skip to main content
10.1145/1411328.1411341acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Histogram-based reversible data hiding technique using subsampling

Published: 22 September 2008 Publication History

Abstract

Reversible data hiding technique guarantees that the original cover image is completely recovered from the marked image after the hidden data are extracted. This technique can be applied in some applications such as medical imaging and law enforcement where any distortion to the original image is not acceptable. In this paper, we present a reversible data hiding algorithm that shifts the histogram of the differences between subimages obtained through subsampling and embeds secret data by modifying the pixel value. Since the subimages are highly correlated and have strong spatial correlations, it utilizes the bins whose differences have smaller magnitude in the difference histogram. Moreover, the proposed scheme prevents possible over/underflow problem and no location map is needed during the retrieval. Experimental results prove that the proposed algorithm provides high embedding capacity while keeping the distortions low. In order to demonstrate the validity of our algorithm, we compare to other histogram-based reversible data hiding algorithms in terms of capacity and visual quality.

References

[1]
M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber. Lossless generalized-lsb data embedding. IEEE Trans. Image Processing, 12(2):157--160, Feb. 2005.
[2]
W. C. Chu. Dct-based image watermarking using subsampling. IEEE Trans. Multimedia, 5(1):34--38, Mar. 2003.
[3]
J. Fridrich, M. Goljan, and R. Du. Lossless data embedding - new paradigm in digital watermarking. EURASIP Journal on Appliced Signal Processing, 2002(2):185--196, Feb. 2002.
[4]
J. H. Hwang, J. W. Kim, and J. U. Choi. A reversible watermarking based on hisgogram shifting. In IWDW 2006, LNCS 4283, pages 348--361. Springer-Verlag, Nov. 2006.
[5]
L. Kamstra and H. J. A. M. Heijmans. Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans. Image Processing, 14(12):2082--2090, Dec. 2005.
[6]
W. C. Kuo, D. J. Jiang, and Y. C. Huang. Reversible data hiding based on histogram. In ICIC 2007, LNAI 4682, pages 1152--1161. Springer-Verlag, Aug. 2007.
[7]
S. K. Lee, Y. H. Suh, and Y. S. Ho. Lossless data hiding based on histogram modification of difference images. In PCM 2004, LNCS 3333, pages 340--347. Springer-Verlag, Nov. 2004.
[8]
Z. Ni, Y. Q. Shi, N. Ansari, and W. Su. Reversible data hiding. IEEE Trans. Circuits and Systems for Video Technology, 16(3):354--362, Mar. 2006.
[9]
Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun, and X. Lin. Robust lossless image data hiding. In ICME 2004, pages 2199--2202, Jun. 2004.
[10]
H. T. Sencar, M. Ramkumar, and A. N. Akansu. Data Hiding Fundamentals and Application. Elsevier, Oxford, UK, 2004.
[11]
J. Tian. Reversible data embedding using a difference expansion. IEEE Trans. Circuits and Systems for Video Technology, 13(8):890--896, Aug. 2003.
[12]
C. D. Vleeschouwer, J. F. Delaigle, and B. Macq. Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. Multimedia, 5(1):97--105, Mar. 2003.
[13]
G. Xuan, J. Zhu, Y. Q. Shi, Z. Ni, and W. Su. Distortionless data hiding based on integer wavelet transform. IEE Electronic Letters, 38(25):1646--1648, Dec. 2002.

Cited By

View all
  • (2014)Robust Reversible Data Hiding Scheme Based on Gravity Center DifferenceInternational Journal of Digital Crime and Forensics10.4018/ijdcf.20141001026:4(14-33)Online publication date: 1-Oct-2014
  • (2013)High Performance Reversible Data Hiding for Mobile Applications and Human InteractionInternational Journal of Technology and Human Interaction10.4018/ijthi.20131001039:4(41-57)Online publication date: 1-Oct-2013
  • (2012)Reversible data hiding with context modeling, generalized expansion and boundary mapMultimedia Tools and Applications10.1007/s11042-010-0641-957:3(477-499)Online publication date: 1-Apr-2012
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and security
September 2008
242 pages
ISBN:9781605580586
DOI:10.1145/1411328
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 September 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. contents authentication
  2. histogram modification
  3. reversible data hiding
  4. subsampling
  5. watermarking

Qualifiers

  • Research-article

Conference

MM&Sec '08
Sponsor:
MM&Sec '08: Multimedia and Security Workshop
September 22 - 23, 2008
Oxford, United Kingdom

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2014)Robust Reversible Data Hiding Scheme Based on Gravity Center DifferenceInternational Journal of Digital Crime and Forensics10.4018/ijdcf.20141001026:4(14-33)Online publication date: 1-Oct-2014
  • (2013)High Performance Reversible Data Hiding for Mobile Applications and Human InteractionInternational Journal of Technology and Human Interaction10.4018/ijthi.20131001039:4(41-57)Online publication date: 1-Oct-2013
  • (2012)Reversible data hiding with context modeling, generalized expansion and boundary mapMultimedia Tools and Applications10.1007/s11042-010-0641-957:3(477-499)Online publication date: 1-Apr-2012
  • (2011)Lossless Data Hiding for JPEG PicturesJournal of Imaging Science and Technology10.2352/J.ImagingSci.Technol.2011.55.5.05050255:5(050502)Online publication date: 2011
  • (2011)Watermarking Algorithm Based on Kernel Fuzzy Clustering and Singular Value Decomposition in the Complex Wavelet Transform DomainProceedings of the 2011 International Conference of Information Technology, Computer Engineering and Management Sciences - Volume 0310.1109/ICM.2011.121(42-46)Online publication date: 24-Sep-2011
  • (2011)Reversible steganography based on side match and hit pattern for VQ-compressed imagesInformation Sciences: an International Journal10.1016/j.ins.2011.01.015181:11(2218-2230)Online publication date: 1-Jun-2011
  • (2011)Reversible data-hiding for progressive image transmissionImage Communication10.1016/j.image.2011.07.00126:10(628-645)Online publication date: 1-Nov-2011
  • (2011)Subjectively adapted high capacity lossless image data hiding based on prediction errorsMultimedia Tools and Applications10.1007/s11042-010-0486-252:2-3(513-527)Online publication date: 1-Apr-2011
  • (2010)Histogram-based reversible data hidingProceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part I10.5555/1884564.1884628(677-684)Online publication date: 21-Sep-2010
  • (2010)A subsampling and interpolation technique for reversible histogram shift data hidingProceedings of the 4th international conference on Image and signal processing10.5555/1875769.1875820(384-393)Online publication date: 30-Jun-2010
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media