Please use this identifier to cite or link to this item:
The Study of Reversible Data Hiding Mechanisms
Reversible data hiding
Dual stego images
|引用:|| R. L. Rivest, A. Shamir, and L. Adleman, 'A method for obtaining digital signatures and public-key cryptosystems,' Communications of the Association for Computing Machinery, vol. 21, no. 2, pp. 120-126, 1978.  S. S. Radke and V. K. Sambhe, 'Image steganography: An approach for secrete communication,' in Proceedings of the First International Conference on Contours of Computing Technology, pp 205-207, 2010.  C. C. Chang, T. D. Kieu, and Y. C. Chou, 'Reversible data hiding scheme using two steganographic images,' in Proceedings of IEEE Region 10 International Conference (TENCON), pp. 1-4, 2007.  C. C. Chang, Y. C. Chou, and T. D. Kieu, 'Information hiding in dual images with reversibility,' in Proceedings of the Third International Conference on Multimedia and Ubiquitous Engineering, pp. 145-152, 2009.  M. Fallahpour, 'Reversible image data hiding based on gradient adjusted prediction,' IEICE Electronics Express, vol. 5, no. 20, pp. 870-876, 2008.  D. Coltuc and J. M. Chassery, 'Very fast watermarking by reversible contrast mapping,' IEEE Signal Processing Letters, vol. 14, no. 4, pp. 255-258, 2007.  D. M. Thodi and J. J. Rodriguez, 'Prediction-error based reversible watermarking,' in Proceedings of IEEE Conference on Image Processing, vol. 3, pp. 1549-1552, 2004.  K. L. Chung, Y. H. Huang, P. C. Chang, and H. Y. Mark Liao, 'Reversible data hiding-based approach for intra-frame error concealment in H.264/AVC,' IEEE Transactions on Circuits and Systems for Video Technology, vol. 20, no. 11, pp.1643-1647, 2010.  Y. Liu, L. Ju, M. Hu, X. Ma, and H. Zhao, 'A robust reversible data hiding scheme for H.264 without distortion drift,' Neurocomputing, vol. 151, no. 3, pp. 1053-1062, 2015.  D. Xu, R. Wang, and Y. Q. Shi, 'An improved reversible data hiding-based approach for intra-frame error concealment in H.264/AVC,' Journal of Visual Communication and Image Representation, vol. 25, no. 2, pp. 410-422, 2014.  R. Petrovic, J. M. Winograd, K. Jemili, and E. Metois, 'Data hiding within audio signals,' in Proceedings of Forth International Conference on Telecommunication, pp. 88-95, 1999.  D. Yan and R. Wang, 'Reversible data hiding for audio based on prediction error expansion,' in Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 249-252, 2008.  H. J. Shiu, S. Y. Tang, C. H. Huang, R. C. T. Lee, and C. L. Lei, 'A reversible acoustic data hiding method based on analog modulation,' Information Sciences, vol. 273, pp. 233-246, 2014.  C. C. Chang, T. C. Lu, Y. F. Chang, and C. T. Lee, 'Reversible data hiding schemes for deoxyribonucleic acid (DNA) medium,' International Journal of Innovative Computing, Information and Control, vol. 3, no. 5, pp.1145-1160, 2007.  Y. H. Huang, C. C. Chang, and C. Y. Wu, 'A DNA-based data hiding technique with low modification rates,' Multimedia Tools and Applications, vol. 70, no. 3, pp. 1439-1451, 2014.  C. Qin, C. C. Chang, and Y. C. Chen, 'Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism,' Signal Processing, vol. 93, no. 9, pp. 2687-2695, 2013.  C. Qin, C. C. Chang, and Y. P. Chiu, 'A novel joint data-hiding and compression scheme based on SMVQ and image inpainting,' IEEE Transactions on Image Processing, vol. 23, no. 3, pp. 969-978, 2014.  C. F. Lee, C. C. Chang, and K. H. Wang, 'An improvement of EMD embedding method for large payloads by pixel segmentation strategy,' Journal of Image and Vision Computing, vol. 26, no. 12, pp. 1670-1676, 2008.  J. Mielikainen, 'LSB matching revisited,' IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.  J. Tian, 'Reversible data embedding using a difference expansion,' IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890-896, 2003.  Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, 'Reversible data hiding', I IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp.354-362, 2006.  D. M. Thodi and J. J. Rodriguez, 'Expansion embedding techniques for reversible watermarking,' IEEE Transactions on Image Processing, vol. 16, no. 3, pp. 721-730, 2007.  T. C. Lu, J. H. Wu, and C. C. Huang, 'Dual-image-based reversible data hiding method using center folding strategy,' Signal Processing, vol. 15, pp. 195-213, 2015.  M. Wu, 'Joint security and robustness enhancement for quantization based data embedding,' IEEE Transactions on Circuits and Systems for Video Technology, vol.13, no. 8, pp. 831-841, 2003.  B. Chen and G. W. Wornell, 'Quantization index modulation: a class of provable good methods for digital watermarking and information embedding,' IEEE Transactions on Information Theory, vol. 47, pp. 1428-1443, 2001.  