoogle ScholarCross RefCross Ref
  62. [62] Ni Zhicheng, Shi Yun-Qing, Ansari Nirwan, and Su Wei. 2006. Reversible data hiding. IEEE Trans. Circ. Syst. Vid. Technol. 16, 3 (2006), 354362.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. [63] Ou Bo, Li Xiaolong, and Wang Jinwei. 2016. High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion. J. Vis. Commun. Image Represent. 39 (2016), 1223.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. [64] Ou Bo, Li Xiaolong, and Wang Jinwei. 2016. Improved PVO-based reversible data hiding: A new implementation based on multiple histograms modification. J. Vis. Commun. Image Represent. 38 (2016), 328339.Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. [65] Ou Bo, Li Xiaolong, Zhang Weiming, and Zhao Yao. 2019. Improving pairwise PEE via hybrid-dimensional histogram generation and adaptive mapping selection. IEEE Trans. Circ. Syst. Vid. Technol. 29, 7 (2019), 21762190.Google ScholarGoogle ScholarCross RefCross Ref
  66. [66] Ou Bo, Li Xiaolong, Zhao Yao, and Ni Rongrong. 2013. Reversible data hiding based on PDE predictor. J. Syst. Softw. 86, 10 (2013), 27002709.Google ScholarGoogle ScholarCross RefCross Ref
  67. [67] Ou Bo, Li Xiaolong, Zhao Yao, and Ni Rongrong. 2014. Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion. Sign. Process. Image Commun. 29, 7 (2014), 760772.Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. [68] Ou Bo, Li Xiaolong, Zhao Yao, Ni Rongrong, and Shi Yun-Qing. 2013. Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22 (Dec.2013), 50105021.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. [69] Ou Bo and Zhao Yao. 2020. High capacity reversible data hiding based on multiple histograms modification. IEEE Trans. Circ. Syst. Video Technol. 30, 8 (2020), 23292342.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. [70] Pan Zhibin, Gao Xinyi, Gao Erdun, and Fan Guojun. 2020. Adaptive complexity for pixel-value-ordering based reversible data hiding. IEEE Sign. Process. Lett. 27 (2020), 915919.Google ScholarGoogle ScholarCross RefCross Ref
  71. [71] Peng Fei, Jiang Wen-Yan, Qi Ying, Lin Zi-Xing, and Long Min. 2020. Separable robust reversible watermarking in encrypted 2D vector graphics. IEEE Trans. Circ. Syst. Vid. Technol. 30, 8 (2020), 23912405.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. [72] Peng Fei, Li Xiaolong, and Yang Bin. 2012. Adaptive reversible data hiding scheme based on integer transform. Sign. Process. 92, 1 (2012), 5462.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. [73] Peng Fei, Li Xiaolong, and Yang Bin. 2014. Improved PVO-based reversible data hiding. Digit. Sign. Process. 25 (2014), 255265.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. [74] Peng Fei, Liao Tongxin, and Long Min. 2022. A semi-fragile reversible watermarking for authenticating 3D models in dual domains based on variable direction double modulation. IEEE Trans. Circ. Syst. Vid. Technol. 32, 12 (2022), 83948408.Google ScholarGoogle ScholarCross RefCross Ref
  75. [75] Peng Fei, Long Bo, and Long Min. 2021. A general region nesting-based semi-fragile reversible watermarking for authenticating 3D mesh models. IEEE Trans. Circ. Syst. Vid. Technol. 31, 11 (2021), 45384553.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. [76] Puteaux Pauline and Puech William. 2021. A recursive reversible data hiding in encrypted images method with a very high payload. IEEE Trans. Multimedia 23 (2021), 636650.Google ScholarGoogle ScholarCross RefCross Ref
