A reversible data hiding scheme based on graph neighbourhood degree

被引:8
作者
Dogan, Sengul [1 ]
机构
[1] Firat Univ, Technol Fac, Digital Forens Engn, Elazig, Turkey
关键词
Reversible data hiding; information security; graph theory; image processing; PREDICTION-ERROR EXPANSION; IMAGES; PIXEL; INFORMATION; TREE;
D O I
10.1080/0952813X.2016.1259264
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The perceptibility and capacity are two vital criteria of data hiding scheme. Concerning these criteria, data hiding algorithm used images as cover object based on the graph theory is proposed in this study. Images are quantised according to determined range and then quantised images are divided into nxn sized blocks. Each block is accepted as a graph and vertexes which have the same quantisation value are accepted as neighbours. Neighbourhood degrees of vertexes are calculated and indices of vertexes that have a neighbourhood degree over the threshold value are stored in the codebook. Pixel values indicated by these indices in the codebook are used for data hiding process. In this algorithm, there is no need for edge extraction because of hiding data to pixels containing vertexes having high neighbourhood degrees. The proposed method is compared with similar methods in literature in terms of the perceptibility and capacity. More successful results are provided than the others.
引用
收藏
页码:741 / 753
页数:13
相关论文
共 34 条
[1]   Knowledge hiding from tree and graph databases [J].
Abul, Osman ;
Gokce, Harun .
DATA & KNOWLEDGE ENGINEERING, 2012, 72 :148-171
[2]   Analysis of blind data hiding using discrete cosine transform phase modulation [J].
Alturki, Faisal T. ;
Almutairi, All F. ;
Mersereauu, Russell M. .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2007, 22 (04) :347-362
[3]  
Bondy JA., 1976, GRAPH THEORY APPL, DOI [10.1007/978-1-349-03521-2, DOI 10.1007/978-1-349-03521-2]
[4]   Information hiding based on search-order coding for VQ indices [J].
Chang, CC ;
Chen, GM ;
Lin, MH .
PATTERN RECOGNITION LETTERS, 2004, 25 (11) :1253-1261
[5]  
Chen W. K., 1997, ADV SERIES ELECT COM, DOI [10.1142/2446, DOI 10.1142/2446]
[6]  
Cheng J, 2005, IEEE INT SYMP CIRC S, P4405
[7]   Distortion reduction for histogram modification-based reversible data hiding [J].
Chung, Kuo-Liang ;
Huang, Yong-Huai ;
Yan, Wen-Ming ;
Teng, Wei-Chung .
APPLIED MATHEMATICS AND COMPUTATION, 2012, 218 (09) :5819-5826
[8]   A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments [J].
Elshoura, S. M. ;
Megherbi, D. B. .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (05) :531-552
[9]  
Harju Tero., 2007, Lecture Notes on Graph Theory
[10]   A reversible data hiding method by histogram shifting in high quality medical images [J].
Huang, Li-Chin ;
Tseng, Lin-Yu ;
Hwang, Min-Shiang .
JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (03) :716-727