Reversible Data Hiding Technique Using Histogram Shifting

被引:0
作者
Gupta, Juhi [1 ]
Gupta, Priya [1 ]
Gupta, S. C. [2 ]
机构
[1] Univ Delhi, Maharaja Agrasen Coll, Dept Comp Sci, Delhi, India
[2] Raj Kumar Goel Inst Tech, Ghaziabad, Uttar Pradesh, India
来源
2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM) | 2015年
关键词
Reversible data hiding (RDH); Data Security; Histogram; Watermarking;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reversible data hiding, in which the stego-media can be reversed to the original cover media exactly, has attracted increasing interests from the data hiding community. Recently, reversible data hiding (RDH) in encrypted images has gained attention form researchers, since it losslessly recovers original image from stego image after extraction of embedded data while it also protects confidentiality of image's content (Sreekuttyetal, 2014). Kyung etal in their paper "Histogram based reversible data hiding technique using subsampling" discussed that reversible data hiding technique guarantees that the original cover image is completely recovered from the marked image after the hidden data are extracted. Medical imaging and law enforcement are some of the areas where this technique can be applied as distortions to original image are not acceptable in such fields. In this paper, various reversible data hiding algorithms based on histogram shifting have been discussed. In 2006, the reversible data hiding algorithm is proposed by Ni, etal (NSAS). However, recovery of embedded secret data is not possible unless knowledge of peak point and zero point of histogram are transmitted to the receiver (Samriti Sharma etal, 2003). In order to improve this shortcoming, Hwang, etal (HKC) proposed a new robust reversible data hiding scheme but it decreased the data hiding capacity. In this paper an efficient location map scheme by using only one bit is proposed, which can improve image recovery.
引用
收藏
页码:2114 / 2119
页数:6
相关论文
共 18 条
[1]  
Awrangjeb M, 2004, LECT NOTES COMPUT SC, V2939, P581
[2]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[3]  
Celik MU, 2002, 2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, P157
[4]   Circular interpretation of histogram for reversible watermarking [J].
De Vleeschouwer, C ;
Delaigle, JF ;
Macq, B .
2001 IEEE FOURTH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2001, :345-350
[5]  
Freeman Michael, 2005, DIGITAL SLR HDB
[6]   Lossless data embedding - New paradigm in digital watermarking [J].
Fridrich, J ;
Goljan, M ;
Du, R .
EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2002, 2002 (02) :185-196
[7]   Invertible authentication [J].
Fridrich, J ;
Gojan, M ;
Du, R .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 :197-208
[8]  
Hwang J, 2006, LECT NOTES COMPUT SC, V4283, P348
[9]  
Kuo WC, 2007, LECT NOTES ARTIF INT, V4682, P1152
[10]  
Kyung-su Kim, HISTOGRAM BASED REVE