Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A Novel Reversible Data Hiding Scheme Based on Pixel-Residual Histogram

Authors Info & Claims
Published:23 January 2023Publication History
Skip Abstract Section

Abstract

Prediction-error expansion (PEE) is the most popular reversible data hiding (RDH) technique due to its efficient capacity-distortion tradeoff. With the generated prediction-error histogram (PEH) and adaptively selected expansion bins, the image redundancy is well exploited by PEE. However, for the most widely used rhombus predictor, the rounding operation which groups different prediction-errors into one value is completely unnecessary. The embedding can be extended to a general case by removing the rounding operation, and more histogram bins can be derived for expansion with a new mapping mechanism. Therefore, in this article, instead of pixel prediction-error, we propose to compute the pixel residuals without the rounding operation, and a new embedding mechanism based on pixel-residual histogram (PRH) modification is devised. In PRH, four bins correspond to one bin in PEH. Then, different from the one-to-one mapping between the prediction-error and pixel modification, a four-to-one mapping between the pixel-residual and pixel modification is established, and the performance is optimized by adaptively selecting four expansion bin pairs for embedding. Since more modification selections are considered, better performance can be obtained. Moreover, the proposed scheme is extended to the two-dimensional (2D) histogram and multiple histograms based embedding, and the performance is further enhanced. The superiority of the proposed method is experimentally verified by comparing it with some state-of-the-art works.

