DOI QR코드

DOI QR Code

High-Performance Reversible Data Hiding with Overflow/Underflow Avoidance

  • Yang, Ching-Yu (Department of Computer Science and Information Engineering, National Penghu University of Science and Technology) ;
  • Hu, Wu-Chih (Department of Computer Science and Information Engineering, National Penghu University of Science and Technology)
  • Received : 2010.09.08
  • Accepted : 2011.01.11
  • Published : 2011.08.30

Abstract

This paper proposes reversible data hiding using minimum/maximum preserved overflow/underflow avoidance (MMPOUA). The proposed MMPOUA algorithm consists of three main steps. These steps include the minimum (or maximum) pixel fixing, pixel squeezing, and pixel isolation. The aims of pixel fixing are to keep the minimum (or maximum) pixel of a host block unchanged and prevent the occurrence of overflow/underflow. Both the pixel squeezing and pixel isolation supply hiding storage while keeping the amount of distortion low. The proposed method can avoid (or significantly reduce) the overhead bits used to overcome overflow/underflow issues. At an embedding rate of 0.15 bpp, the proposed algorithm can achieve a PSNR value of 48.52 dB, which outperforms several existing reversible data hiding schemes. Furthermore, the algorithm performed well in a variety of images, including those in which other algorithms had difficulty obtaining good hiding storage with high perceived quality.