  77. [77] Qi Wenfa, Guo Sirui, and Hu Wei. 2022. Generic reversible visible watermarking via regularized graph fourier transform coding. IEEE Trans. Image Process. 31 (2022), 691705.Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. [78] Qi Wenfa, Li Xiaolong, Zhang Tong, and Guo Zongming. 2020. Optimal reversible data hiding scheme based on multiple histograms modification. IEEE Trans. Circ. Syst. Vid. Technol. 30, 8 (2020), 23002312.Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. [79] Qian Zhenxing, Xu Haisheng, Luo Xiangyang, and Zhang Xinpeng. 2019. New framework of reversible data hiding in encrypted JPEG bitstreams. IEEE Trans. Circ. Syst. Vid. Technol. 29, 2 (2019), 351362.Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. [80] Qian Zhenxing and Zhang Xinpeng. 2012. Lossless data hiding in JPEG bitstream. J. Syst. Softw. 85, 2 (2012), 309313.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. [81] Qian Zhenxing, Zhang Xinpeng, and Wang Shuozhong. 2014. Reversible data hiding in encrypted JPEG bitstream. IEEE Trans. Multimedia 16, 5 (2014), 14861491.Google ScholarGoogle ScholarCross RefCross Ref
  82. [82] Qin Chuan, He Zhihong, Yao Heng, Cao Fang, and Gao Liping. 2018. Visible watermark removal scheme based on reversible data hiding and image inpainting. Sign. Process. Image Commun. 60 (2018), 160172.Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. [83] Qin Chuan, Qian Xiaokan, and Zhang Xinpeng. 2019. An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer. Inf. Sci. 487 (2019), 176192.Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. [84] Qin Jianqiang and Huang Fangjun. 2019. Reversible data hiding based on multiple two-dimensional histograms modification. IEEE Sign. Process. Lett. 26, 6 (2019), 843847.Google ScholarGoogle ScholarCross RefCross Ref
  85. [85] Qiu Yingqiang, Qian Zhenxing, He Han, Tian Hui, and Zhang Xinpeng. 2021. Optimized lossless data hiding in JPEG bitstream and relay transfer-based extension. IEEE Trans. Circ. Syst. Vid. Technol. 31, 4 (2021), 13801394.Google ScholarGoogle ScholarCross RefCross Ref
  86. [86] Qiu Yingqiang, Qian Zhenxing, and Yu Lun. 2016. Adaptive reversible data hiding by extending the generalized integer transformation. IEEE Sign. Process. Lett. 23, 1 (2016), 130134.Google ScholarGoogle ScholarCross RefCross Ref
  87. [87] Qiu Yingqiang, Ying Qichao, Yang Yuyan, Zeng Huanqiang, Li Sheng, and Qian Zhenxing. 2022. High-capacity framework for reversible data hiding in encrypted image using pixel prediction and entropy encoding. IEEE Trans. Circ. Syst. Vid. Technol. 32, 9 (2022), 58745887.Google ScholarGoogle ScholarCross RefCross Ref
  88. [88] Qu Xiaochao and Kim Hyoung Joong. 2015. Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Sign. Process. 111 (2015), 249260.Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. [89] Rad Reza Moradi, Wong KokSheik, and Guo Jing-Ming. 2016. Reversible data hiding by adaptive group modification on histogram of prediction errors. Sign. Process. 125 (2016), 315328.Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. [90] Sachnev Vasiliy, Kim Hyoung Joong, Nam Jeho, Suresh Sundaram, and Shi Yun-Qing. 2009. Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circ. Syst. Vid. Technol. 19, 7 (2009), 989999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. [91] Shi Yun-Qing, Li Xiaolong, Zhang Xinpeng, Wu Hao-Tian, and Ma Bin. 2016. Reversible data hiding: Advances in the past two decades. IEEE Access 4 (2016), 32103237.Google ScholarGoogle ScholarCross RefCross Ref
  92. [92] Su Zhiyong, Ye Ying, Zhang Qi, Li Weiqing, and Dai Yuewei. 2018. Robust 2D engineering CAD graphics hashing for joint topology and geometry authentication via covariance-based descriptors. IEEE Trans. Inf. Forens. Secur. 13, 4 (2018), 10181030.Google ScholarGoogle ScholarCross RefCross Ref