REFERENCES

  1. [1] Alattar Adnan M.. 2004. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing 13, 8(2004), 11471156.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Bhowmik Deepayan and Abhayaratne Charith. 2019. Embedding distortion analysis in wavelet-domain watermarking. ACM Transactions on Multimedia Computing, Communications, and Applications 15, 4(2019), 24 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Celik Mehmet Utku, Sharma Gaurav, Tekalp Ahmet Murat, and Saber Eli. 2005. Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing 14, 2 (2005), 253266.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Chen H., Ni J., Hong W., and Chen T.. 2017. High-Fidelity reversible data hiding using directionally enclosed prediction. IEEE Signal Processing Letters 24, 5 (2017), 574578.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Coatrieux Gouenou, Guillou Clara, Cauvin Jean-Michel, and Roux Christian. 2009. Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Transactions on Information Technology in Biomedicine 13, 2 (2009), 158165.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Coatrieux Gouenou, Pan Wei, Cuppens-Boulahia Nora, Cuppens Frederic, and Roux Christian. 2013. Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Transactions on Information Forensics and Security 8, 1(2013), 111120.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Cox Ingemar, Miller Matthew, Bloom Jeffrey, Fridrich Jessica, and Kalker Ton. 2007. Digital Watermarking and Steganography, 2nd Edition. Morgan Kaufmann Publishers Inc., San Francisco, CA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Dragoi I. C. and Coltuc D.. 2014. Local-prediction-based difference expansion reversible watermarking. IEEE Transactions on Image Processing 23, 4 (2014), 1779.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Fridrich J.. 2009. Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge, U.K.: Cambridge University Press.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Fridrich J., Goljan M., and Du R.. 2001. Invertible authentication. In Proceedings of the Security and Watermarking of Multimedia Contents III.197208.Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] He W. and Cai Z.. 2020. An insight into pixel value ordering prediction-based prediction-error expansion. IEEE Transactions on Information Forensics and Security 15 (2020), 38593871.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Hu Yongjian, Lee Heung Kyu, and Li Jianwei. 2009. DE-Based reversible data hiding with improved overflow location map. IEEE Transactions on Circuits and Systems for Video Technology 19, 2 (2009), 250260.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Huang Fangjun, Qu Xiaochao, Kim Hyoung Joong, and Huang Jiwu. 2016. Reversible data hiding in JPEG images. IEEE Transactions on Circuits and Systems for Video Technology 26, 9 (2016), 16101621.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Hwang Hee Joon, Kim Hyoung-Joong, Sachnev Vasiliy, and Joo Sang-Hyun. 2010. Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting. TIIS 4, 4 (2010), 655670.Google ScholarGoogle Scholar
  15. [15] Kim Suah, Qu Xiaochao, Sachnev Vasily, and Kim Hyoung Joong. 2019. Skewed histogram shifting for reversible data hiding using a pair of extreme predictions. IEEE Transactions on Circuits and Systems for Video Technology 29, 11 (2019), 32363246.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Li Xiaolong, Li Bin, Yang Bin, and Zeng Tieyong. 2013. General framework to histogram-shifting-based reversible data hiding. IEEE Transactions on Image Processing 22, 6(2013), 21812191.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Li X., Li J., Li B., and Yang B.. 2013. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Processing 93, 1 (2013), 198205.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Li Xiaolong, Zhang Weiming, Gui Xinlu, and Yang Bin. 2015. Efficient reversible data hiding based on multiple histograms modification. IEEE Transactions on Information Forensics and Security 10, 9 (2015), 20162027.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Luo Lixin, Chen Zhenyong, Chen Ming, Zeng Xiao, and Xiong Zhang. 2010. Reversible image watermarking using interpolation technique. IEEE Transactions on Information Forensics and Security 5, 1 (2010), 187193.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Ma B., Chang L., Wang C., Li J., Wang X., and Shi Y. Q.. 2020. Robust image watermarking using invariant accurate polar harmonic Fourier moments and chaotic mapping. Signal Processing 172 (2020), 107544.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Ma B. and Shi Y. Q.. 2016. A reversible data hiding scheme based on code division multiplexing. IEEE Transactions on Information Forensics and Security 11, 9 (2016), 19141927.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Ma Bin, Wang Xiaoyu, Li Bing, and Shi Yun-Qing. 2018. A multiple linear regression based high-accuracy error prediction algorithm for reversible data hiding. In Proceedings of the IWDW (2018). Springer, 195205.Google ScholarGoogle Scholar
