skip to main content
10.1145/1516241.1516298acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

DCT-based reversible data hiding scheme

Published: 15 February 2009 Publication History

Abstract

To enhance the hiding capacity of Chang et al.'s reversible DCT-based data hiding scheme, in this paper we propose another method called a layer-1 data embedding strategy. Our proposed layer-1 strategy considers some areas not used by Chang et al.'s scheme, which we call layer-2 data embedding. To achieve our objective, we applied Tian's pixel expansion method to design our layer-1 data embedding strategy. Experimental results confirm that the hiding capacity provided by combining our strategy with Chang et al.'s is higher than that provided by the Chang et al. approach alone. Moreover, the image quality of stego-images with our proposed scheme remains above 30 dB for most test images, which is better than the best image quality offered by Chang et al.'s scheme. Finally, the security and reversibility of Chang et al.'s scheme is unaffected when their layer-2 scheme is combined with our proposed layer-1 scheme.

References

[1]
M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless Generalized-LSB Data Embedding," IEEE Transactions on Image Processing, Vol. 14, No. 2, Feb. 2005, pp. 253--266.
[2]
Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai, "Reversible hiding in DCT-based compressed images," Information Sciences, Vol. 177, Issue 13, July 2007, pp. 2768--2786.
[3]
C. C. Chang, T. S. Chen and L. Z. Chung, "A Steganographic Method Based upon JPEG and Quantization Table Modification," Information Sciences, Vol. 141, 2002, pp.123--138.
[4]
C. C. Chang, J. Y. Hsiao, and C. S. Chan. "Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy," Pattern Recognition, Vol. 36, No. 7, July 2003, pp. 1595--1683.
[5]
C. C. Chang, W. L. Tai, and C. C. Lin, "A Reversible Data Hiding Scheme Based on Side Match Vector Quantization," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 10, pp. 1301--1308, 2006.
[6]
K. L. Chung, C. H. Shen and L. C. Chang, "A Novel SVD- and VQ-based Image Hiding Scheme," Pattern Recognition Letters, Vol. 22, No. 9, 2001, pp.1051--1058.
[7]
B. V. Dasarathy, "Image Data Compression: Block Truncation Coding," IEEE Computer Society Press, Los Alamitos, CA, 1995, pp. 164--173.
[8]
W. Diffie and M. E. Hellman, "Exhaustive Cryptanalysis of the NBS Data Encryption Standard," IEEE Computer, Vol. 10, 1977, pp. 74--84.
[9]
J. Fridrich, M. Goljanb, R. Du, "Invertible Authentication Watermark for JPEG Images," IEEE Int. Conf. Information Technology: Coding and Computing, Las Vegas, Nevada, April 2--4, 2001, pp. 223--227.
[10]
Guillermito, Chi-square Steganography Test Program, http://www.guillermito2.net/stegano/tools/index.html.
[11]
M. Iwata, K Miyake, and A. Shiozaki, "Digital Steganography Utilizing Features of JPEG Images," IEICE Transactions on Fundamentals, Vol. E87-A, No. 4, April 2004, pp.929--936.
[12]
H. Kobayashi, Y. Noguchi and H. Kiya, "A Method of Embedding Binary Data into JPEG Bitstreams," IEICE Transactions on Fundamentals, J83-D2, Vol. 6, 2000, pp. 1469--1476.
[13]
Y. K. Lee and L. H. Chen, "High Capacity Image Steganographic Model," Proc. of IEE International Conference on Vision, Image and Signal Processing, Vol. 147, No. 3, 2000, pp. 288--294.
[14]
Z. Ni, Y. Q. Shi, N. Ansari, W. Su, "Reversible Data Hiding," Proc.s of the 2003 International Symposium on Circuits and Systems (ISCAS '03), Vol. 2, May 2003, pp. II-912-II-915.
[15]
R. L. Rivest, A. Shamir, L. Adelman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystem," Communications of the ACM, Vol. 21, No. 2, Feb. 1978, pp. 120--126.
[16]
J. Tian, "Reversible Data Embedding Using a Difference Expansion," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, Aug. 2003 pp. 890--896.
[17]
P. Tsai, Y. C. Hu and C. C. Chang, "An Image Hiding Technique Using Block Truncation Coding," Proc. of Pacific Rim Workshop on Digital Steganography, Kitakyushu, Japan, July 2002, pp. 54--64.
[18]
R. Z. Wang, C. F. Lin and J. C. Lin, "Image Hiding by Optimal LSB Substitution and Genetic Algorithm," Pattern Recognition, Vol. 34, No. 3, 2001, pp.671--683.
[19]
G. Xuan, J. Zhu, J. Chen, Y.-Q. Shi, Z. Ni, and W. Su, "Distortionless Data Hiding Based on Integer Wavelet Transform," IEE Electronics Letters, vol. 38, no. 25, December 2002, pp. 1646--1648.