  93. [93] Tang Xiaoxu, Wang Hongxia, and Chen Yi. 2020. Reversible data hiding based on a modified difference expansion for H.264/AVC video streams. Multimedia Tools Appl. 79 (2020), 2866128674.Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. [94] Thodi Diljith M. and Rodrguez Jeffrey J.. 2007. Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16, 3 (2007), 721730.Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. [95] Tian Jun. 2003. Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Vid. Technol. 13, 8 (2003), 890896.Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. [96] Wang Junxiang, Chen Xin, Ni Jiangqun, Mao Ningxiong, and Shi Yun-Qing. 2020. Multiple histograms-based reversible data hiding: Framework and realization. IEEE Trans. Circ. Syst. Vid. Technol. 30, 8 (2020), 23132328.Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. [97] Wang Junxiang, Mao Ningxiong, Chen Xin, Ni Jiangqun, Wang Chuntao, and Shi Yun-Qing. 2019. Multiple histograms based reversible data hiding by using FCM clustering. Sign. Process. 159 (2019), 193203.Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. [98] Wang Junxiang, Ni Jiangqun, Zhang Xing, and Shi Yun-Qing. 2017. Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans. Cyber. 47, 2 (2017), 315326.Google ScholarGoogle Scholar
  99. [99] Wang Xiang, Ding Jing, and Pei Qingqi. 2015. A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition. Inf. Sci. 310 (2015), 1635.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. [100] Wang Xiang, Li Xiaolong, and Pei Qingqi. 2020. Independent embedding domain based two-stage robust reversible watermarking. IEEE Trans. Circ. Syst. Vid. Technol. 30, 8 (2020), 24062417.Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. [101] Wang Xiang, Li Xiaolong, Yang Bin, and Guo Zongming. 2010. Efficient generalized integer transform for reversible watermarking. IEEE Sign. Process. Lett. 17, 6 (2010), 567570.Google ScholarGoogle ScholarCross RefCross Ref
  102. [102] Wang Xiaoyu, Wang Xingyuan, Ma Bin, Li Qi, and Shi Yun-Qing. 2021. High precision error prediction algorithm based on ridge regression predictor for reversible data hiding. IEEE Sign. Process. Lett. 28 (2021), 11251129.Google ScholarGoogle ScholarCross RefCross Ref
  103. [103] Weng Shaowei, Hou Tanshuai, Zhang Tiancong, and Pan Jeng-Shyang. 2023. Adaptive smoothness evaluation and multiple asymmetric histogram modification for reversible data hiding. J. Vis. Commun. Image Represent. 90 (2023), 103732.Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. [104] Weng Shaowei, Shi Yun-Qing, Hong Wien, and Yao Ye. 2019. Dynamic improved pixel value ordering reversible data hiding. Inf. Sci. 489 (2019), 136154.Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. [105] Weng Shaowei, Tan Wenlong, Ou Bo, and Pan Jeng-Shyang. 2021. Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm. Inf. Sci. 549 (Mar.2021), 1333.Google ScholarGoogle ScholarCross RefCross Ref
  106. [106] Weng Shaowei, Zhang Guohao, Pan Jeng-Shyang, and Zhou Zhili. 2017. Optimal PPVO-based reversible data hiding. J. Vis. Commun. Image Represent. 48 (2017), 317328.Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. [107] Weng Shaowei and Zhang Tiancong. 2022. Adaptive reversible data hiding for JPEG images with multiple two-dimensional histograms. J. Vis. Commun. Image Represent. 85 (2022), 103487.Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. [108] Wu Haorui, Li Xiaolong, Luo Xiangyang, Zhang Xinpeng, and Zhao Yao. 2022. General expansion-shifting model for reversible data hiding: Theoretical investigation and practical algorithm design. IEEE Trans. Circ. Syst. Vid. Technol. 32, 9 (2022), 59896001.Google ScholarGoogle ScholarCross RefCross Ref
  109. [109] Wu Hao-Tian, Cao Xin, Jia Ruoyan, and Cheung Yiu-ming. 2022. Reversible data hiding with brightness preserving contrast enhancement by two-dimensional histogram modification. IEEE Trans. Circ. Syst. Video Technol. 32, 11 (2022), 76057617.Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. [110] Wu Hao-Tian, Dugelay Jean-Luc, and Shi Yun-Qing. 2015. Reversible image data hiding with contrast enhancement. IEEE Sign. Process. Lett. 22, 1 (2015), 8185.Google ScholarGoogle ScholarCross RefCross Ref
  111. [111] Wu Youqing, Xiang Youzhi, Guo Yutang, Tang Jin, and Yin Zhaoxia. 2020. An improved reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans. Multimedia 22, 8 (2020), 19291938.Google ScholarGoogle ScholarCross RefCross Ref