J. J. Eggers, R. Bauml, R. Tzschoppe, and B. Girod, 'Data hiding on 3_D triangle meshes', IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 1003-1019, 2003.  M. M Yeung and F. Mintzer, 'An invisible watermarking technique for image verification,' in Proceedings of IEEE International Conference on Image Processing, vol. 2, Santa Barbara, CA, pp. 680-683, 1997.  C. W. Honsinger, P. W. Jones, M. Rabbani, and J. C. Stoffel, 'Lossless recovery of an original image containing embedded data,' US Patent Application, 6,278,791, 2001.  C. D. Vleeschouwer, J. F. Delaigle, and B. Macq, 'Circular interpretation of bijective transformation in lossless watermarking for media asset management,' IEEE Transactions on Multimedia, vol. 5, no. 1, pp. 97-105, 2003.  J. Fridrich, J. Goljan, and R. Du, 'Invertible authentication watermark for JPEG images,' in Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Content, San Jose, CA, pp. 223-227, 2001.  C. F. Lee, K. H. Wang, C. C. Chang, and Y. L. Huang, 'A reversible data hiding scheme based on dual steganographic images,' in Proceedings of the 3rd international conference on ubiquitous information management and communication, pp. 228-237, 2009.  C. F. Lee and Y. L. Huang, 'Reversible data hiding scheme based on dual stegano-images using orientation combinations,' Telecommunication Systems, vol. 52, no. 4, pp. 2237-2247, 2013.  G. B. Horng, Y. H. Huang, C. C. Chang, and Y. Liu, '(k, n)-image reversible data hiding,' Journal of Information Hiding and Multimedia Signal Processing, vol. 5, no. 2, pp. 152-164, 2014.  C. C. Chang, T. C. Lu, G. B. Horng, Y. H. Huang, and Y. M. Hsu, 'A high payload data embedding scheme using dual stego-images with reversibility', in Proceedings of Third International Conference on Information, Communications and Signal Processing, pp. 1-5, 2013.  T. C. Lu, C. M. Lu, and C. C. Chang, Multimedia Security Techniques, Taiwan: CHWA, 2007.|
Data hiding is a scheme that embeds secret data in cover media. With the scheme, hackers cannot efficiently detect the secret data from the stego-media. Over the past decade, many techniques have been proposed for data hiding. However, most of them suffer from the problem of trade-off between payload and image distortion. There are four types of reversible data embedding methods, such as difference expansion, histogram shifting, prediction error expansion, and dual-image hiding scheme. The dual-image hiding scheme is the one that could generate slightly image distortion and avoids the underflow and overflow problems. Based on dual-image hiding scheme, Center Folding Strategy (CFS) takes the median to reduce each decimal digit for decreasing the modification level. Thus, embedding the transferred digits into the cover image does not lead to the acute distortion of the image. However, both of dual-image hiding scheme and CFS cannot reduce the frequent occurrence of the maximum absolute value, and this disadvantage diminishes the visual quality of the resulting stego-image. In the dissertation, three encoding methods are proposed to effectively decrease the modification level in the data embedding stage. One of them is the frequency-based encoding method that decreases the occurrence of the larger absolute digit and the level of modifications. The PSNR value of the frequency-based encoding method increases significantly in comparison with the previous methods. For smooth secret images, the image quality of the scheme is higher than those obtained from other methods. The second scheme is the similarity-based encoding method that integrates with the neighboring pixel similarity and the frequency-based encoding method, and then by utilizing the similarity of adjacent pixels of the codebook as the smaller coding value, the method further enhances the quality of stego-images. Experimental results show that the PSNR value of the similarity-based method in most images is higher than that of other similar studies. The third method is a dynamic encoding strategy. The strategy not only reduces the frequency of occurrence of the largest value but processes all the procedures of data encoding and transmits them immediately. With the advantage of the dynamic encoding technique, the proposed strategy has wide applications. In the future, the correlation coefficient among the embedding algorithm in the complex images will be analyzed to further enhance the quality of the embedded images. In addition, the proposed method integrated with the watermarking scheme will be studied to achieve a higher degree of robustness.
|Appears in Collections:||資訊科學與工程學系所|
Show full item record
TAIR Related Article
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.