  23. [23] Naskar Ruchira and Chakraborty Rajat Subhra. 2013. A generalized tamper localization approach for reversible watermarking algorithms. ACM Transactions on Multimedia Computing, Communications, and Applications 9, 3(2013), 22 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Ni Zhicheng, Shi Yun-Qing, Ansari N., and Su Wei. 2006. Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology 16, 3 (2006), 354362.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Ni Z., Shi Y. Q., Ansari N., and Su W.. 2006. Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology 16, 3 (2006), 354362.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Ou B., Li X., Zhang W., and Zhao Y.. 2019. Improving pairwise PEE via hybrid-dimensional histogram generation and adaptive mapping selection. IEEE Transactions on Circuits and Systems for Video Technology 29, 7 (2019), 21762190.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Ou Bo, Li Xiaolong, Zhao Yao, Ni Rongrong, and Shi Yun-Qing. 2013. Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Transactions on Image Processing 22, 12 (2013), 50105021.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Ou Bo and Zhao Yao. 2020. High capacity reversible data hiding based on multiple histograms modification. IEEE Transactions on Circuits and Systems for Video Technology 30, 8 (2020), 23292342.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Peng Fei, Li Xiaolong, and Yang Bin. 2012. Adaptive reversible data hiding scheme based on integer transform. Signal Processing 92, 1 (2012), 5462.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Qi W., Li X., Zhang T., and Guo Z.. 2020. Optimal reversible data hiding scheme based on multiple histograms modification. IEEE Transactions on Circuits and Systems for Video Technology 30, 8 (2020), 23002312.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Qian Zhenxing, Xu Haisheng, Luo Xiangyang, and Zhang Xinpeng. 2019. New framework of reversible data hiding in encrypted JPEG bitstreams. IEEE Transactions on Circuits and Systems for Video Technology 29, 2 (2019), 351362.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Sachnev Vasiliy, Kim Hyoung Joong, Nam Jeho, Suresh Sundaram, and Shi Yun Qing. 2009. Reversible watermarking algorithm using sorting and prediction. IEEE Transactions on Circuits and Systems for Video Technology 19, 7(2009), 989999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Shi Y. Q., Li X., Zhang X., Wu H. T., and Ma B.. 2016. Reversible data hiding: Advances in the past two decades. IEEE Access 4 (2016), 32103237.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Database The USC-SIPI Image. 1977. [online]. Retrieved from https://sipi.usc.edu/.Google ScholarGoogle Scholar
  35. [35] Thodi Diljith M. and Rodriguez Jeffrey J.. 2007. Expansion embedding techniques for reversible watermarking. IEEE Transactions on Image Processing 16, 3(2007), 721730.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Tian J.. 2003. Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology 13, 8(2003), 890896.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Wang Junxiang, Chen Xin, Ni Jiangqun, Mao Ningxiong, and Shi Yunqing. 2020. Multiple histograms-based reversible data hiding: Framework and realization. IEEE Transactions on Circuits and Systems for Video Technology 30, 8 (2020), 23132328.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Wang Junxiang, Ni Jiangqun, Zhang Xing, and Shi Yun Qing. 2017. Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Transactions on Cybernetics 47, 2 (2017), 315326.Google ScholarGoogle Scholar
  39. [39] Wang Xiang, Li Xiaolong, Yang Bin, and Guo Zongming. 2010. Efficient generalized integer transform for reversible watermarking. IEEE Signal Processing Letters 17, 6(2010), 567570.Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Weng S., Zhao Y., Pan J. S., and Ni R.. 2008. Reversible watermarking based on invariability and adjustment on pixel pairs. IEEE Signal Processing Letters 15 (2008), 721724.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Xiang Shijun and Ruan Guanqi. 2021. Efficient PVO-Based reversible data hiding by selecting blocks with full-enclosing context. IEEE Transactions on Circuits and Systems for Video Technology (2021), to be published.Google ScholarGoogle Scholar
  42. [42] Xiao Mengyao, Li Xiaolong, Ma Bin, Zhang Xinpeng, and Zhao Yao. 2021. Efficient reversible data hiding for JPEG images with multiple histograms modification. IEEE Transactions on Circuits and Systems for Video Technology 31, 7 (2021), 25352546.Google ScholarGoogle ScholarCross RefCross Ref
  43. [43] Yang Hong-Ying, Wang Xiang-Yang, Niu Pan-Pan, and Wang Ai-Long. 2015. Robust color image watermarking using geometric invariant quaternion polar harmonic transform. ACM Transactions on Multimedia Computing, Communications, and Applications 11, 3(2015), 26 pages. .Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. [44] Yin Zhaoxia, Ji Yuan, and Luo Bin. 2020. Reversible data hiding in JPEG images with multi-objective optimization. IEEE Transactions on Circuits and Systems for Video Technology 30, 8 (2020), 23432352.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. [45] Zhang Tong, Li Xiaolong, Qi Wenfa, and Guo Zongming. 2020. Location-Based PVO and adaptive pairwise modification for efficient reversible data hiding. IEEE Transactions on Information Forensics and Security 15 (2020), 23062319.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. [46] Zhang Xinpeng. 2013. Reversible data hiding with optimal value transfer. IEEE Transactions on Multimedia 15, 2 (2013), 316325.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Zhang Xinpeng, Long Jing, Wang Zichi, and Cheng Hang. 2016. Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits and Systems for Video Technology 26, 9 (2016), 16221631.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. [48] Zhang Y., Qin C., Zhang W., Liu F., and Luo X.. 2018. On the fault-tolerant performance for a class of robust image steganography. Signal Processing 146 (2018), 99111.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A Novel Reversible Data Hiding Scheme Based on Pixel-Residual Histogram

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 19, Issue 1s
      February 2023
      504 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/3572859
      • Editor:
      • Abdulmotaleb El Saddik
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 January 2023
      • Online AM: 12 May 2022
      • Accepted: 28 April 2022
      • Revised: 26 April 2022
      • Received: 14 March 2022
      Published in tomm Volume 19, Issue 1s

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format