  112. [112] Xiang Shijun and Ruan Guanqi. 2022. Efficient PVO-based reversible data hiding by selecting blocks with full-enclosing context. IEEE Trans. Circ. Syst. Vid. Technol. 32, 5 (2022), 28682880.Google ScholarGoogle ScholarDigital LibraryDigital Library
  113. [113] Xiao Mengyao, Li Xiaolong, Ma Bin, Zhang Xinpeng, and Zhao Yao. 2021. Efficient reversible data hiding for JPEG images with multiple histograms modification. IEEE Trans. Circ. Syst. Vid. Technol. 31, 7 (2021), 25352546.Google ScholarGoogle ScholarCross RefCross Ref
  114. [114] Xiao Mengyao, Li Xiaolong, Wang Yangyang, Zhao Yao, and Ni Rongrong. 2019. Reversible data hiding based on pairwise embedding and optimal expansion path. Sign. Process. 158 (2019), 210218.Google ScholarGoogle ScholarCross RefCross Ref
  115. [115] Xiao Mengyao, Li Xiaolong, Zhao Yao, Ma Bin, and Guo Guodong. 2023. A novel reversible data hiding scheme based on pixel-residual histogram. ACM Trans. Multimedia Comput. Commun. Appl. 19, 1s (2023), 119.Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. [116] Xiong Lizhi, Han Xiao, Yang Ching-Nung, and Shi Yun-Qing. 2022. Robust reversible watermarking in encrypted image with secure multi-party based on lightweight cryptography. IEEE Trans. Circ. Syst. Vid. Technol. 32, 1 (2022), 7591.Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. [117] Xiong Lizhi, Han Xiao, Yang Ching-Nung, and Xia Zhihua. 2023. RDH-DES: Reversible data hiding over distributed encrypted-image servers based on secret sharing. ACM Trans. Multimedia Comput. Commun. Appl. 19, 1 (2023), 119.Google ScholarGoogle ScholarDigital LibraryDigital Library
  118. [118] Xu Dawen and Liu Yong. 2022. Reversible data hiding in H.264/AVC videos based on hybrid-dimensional histogram modification. Multimedia Tools Appl. 81 (2022), 2930529319.Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. [119] Xu Dawen and Wang Rangding. 2016. Two-dimensional reversible data hiding-based approach for intra-frame error concealment in H.264/AVC. Sign. Process. Image Commun. 47 (2016), 369379.Google ScholarGoogle ScholarDigital LibraryDigital Library
  120. [120] Yang Xie and Huang Fangjun. 2022. New CNN-based predictor for reversible data hiding. IEEE Sign. Process. Lett. 29 (2022), 26272631.Google ScholarGoogle ScholarCross RefCross Ref
  121. [121] Yang Yang, Zhang Weiming, Liang Dong, and Yu Nenghai. 2016. Reversible data hiding in medical images with enhanced contrast in texture area. Digital Sign. Process. 52 (2016), 1324.Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. [122] Yang Yang, Zou Tianrui, Huang Genyan, and Zhang Weiming. 2022. A high visual quality color image reversible data hiding scheme based on B-R-G embedding principle and CIEDE2000 assessment metric. IEEE Trans. Circ. Syst. Video Technol. 32, 4 (2022), 18601874.Google ScholarGoogle ScholarCross RefCross Ref
  123. [123] Yao Yuanzhi, Zhang Weiming, Wang Hui, Zhou Hang, and Yu Nenghai. 2019. Content-adaptive reversible visible watermarking in encrypted images. Sign. Process. 164 (2019), 386401.Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. [124] Yao Yuanzhi, Zhang Weiming, and Yu Nenghai. 2016. Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams. Sign. Process. 128 (2016), 531545.Google ScholarGoogle ScholarDigital LibraryDigital Library
  125. [125] Yi Shuang and Zhou Yicong. 2019. Separable and reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans. Multimedia 21, 1 (2019), 5164.Google ScholarGoogle ScholarDigital LibraryDigital Library
  126. [126] Yin Zhaoxia, Ji Yuan, and Luo Bin. 2020. Reversible data hiding in JPEG images with multi-objective optimization. IEEE Trans. Circ. Syst. Vid. Technol. 30, 8 (2020), 23432352.Google ScholarGoogle ScholarDigital LibraryDigital Library
  127. [127] Yin Zhaoxia, Peng Yinyin, and Xiang Youzhi. 2022. Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression. IEEE Trans. Depend. Secure Comput. 19, 2 (2022), 9921002.Google ScholarGoogle Scholar