Keywords

References

  1. F.Y. Shih, Digital Watermarking and Steganography: Fundamentals and Techniques, FL, USA: CRC Press, 2008.
  2. I.J. Cox et al., Digital Watermarking and Steganography, 2nd ed., MA, USA: Morgan Kaufmann, 2008.
  3. W.J. Chen, C.C. Chang, and T.H.N. Le, "High Payload Steganography Mechanism Using Hybrid Edge Detector," Expert Syst. Appl., vol. 37, no. 4, Apr. 2010, pp. 3292-3301. https://doi.org/10.1016/j.eswa.2009.09.050
  4. Z.G. Qu et al., "Novel Quantum Steganography with Large Payload," Optics Commun., vol. 283, no. 23, 2010, pp. 4782-4786. https://doi.org/10.1016/j.optcom.2010.06.083
  5. Y.T. Pai and S.J. Ruan, "A High Quality Robust Digital Qatermarking by Smart Distribution Technique and Effective Embedded Scheme," IEICE Trans. Fundamentals, vol. E90-A, no. 3, 2007, pp. 597-605. https://doi.org/10.1093/ietfec/e90-a.3.597
  6. C.Y. Yang et al., "A Simple Digital Watermarking by the Adaptive Bit-Labeling Scheme," Int. J. Innovative Computing, Inf. Control, vol. 6, no. 3, 2010, pp. 1401-1410.
  7. J. Tian, "Reversible Data Embedding Using a Difference Expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, 2003, pp. 890-896. https://doi.org/10.1109/TCSVT.2003.815962
  8. A.M. Alattar, "Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform," IEEE Trans. Image Process., vol. 13, no. 8, 2004, pp. 1147-1156. https://doi.org/10.1109/TIP.2004.828418
  9. S. Weng et al., "Reversible Watermarking Based on Invariability and Adjustment on Pixels Pairs," IEEE Signal Process. Lett., vol. 15, 2008, pp. 721-724. https://doi.org/10.1109/LSP.2008.2001984
  10. Y. Hu, H.K. Lee, and J. Li, "DE-Based Reversible Data Hiding with Improved Overflow Location Map," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 2, 2009, pp. 250-260. https://doi.org/10.1109/TCSVT.2008.2009252
  11. Z. Ni et al., "Reversible Data Hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, 2006, pp. 354-362. https://doi.org/10.1109/TCSVT.2006.869964
  12. C.C. Lin, W.L. Tai, and C.C. Chang, "Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images," Pattern Recognition, vol. 41, no. 12, 2008, pp. 3582-3591. https://doi.org/10.1016/j.patcog.2008.05.015
  13. W.L. Tai, C.M. Yeh, and C.C. Chang, "Reversible Data Hiding Based on Histogram Modification of Pixel Differences," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, 2009, pp. 906- 910. https://doi.org/10.1109/TCSVT.2009.2017409
  14. K.S. Kim et al., "Reversible Data Hiding Exploiting Spatial Correlation between Sub-Sampled Images," Pattern Recognition, vol. 42, no. 11, 2009, pp. 3083-3096. https://doi.org/10.1016/j.patcog.2009.04.004
  15. H.W. Yang, K.F. Hwang, and S.S. Chou, "Interleaving Max-Min Difference Histogram Shifting Data Hiding Method," J. Software, vol. 5, no. 6, 2010, pp. 615-621.
  16. D.M. Thodi and J. Rodriguez, "Expansion Embedding Techniques for Reversible Watermarking," IEEE Trans. Image Process., vol. 16, no. 3, 2007, pp. 721-730. https://doi.org/10.1109/TIP.2006.891046
  17. P. Tsai, Y.C. Hu, and H.L. Yeh, "Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting," Signal Process., vol. 89, no. 6, 2009, pp. 1129-1143. https://doi.org/10.1016/j.sigpro.2008.12.017
  18. C.H. Yang and M.H. Tsai, "Improving Histogram-Based Reversible Data Hiding by Interleaving Predictors," IET Image Process., vol. 4, no. 4, 2010, pp. 223-234. https://doi.org/10.1049/iet-ipr.2009.0316
  19. C.F. Lee, H.L. Chen, and H.K. Tso, "Embedding Capacity Raising in Reversible Data Hiding Based on Prediction of Different Expansion," J. Syst. Software, vol. 83, no. 10, 2010, pp. 1864-1872. https://doi.org/10.1016/j.jss.2010.05.078
  20. Z. Ni et al., "Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication," IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 4, 2008, pp. 497-509. https://doi.org/10.1109/TCSVT.2008.918761
  21. X.T. Zeng, L.D. Ping, and X.Z. Pan, "A Lossless Data Hiding Scheme," Pattern Recognition, vol. 43, no. 4, 2010, pp. 1656- 1667. https://doi.org/10.1016/j.patcog.2009.09.016
  22. M. Awrangjeb and M.S. Kankanhalli, "Lossless Watermarking Considering the Human Visual System," Lecture Notes Comput. Sci., vol. 2939, 2004, pp. 329-336.
  23. M. Awrangjeb and M.S. Kankanhalli, "Reversible Watermarking Using a Perceptual Model," J. Electron. Imaging, vol. 14, no. 1, 2005, pp. 013014-1-8. https://doi.org/10.1117/1.1877523
  24. P.G. Howard et al., "The Emerging JBIG2 Standard," IEEE Trans. Circuits Syst. Video Technol., vol. 8, no. 7, 1998, pp. 838-848. https://doi.org/10.1109/76.735380

Cited by

  1. High-Quality and Robust Reversible Data Hiding by Coefficient Shifting Algorithm vol.34, pp.3, 2011, https://doi.org/10.4218/etrij.12.0111.0312
  2. Reversible Data Hiding Using Two Marked Images Based on Adaptive Coefficient-Shifting Algorithm vol.2012, pp.None, 2011, https://doi.org/10.1155/2012/473896
  3. Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion vol.66, pp.2, 2011, https://doi.org/10.1007/s11227-013-0896-9
  4. High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting vol.72, pp.1, 2011, https://doi.org/10.1007/s11042-013-1369-0
  5. 히스토그램 이동과 차분을 이용한 가역 비밀 이미지 공유 기법 vol.17, pp.7, 2014, https://doi.org/10.9717/kmms.2014.17.7.849
  6. Reversible Binary Image Watermarking Method Using Overlapping Pattern Substitution vol.37, pp.5, 2011, https://doi.org/10.4218/etrij.15.0114.1058