Cited By

View all
  • (2024)Reversible Data Hiding for JPEG Images Based on Quantization-Table-Modification and STC2024 IEEE 12th International Conference on Computer Science and Network Technology (ICCSNT)10.1109/ICCSNT62291.2024.10776680(50-54)Online publication date: 19-Oct-2024
  • (2024)Next-Generation Secure and Reversible Watermarking for Medical Images Using Hybrid Radon-Slantlet TransformResults in Engineering10.1016/j.rineng.2024.103008(103008)Online publication date: Oct-2024
  • (2023)An asymmetric data hiding using binary pattern detected with metaheuristics algorithmMicroprocessors and Microsystems10.1016/j.micpro.2022.10474696(104746)Online publication date: Feb-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
February 2009
704 pages
ISBN:9781605584058
DOI:10.1145/1516241
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 February 2009

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

ICUIMC '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 251 of 941 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Reversible Data Hiding for JPEG Images Based on Quantization-Table-Modification and STC2024 IEEE 12th International Conference on Computer Science and Network Technology (ICCSNT)10.1109/ICCSNT62291.2024.10776680(50-54)Online publication date: 19-Oct-2024
  • (2024)Next-Generation Secure and Reversible Watermarking for Medical Images Using Hybrid Radon-Slantlet TransformResults in Engineering10.1016/j.rineng.2024.103008(103008)Online publication date: Oct-2024
  • (2023)An asymmetric data hiding using binary pattern detected with metaheuristics algorithmMicroprocessors and Microsystems10.1016/j.micpro.2022.10474696(104746)Online publication date: Feb-2023
  • (2021)Reversible Data Hiding in JPEG Images Under Multi-Distortion MetricIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2020.304418631:10(3942-3953)Online publication date: Oct-2021
  • (2021)Dual encoding approach with sequence folding for reversible data hiding in dual stego imagesMultimedia Tools and Applications10.1007/s11042-020-10240-wOnline publication date: 16-Jan-2021
  • (2020)A Modulo Function-Based Robust Asymmetric Variable Data Hiding Using DCTSymmetry10.3390/sym1210165912:10(1659)Online publication date: 12-Oct-2020
  • (2020)Three-Layer Security for Password Protection Using RDH, AES and ECCHybrid Intelligent Systems10.1007/978-3-030-49336-3_23(230-239)Online publication date: 13-Aug-2020
  • (2019)Reversible Data Hiding in JPEG Images Using Quantized DCEntropy10.3390/e2109083521:9(835)Online publication date: 26-Aug-2019
  • (2019)A reversible data hiding scheme for JPEG images by doubling small quantized AC coefficientsMultimedia Tools and Applications10.1007/s11042-018-6651-878:9(11443-11462)Online publication date: 1-May-2019
  • (2018)Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramidMultimedia Tools and Applications10.5555/3270446.327057277:18(23673-23698)Online publication date: 1-Sep-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media