  128. [128] Yin Zhaoxia, Xiang Youzhi, and Zhang Xinpeng. 2020. Reversible data hiding in encrypted images based on multi-MSB prediction and huffman coding. IEEE Trans. Multimedia 22, 4 (2020), 874884.Google ScholarGoogle ScholarDigital LibraryDigital Library
  129. [129] Yu Chunqiang, Zhang Xianquan, Li Guoxiang, Zhan Shanhua, and Tang Zhenjun. 2022. Reversible data hiding with adaptive difference recovery for encrypted images. Inf. Sci. 584 (2022), 89110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  130. [130] Yu Chunqiang, Zhang Xianquan, Wang Dewang, and Tang Zhenjun. 2022. Reversible data hiding with pairwise PEE and 2D-PEH decomposition. Sign. Process. 196 (2022), 108527.Google ScholarGoogle ScholarDigital LibraryDigital Library
  131. [131] Zhang Cheng and Ou Bo. 2022. Reversible data hiding based on multiple adaptive two-dimensional prediction-error histograms modification. IEEE Trans. Circ. Syst. Vid. Technol. 32, 7 (2022), 41744187.Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. [132] Zhang Cheng, Ou Bo, Li Xiaolong, and Xiong Jianqin. 2023. Human visual system guided reversible data hiding based on multiple histograms modification. Comp. J. 66, 4 (2023), 888906.Google ScholarGoogle ScholarCross RefCross Ref
  133. [133] Zhang Tong, Li Xiaolong, Qi Wenfa, and Guo Zongming. 2020. Location-based PVO and adaptive pairwise modification for efficient reversible data hiding. IEEE Trans. Inf. Forens. Secur. 15 (2020), 23062319.Google ScholarGoogle ScholarDigital LibraryDigital Library
  134. [134] Zhang Tian-Cong, Hou Tan-Shuai, Weng Shao-Wei, Zou Fu-Min, Zhang Hong-Chao, and Chang Chin-Chen. 2022. Adaptive reversible data hiding with contrast enhancement based on multi-histogram modification. IEEE Trans. Circ. Syst. Vid. Technol. 32, 8 (2022), 50415054.Google ScholarGoogle ScholarDigital LibraryDigital Library
  135. [135] Zhang Weiming, Hu Xiaocheng, Li Xiaolong, and Yu Nenghai. 2013. Recursive histogram modification: Establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans. Image Process. 22, 7 (2013), 27752785.Google ScholarGoogle ScholarCross RefCross Ref
  136. [136] Zhang Xinpeng. 2011. Reversible data hiding in encrypted image. IEEE Sign. Process. Lett. 18, 4 (2011), 255258.Google ScholarGoogle ScholarCross RefCross Ref
  137. [137] Zhang Xinpeng. 2012. Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forens. Secur. 7, 2 (2012), 826832.Google ScholarGoogle ScholarDigital LibraryDigital Library
  138. [138] Zhang Xinpeng. 2013. Reversible data hiding with optimal value transfer. IEEE Trans. Multimedia 15, 2 (2013), 316325.Google ScholarGoogle ScholarDigital LibraryDigital Library
  139. [139] Zhang Xiaoya, Yao Yuanzhi, and Yu Nenghai. 2021. Convolutional neural network-driven optimal prediction for image reversible data hiding. In Proceedings of the IEEE 23rd International Workshop on Multimedia Signal Processing (MMSP’21). IEEE, 16.Google ScholarGoogle ScholarCross RefCross Ref
  140. [140] Zheng Hongchang, Wang Chuntao, Wang Junxiang, and Xiang Shijun. 2019. A new reversible watermarking scheme using the content-adaptive block size for prediction. Sign. Process. 164 (2019), 7483.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Survey on Reversible Data Hiding for Uncompressed Images

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Computing Surveys
        ACM Computing Surveys  Volume 56, Issue 7
        July 2024
        1006 pages
        ISSN:0360-0300
        EISSN:1557-7341
        DOI:10.1145/3613612
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 9 April 2024
        • Online AM: 8 February 2024
        • Accepted: 31 January 2024
        • Revised: 17 December 2023
        • Received: 6 February 2023
        Published in csur Volume 56, Issue 7

        Check for updates

        Qualifiers

        • survey
      • Article Metrics

        • Downloads (Last 12 months)361
        • Downloads (Last 6 weeks)144

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text