Contrast Enhancement Based Reversible Image Data Hiding

Similar documents
Watermarking patient data in encrypted medical images

Local prediction based reversible watermarking framework for digital videos

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

International Journal of Advance Engineering and Research Development REVERSIBLE DATA HIDING (RDH) ALGORITHM FOR.JPG COLOUR IMAGES

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

Reversible Watermarking on Histogram Pixel Based Image Features

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Reversible Data Hiding in JPEG Images Based on Adjustable Padding

A Reversible Data Hiding Scheme Based on Prediction Difference

A Reversible Data Hiding Method with Contrast Enhancement for Medical Images by Preserving Authenticity

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

Reversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding

A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images

Forward Modified Histogram Shifting based Reversible Watermarking with Reduced Pixel Shifting and High Embedding Capacity

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme *

International Journal of Advance Research in Computer Science and Management Studies

Enhance Image using Dynamic Histogram and Data Hiding Technique

A NEW DATA TRANSFER MATRIX METHODOLOGY FOR IP PROTECTION SCHEME

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Block Wise Data Hiding with Auxilliary Matrix

Lossless Image Watermarking for HDR Images Using Tone Mapping

Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang

REVERSIBLE data hiding, or lossless data hiding, hides

Steganalytic methods for the detection of histogram shifting data-hiding schemes

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Medical Image Encryption and Compression Using Masking Algorithm Technique

Digital Watermarking Using Homogeneity in Image

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

An Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing

Compendium of Reversible Data Hiding

Commutative reversible data hiding and encryption

An Implementation of LSB Steganography Using DWT Technique

Copyright Warning & Restrictions

ON PACKING LASER SCANNING MICROSCOPY IMAGES BY REVERSIBLE WATERMARKING: A CASE STUDY

Removal of High Density Salt and Pepper Noise through Modified Decision based Un Symmetric Trimmed Median Filter

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

Reversible Data Hiding with Histogram-Based Difference Expansion for QR Code Applications

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

An Enhanced Least Significant Bit Steganography Technique

Keywords-Image Enhancement, Image Negation, Histogram Equalization, DWT, BPHE.

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Emerging Applications of Reversible Data Hiding

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

Comparative Study on DWT-OFDM and FFT- OFDM Simulation Using Matlab Simulink

Design and Testing of DWT based Image Fusion System using MATLAB Simulink

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

Transform Domain Technique in Image Steganography for Hiding Secret Information

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

DATA HIDING [1] is referred to as a process to hide data

Steganography using LSB bit Substitution for data hiding

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

HSI Color Space Conversion Steganography using Elliptic Curve

Techniques of Image Mosaicing for Steganography

A Novel Implementation of Color Image Steganography Using PVD

Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach

A New Compression Method for Encrypted Images

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

A New Image Steganography Depending On Reference & LSB

A Survey of Substantial Digital Image Watermarking Techniques

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Authentication of grayscale document images using shamir secret sharing scheme.

Fuzzy Statistics Based Multi-HE for Image Enhancement with Brightness Preserving Behaviour

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

I. INTRODUCTION II. EXISTING AND PROPOSED WORK

VLSI Implementation of Impulse Noise Suppression in Images

An Improved Bernsen Algorithm Approaches For License Plate Recognition

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Image Forgery Detection Using Svm Classifier

Color Image Segmentation Using K-Means Clustering and Otsu s Adaptive Thresholding

Journal of mathematics and computer science 11 (2014),

Analysis of Secure Text Embedding using Steganography

A Review On Modern Secure Mosaic Video Generation For Secure Video Transmission

International Journal for Research in Technological Studies Vol. 1, Issue 8, July 2014 ISSN (online):

Adaptive Denoising of Impulse Noise with Enhanced Edge Preservation

Evaluation of Visual Cryptography Halftoning Algorithms

Various Visual Secret Sharing Schemes- A Review

Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography

Sterilization of Stego-images through Histogram Normalization

Recovery of badly degraded Document images using Binarization Technique

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

Data Hiding Using LSB with QR Code Data Pattern Image

An Overview of Image Steganography Techniques

Embedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based on Watermarking

Tampering Detection Algorithms: A Comparative Study

A Recursive Threshold Visual Cryptography Scheme

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

Hiding And Encrypting Binary Images Using A Different Approach

An Analysis of Image Denoising and Restoration of Handwritten Degraded Document Images

Enhanced DCT Interpolation for better 2D Image Up-sampling

Webpage: Volume 4, Issue VI, June 2016 ISSN

FPGA implementation of DWT for Audio Watermarking Application

Keywords Secret data, Host data, DWT, LSB substitution.

