Progressive Histogram Modification for JPEG Reversible Data Hiding

被引:10
作者
Li, Fengyong [1 ,2 ]
Qi, Zhen [1 ]
Zhang, Xinpeng [3 ]
Qin, Chuan [4 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai 201306, Peoples R China
[2] Guangxi Normal Univ, Guangxi Key Lab Multisource Informat Min & Secur, Guilin 541004, Peoples R China
[3] Fudan Univ, Sch Comp Sci, Shanghai 200433, Peoples R China
[4] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
基金
中国国家自然科学基金;
关键词
Transform coding; Discrete cosine transforms; Histograms; Cloud computing; Distortion; Visualization; Medical diagnostic imaging; Reversible data hiding; JPEG image; cloud environment; distortion; histogram shifting; IMAGES; BITSTREAM;
D O I
10.1109/TCSVT.2023.3288038
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the development of social network, a large number of private JPEG images are stored in social cloud platform. Correspondingly, the platform embeds user ID or authentication labels to manage these privacy images, preventing them from being arbitrarily accessed or tampered by illegal persons. However, data embedding in JPEG domain inevitably produces irreversible modifications to DCT coefficients, thus resulting in obvious or even serious distortion in the host JPEG images. To address this problem, this paper proposes an efficient JPEG reversible data hiding (RDH) method by constructing progressive two-dimensional histogram mappings. We firstly design distortion function to calculate the cost of each DCT frequency band, and then sort them to build histogram mapping containing a series of coefficient pairs. Subsequently, a progressive mapping mechanism is introduced to maintain most of AC coefficients unchanged. According to the given capacity, this mechanism can adaptively generate an optimum two-dimensional histogram mapping to embed secret messages. Our scheme can achieve an effective balance among embedding capacity, visual quality of the marked image and file size expansion, while keeping high cost-performance complexity. Extensive experiments demonstrate that our method outperforms existing JPEG RDH schemes in terms of visual quality and file size increment of the marked image, and provides an efficient solution for the confidentiality and security access problem of sensitive private image in cloud environment.
引用
收藏
页码:1241 / 1254
页数:14
相关论文
共 36 条
[1]  
[Anonymous], Kodak Database
[2]  
[Anonymous], BOSSBASE DATABASE
[3]  
[Anonymous], UCID Database
[4]  
[Anonymous], USC-SIPI Database
[5]   Reversible hiding in DCT-based compressed images [J].
Chang, Chin-Chen ;
Lin, Chia-Chen ;
Tseng, Chun-Sen ;
Tai, Wei-Liang .
INFORMATION SCIENCES, 2007, 177 (13) :2768-2786
[6]   High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping [J].
Du, Yang ;
Yin, Zhaoxia ;
Zhang, Xinpeng .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) :1420-1433
[7]   Lossless data embedding for all image formats [J].
Fridrich, J ;
Goljan, M ;
Du, R .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 :572-583
[8]   Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System [J].
Ge, Xinrui ;
Yu, Jia ;
Hao, Rong ;
Lv, Haibin .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (08) :5573-5583
[9]   Improved block ordering and frequency selection for reversible data hiding in JPEG images [J].
He, Junhui ;
Pan, Xinlu ;
Wu, Hao-tian ;
Tang, Shaohua .
SIGNAL PROCESSING, 2020, 175
[10]   Reversible Data Hiding in JPEG Images Based on Negative Influence Models [J].
He, Junhui ;
Chen, Junxi ;
Tang, Shaohua .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :2121-2133