Reversible data hiding scheme based on exploiting modification direction with two steganographic images

被引:149
作者
Qin, Chuan [1 ]
Chang, Chin-Chen [2 ,3 ]
Hsu, Tai-Jung [4 ]
机构
[1] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[4] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 62102, Taiwan
基金
上海市自然科学基金;
关键词
Reversible data hiding; Exploiting modification direction; Hiding capacity; Image quality; DIFFERENCE EXPANSION; WATERMARKING;
D O I
10.1007/s11042-014-1894-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a novel data hiding scheme with reversibility based on exploiting modification direction (EMD). One cover image is first chosen and prepared to generate two visually similar steganographic images. During the secret embedding, the pixels in the first steganographic image are modified by no more than one gray level to embed secret data using the traditional EMD method, while the pixels in the second steganographic image are adaptively modified through referring to the first steganographic image without any confusions in image recovery process. On the receiver side, secret data can be extracted easily and the original cover image can also be recovered from the two steganographic images correctly. Experimental results demonstrate that our scheme can achieve high hiding capacity and satisfactory visual quality.
引用
收藏
页码:5861 / 5872
页数:12
相关论文
共 17 条
[1]   Reversible watermark using the difference expansion of a generalized integer transform [J].
Alattar, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (08) :1147-1156
[2]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[3]   Low Distortion Transform for Reversible Watermarking [J].
Coltuc, Dinu .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (01) :412-417
[4]   Data encryption: A Nonmathematical approach [J].
Highland, HJ .
COMPUTERS & SECURITY, 1997, 16 (05) :369-386
[5]  
Ker AD, 2004, LECT NOTES COMPUT SC, V3200, P97
[6]   Embedding capacity raising in reversible data hiding based on prediction of difference expansion [J].
Lee, Chin-Feng ;
Chen, Hsing-Ling ;
Tso, Hao-Kuan .
JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (10) :1864-1872
[7]   General Framework to Histogram-Shifting-Based Reversible Data Hiding [J].
Li, Xiaolong ;
Li, Bin ;
Yang, Bin ;
Zeng, Tieyong .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2013, 22 (06) :2181-2191
[8]   LSB matching revisited [J].
Mielikainen, J .
IEEE SIGNAL PROCESSING LETTERS, 2006, 13 (05) :285-287
[9]   Reversible data hiding [J].
Ni, ZC ;
Shi, YQ ;
Ansari, N ;
Su, W .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2006, 16 (03) :354-362
[10]   An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism [J].
Qin, Chuan ;
Chang, Chin-Chen ;
Huang, Ying-Hsuan ;
Liao, Li-Ting .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2013, 23 (07) :1109-1118