A Proposed Technique For Hiding Data Into Video Files

Transcription:

Contrast Enhancement Based Reversible Image Data Hiding Renji Elsa Jacob 1, Prof. Anita Purushotham 2 PG Student [SP], Dept. of ECE, Sri Vellappally Natesan College, Mavelikara, India 1 Assistant Professor, Dept. of ECE, Sri Vellappally Natesan College, Mavelikara, India 2 ABSTRACT: Data hiding is a technique to hide secret data into images which is called as cover images. A set of the embedded data and another set of the cover media data are linked by data hiding process. Reversible Data Hiding (RDH) is used to embed a piece of data into an image to generate a marked image and after extracting process the original image can be recovered from the marked image. RDH is mainly used in signal processing field especially in applications of security, medical and military where no permanent changes are allowed for the hiding data. In this paper, RDH algorithms intensify the contrast of the host image to give a better visual quality rather than keeping the PSNR value high. For the data embedding, the highest two bins in the histogram are selected to perform the histogram equalization simultaneously. To increase the embedding capacity, the equalization process is repeated. Along with the message bits, the side information is also embedded in the host image for the complete recovery. By adding the considerable amount of data into the image, the brightness of the image is increased. Many RDH algorithms have been developed so far and each algorithm has its own merits and drawbacks, no methods are perfect. The visual quality of the contrast-enhanced images generated by this algorithm is better when compared with special MATLAB functions. Improving the algorithm on the color and video will be the future work. KEYWORDS: Reversible Data Hiding, Histogram modification, Data embedding, Contrast enhancement. I. INTRODUCTION Data hiding are a group of technique to hide secret data into images which is called as cover images. Most hiding technique embeds the message into the cover image to obtain the marked image by modifying only the least significant part of the cover image. This embedding can cause some distortion to cover image and hence, unable to reconstruct the original image from the marked image. In most applications, small distortions due to data embedding are allowed whereas in applications like medical, law forensics and military imagery, no distortions are allowed. For these cases, we require a special kind of data hiding method, which is called as reversible data hiding (RDH). Reversible Data Hiding (RDH) is used to embed a piece of data into an image to generate a marked image and after extracting process the original image can be recovered from the marked image. It is also called as invertible or lossless data hiding. The hiding rate and quality of the marked image are important parameters for the measurement of the performance of the RDH algorithm as the increase in the hiding rate causes more distortion in the image content. The peak signal-tonoise ratio (PSNR) value of the marked image is calculated to measure the distortion. The PSNR of a marked image generated is usually kept high but the visual quality will be low. For the images obtained in poor illumination, the visual quality is more important than keeping the PSNR value high. The traditional methods has many drawbacks like degradation of hidden data as well as original image and computational maybe costly. The conventional methods of RDH algorithm does not perform the task of contrast enhancement to improve the visual quality of the host image. So by using this RDH algorithm, the contrast enhancement is achieved instead of keeping the PSNR high. Contrast enhancement of images can be obtained through histogram equalization. The data embedding and contrast enhancement can be done simultaneously in this algorithm by modifying the histogram of the pixel values. At first, the highest two bins are found and the bins between the peaks are unchanged. Each of the two peaks split into the adjacent Copyright to IJAREEIE www.ijareeie.com 146

bins by shifting outward the outer bins. The highest bins in the modified histogram can be further split until the sufficient contrast enhancement is obtained, which can also increase the embedding capacity. The boundary pixel values are pre-processed to avoid the overflows and underflows because of the histogram modification and a location map is generated to remember their locations. The location map is hidden into the host image along with the message bits and other side information for the recovery of the original image. So that a complete data extraction and original image recovery is possible. II. PROPOSED METHOD This section describes the various steps in data embedding and recovery process. The data embedding is done by the histogram modification technique. Consider an 8-bit gray-level image I, by counting the pixels with a gray-level value j for j {0,1,...,254,255} the image histogram can be calculated. Let denotes the image histogram then (j) represent the number of pixels with a value j. Consider N different pixel values are present in I, hence there are N nonempty bins in, from which the two peaks(i.e. the highest two bins) are selected. and represents the corresponding smaller and bigger values respectively. The data embedding is performed for a pixel counted in with value i, by (1) where is the modified pixel value, and is the k-th message bit(0 or 1) to be hidden. By using the Eq.(1) to all the pixel counted in, totally + binary values can be embedded. The bins between the two peaks remain unchanged and the outer bins are moved outward. So each of the peaks can be divided into two adjacent bins, and, and respectively. For extracting the embedded data, the peak values and are needed. So to keep these values, first exclude 16 pixels in I from the histogram calculation. The least significant bits (LSB) of those pixels are collected and included in the binary message to be hidden. The bit- wise operation is performed for substituting the LSBs of the16 excluded pixels by values of the and. In the extraction part, the peak values need to be recovered and the histogram is found excluding the 16 pixels. To extract data, the following operation is performed on any pixel counted with values of in the histogram: (2) where is the k-th binary value extracted from the marked image. To recover the original image, the following operation is performed on every pixel counted in the histogram: (3) The original LSBs of 16 excluded pixels are obtained from the extracted data. The excluded pixels can be restored back to recover the original image. Copyright to IJAREEIE www.ijareeie.com 147

