DOI QR코드

DOI QR Code

An advanced reversible data hiding algorithm based on the similarity between neighboring pixels

  • Jung, Soo-Mok (Division of Computer Science & Engineering, Sahmyook University)
  • Received : 2016.02.03
  • Accepted : 2016.02.19
  • Published : 2016.02.29

Abstract

In this paper, an advanced reversible data hiding algorithm which takes the advantage of the spatial locality in image was proposed. Natural image has a spatial locality. The pixel value of a natural image is similar to the values of neighboring pixels. So, using the neighboring pixel values, it is possible to precisely predict the pixel value. Frequency increases significantly at the peak point of the difference histogram using the predicted values. Therefore, it is possible to increase the amount of data to be embedded. By using the proposed algorithm, visually high quality stego-image can be generated, the original cover image and the embedded data can be extracted from the stego-image without distortion. The embedding data into the cover image of the proposed algorithm is much lager than that of the previous algorithm. The performance of the proposed algorithm was verified by experiment. The proposed algorithm is very useful for the reversible data hiding.

Keywords

References

  1. H. C. Huang, C. M. Chu, and J. S. Pan, "The optimized copyright protection system with genetic watermarking," Soft Computing, Vol. 13, No. 4, pp. 333-343, Feb. 2009. https://doi.org/10.1007/s00500-008-0333-9
  2. Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp. 354-362, March 2006. https://doi.org/10.1109/TCSVT.2006.869964
  3. Y. C. Li, C. M. Yeh, and C. C. Chang, "Data hiding based on the similarity between neighboring pixels with reversibility," Digital Signal Processing, Vol. 20, No. 4, pp. 1116-1128, July 2010. https://doi.org/10.1016/j.dsp.2009.10.025
  4. C. L. Tsai, K. C. Fan, C. D. Chung, and T. C. Chuang, "Reversible and lossless data hiding with application in digital library," Proc. 38th Annual 2004 Int. Canahan Conf. on Security Technology, pp. 226-232, Albuquerque, New Mexico, USA, Oct. 2004.
  5. M. U. Celik, G. Sharma, A. M. Tekalp, E Saber, "Reversible data hiding," Proc. 2002 Intl. Conf. on Image Processing, Vol 3, pp. 157-160, Rochester, New York, USA, Sep. 2002.
  6. C. C. Chang, Y. P. Hsieh, and C. Y. Lin, "Lossless data embedding with high embedding capacity based on declustering for VQ-compressed images," IEEE Trans. on Information Forensics and Security, Vol. 12, No. 3, pp. 341-349, Oct. 2007.
  7. C. C. Chang, C. C. Lin, and Y. S. Hu, "An SVD oriented watermark embedding scheme with high qualities for the restored images," International Journal of Innovative Computing Information and Control, Vol. 3, No. 3, pp. 609-620, June 2007.
  8. C. C. Chang, W. L. Tai, and C. C. Lin, "A reversible data hiding scheme based on side match vector quantization," IEEE Trans. on Circuits and Systems for Video Technology, Vol. 16, No. 10, pp. 1301-1308, Oct. 2006. https://doi.org/10.1109/TCSVT.2006.882380
  9. M. Fallahpour and M.H. Sedaaghi, "High capacity lossless data hiding based on histogram modification," IEICE Electronics Express, Vo. 4, No. 7, pp. 205-210, April 2007. https://doi.org/10.1587/elex.4.205
  10. L. Kamstra, H.J.A.M. Heijmans, "Reversible data embedding into images using wavelet techniques and sorting," IEEE Trans. on Image Process, Vol. 14, No. 12, pp. 2082-2090, Dec. 2005. https://doi.org/10.1109/TIP.2005.859373
  11. K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, "Robust image-adaptive data hiding using erasure and error correction," IEEE Trans. on Image Processing, Vol. 13, No. 12, pp. 1627-1639, Dec. 2004. https://doi.org/10.1109/TIP.2004.837557
  12. H. W. Tseng and C. P. Hsieh, "Reversible data hiding based on image histogram modification," Imaging Science Journal, Vol. 56, No. 5, pp. 271-278, Oct. 2008. https://doi.org/10.1179/174313108X288103
  13. X. Li, B. Li, B. Yang, and T. Zeng, "General Framework to Histogram shifting based Reversible Data Hiding," IEEE Trans. on Image Processing, Vol. 22, No. 6, pp. 2181-2191, Feb. 2013. https://doi.org/10.1109/TIP.2013.2246179
  14. C. C. Lo, Y. C. Hu, W. L. Chen, and C. M. Wu, "Reversible Data Hiding Scheme for BTC-compressed Images based on Histogram Shifting," International Journal of Security and Its Applications, Vol. 8, No. 2, pp. 301-314, March 2014.References https://doi.org/10.14257/ijsia.2014.8.2.31
  15. E. Smirni, and G. Ciardo, "Workload-Aware Load pp. 219-232, March 2005.
  16. kdhong, "An Efficient Dynamic Workload Balancing Strategy," Journal of The Korea Society of Computer and Information, Vol. 15, No. 1, pp. 1-10, Nov. 2010. https://doi.org/10.9708/jksci.2010.15.1.001
  17. kdhong,, "C Programming Language" Korea-Press, pp.100-120, 1991.
  18. Q. Deng, Y. Luo, and J. Ge, "Dual threshold based unsupervised face image clustering," Proceedings of the 2nd International Conference on Industrial Mechatronics and Automation, pp. 436-439, 2010.
  19. SIMGRID Project, http://simgrid.gforge.inria.fr

Cited by

  1. An Advanced Reversible Data Hiding Algorithm Using Local Similarity, Curved Surface Characteristics, and Edge Characteristics in Images vol.10, pp.3, 2020, https://doi.org/10.3390/app10030836