In the original image, all the pixels counted in are within the limit {1,..., 254}. The histogram shifting can cause overflow or underflow, if there is any bounding pixel value (0 or 255). To avoid this, a pre-process need to be done prior to the histogram modification operations. The pixel values of 0 and 255 are modified to 1 and 254, respectively. So, no overflow or underflow will caused because the maximum pixel values change is + or - 1. Each of the two peaks in the histogram is split into two adjacent bins with the same heights because the numbers of 0s and 1s must be equal in the message bits. The hiding rate can be increased by further splitting the highest bins in the modified histogram and the process repeats to achieve histogram equalization effect. So by this way, the data embedding and contrast enhancement are simultaneously performed. The value of L, the previous peak values are embedded with the last two peaks to be split. In the extraction process, the last split peak values are regained and the data embedded are obtained using Eq.(2) and the original image is recovered using Eq.(3). III. METHODOLOGY OF THE PROPOSED ALGORITHM The steps of the proposed algorithm are shown in the Fig. 1. Let the total number of pairs of histogram bins to be split for data embedding is L. Embedding Process Original host image I Preprocess Calculate the histogram of pixel values Perform embedding Add the last two peaks values in the LSBs of 16 excluded pixels Restore the preprocessed pixel values Perform extraction (L pairs) Retrieve the two peak values from the LSBs of 16 excluded pixels Watermarked Image Extraction & Recovery Process Fig.1: Procedure for the proposed algorithm The embedding process includes the following steps: 1. Pre-Process: The pixels in the range of [0, L-1] and [256-L, 255] are processed. The pixel values in the range 0 to L-1 are added by L while the pixels in the range 256 L to 255 are subtracted by L, excluding the first 16 pixels in the bottom row. 2. The histogram of the image is calculated excluding the first 16 pixels in the bottom row. 3. Embedding: The highest two bins in the image histogram are split for data embedding by using the eq.(1). Again the two peaks in the modified histogram are taken to be split and continue until L pairs are split. The value of L, LSBs of the 16 excluded pixels and the previous peak values are embedded along with the last two peaks to be split. 4. The LSBs of the 16 excluded pixels are replaced by last two peak values to form the marked image. The extraction and recovery process includes the following steps: 1. The LSBs of the 16 excluded pixels are recovered to know the last two peak values. 2. The data embedded with the last two pixels are extracted by using the eq.(2) and by using the eq.(3) the recovery operations can be done on all the pixels except the 16 excluded ones. The process repeats until all the data are extracted. 3. The original image is recovered by updating back the original LSBs of 16 excluded pixels. Copyright to IJAREEIE www.ijareeie.com 148

IV. RESULTS AND DISCUSSION The only parameter in the parameter algorithm is L (the pair number of the histogram peaks to be split). The data bits to be hidden can be any string of binary values where the number of 0s and 1s are almost equal, or some extra bits can be added to make so. In this experiment the hiding rate generally increases by using more histogram peaks for data embedding. (a) (b) (c) (d) Fig. 2: The original and contrast enhanced images of the Baboon by splitting 10, 15 and 20 pairs of histogram peaks in the proposed algorithm. (a) Original image (b) 10 pairs (c) 15 pairs (d) 20 pairs. (a) (b) (c) (d) Fig. 3: The histogram of the above figure with L values 10, 15 and 20 pairs in the proposed algorithm. (a) Original image (b) 10 pairs (c) 15 pairs (d) 20 pairs. Copyright to IJAREEIE www.ijareeie.com 149

The hidden data is invisible in the contrast enhanced images. The more contrast enhancement is obtained, the more histogram peaks were split for data embedding. Also the PSNR values decreases with data hiding rate while the visual quality is maintained. RDH can be extended to video also. V. CONCLUSION The proposed RDH algorithm with the contrast enhancement property improves both the data hiding and data embedding capacity. The visual quality is better using this proposed method than the traditional methods. The original image can be extracted without any distortion after extracting the embedded data. Experimental results show that the contrast enhancement of the image occurs simultaneously with the data hiding by doing histogram equalization. This algorithm can be applied to medical and satellite images as well as in color images. This method can be extended to video also. REFERENCES [1] Hao- Tian Wu,Jean-Luc Dugelay and Yun-Qing Shi., Reversible Image Data Hiding With Contrast Enhancement, IEEE Signal Processing Letters,VOL.22,No.1,Januvary 2015. [2] J. Tian, Reversible data embedding using a difference expansion, IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890 896, Aug. 2003. [3] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, Reversible data hiding, IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354 362, Mar. 2006. [4] D.M. Thodi and J. J. Rodriguez, Expansion embedding techniques for reversible watermarking, IEEE Trans. Image Process., vol. 16, no. 3, pp. 721 730, Mar. 2007. [5] D. Coltuc and J.-M. Chassery, Very fast watermarking by reversible contrast mapping, IEEE Signal Process. Lett., vol. 14, no. 4, pp. 255 258, Apr. 2007. [6] M.-Z.Gao, Z.-G.Wu, and L.Wang, Comprehensive evaluation forhe based contrast enhancement techniques, Adv. Intell. Syst. Applicat., vol. 2, pp. 331 338, 2013. Copyright to IJAREEIE www.ijareeie.com 150