Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Similar documents
A Reversible Data Hiding Scheme Based on Prediction Difference

Watermarking patient data in encrypted medical images

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

Contrast Enhancement Based Reversible Image Data Hiding

Local prediction based reversible watermarking framework for digital videos

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme *

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

Steganalytic methods for the detection of histogram shifting data-hiding schemes

Lossless Image Watermarking for HDR Images Using Tone Mapping

REVERSIBLE data hiding, or lossless data hiding, hides

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

Reversible Data Hiding in JPEG Images Based on Adjustable Padding

Commutative reversible data hiding and encryption

Forward Modified Histogram Shifting based Reversible Watermarking with Reduced Pixel Shifting and High Embedding Capacity

International Journal of Advance Research in Computer Science and Management Studies

Digital Watermarking Using Homogeneity in Image

Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang

An Implementation of LSB Steganography Using DWT Technique

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM

Journal of mathematics and computer science 11 (2014),

Enhance Image using Dynamic Histogram and Data Hiding Technique

Copyright Warning & Restrictions

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Reversible Watermarking on Histogram Pixel Based Image Features

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

A Copyright Information Embedding System

Block Wise Data Hiding with Auxilliary Matrix

A Visual Cryptography Based Watermark Technology for Individual and Group Images

Compendium of Reversible Data Hiding

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method

An Enhanced Least Significant Bit Steganography Technique

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

Comparative Histogram Analysis of LSB-based Image Steganography

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

An Improved Adaptive Median Filter for Image Denoising

Pattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

Reversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

A Reversible Data Hiding Method with Contrast Enhancement for Medical Images by Preserving Authenticity

Progressive secret image sharing scheme using meaningful shadows

Emerging Applications of Reversible Data Hiding

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

Meta-data based secret image sharing application for different sized biomedical

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

Dynamic Collage Steganography on Images

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

Authentication of grayscale document images using shamir secret sharing scheme.

High capacity robust audio watermarking scheme based on DWT transform

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

An Optimal Pixel-level Self-repairing Authentication. Method for Grayscale Images under a Minimax. Criterion of Distortion Reduction*

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

Visual Secret Sharing Based Digital Image Watermarking

The Influence of Image Enhancement Filters on a Watermark Detection Rate Authors

Robust and Blind Spatial Watermarking in Digital Image

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Blind Single-Image Super Resolution Reconstruction with Defocus Blur

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

A Review On Modern Secure Mosaic Video Generation For Secure Video Transmission

A New Compression Method for Encrypted Images

Medical Image Encryption and Compression Using Masking Algorithm Technique

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

Application of Histogram Examination for Image Steganography

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Hiding Image in Image by Five Modulus Method for Image Steganography

Various Visual Secret Sharing Schemes- A Review

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

Lossless Huffman coding image compression implementation in spatial domain by using advanced enhancement techniques

DATA HIDING [1] is referred to as a process to hide data

Analysis of Secure Text Embedding using Steganography

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

A self-adaptive Contrast Enhancement Method Based on Gradient and Intensity Histogram for Remote Sensing Images

Passport Authentication Using PNG Image with Data Repair Capability

Direct Binary Search Based Algorithms for Image Hiding

Embedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based on Watermarking

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

A Novel (2,n) Secret Image Sharing Scheme

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Multiresolution Watermarking for Digital Images

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

ISSN: [Khan* et al., 7(8): August, 2018] Impact Factor: 5.164

A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images

Segmentation Based Image Scanning

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption

HSI Color Space Conversion Steganography using Elliptic Curve

Webpage: Volume 4, Issue VI, June 2016 ISSN

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Sterilization of Stego-images through Histogram Normalization

Transcription:

Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning Rui-Song Ye1, Jin Chen and Xing Zhang1 1 Department of Mathematics, Shantou University, Shantou, Guangdong, 515063, China School of Software Engineering, South China University of Technology, Guangzhou, 510006, China Email: rsye@stu.edu.cn Reversible data hiding technology has attracted great attention recently. Using reversible data hiding methods, original cover images can be recovered losslessly from the cover image embedded information. In this paper, spatial reversible data hiding schemes based on histogram modification of difference images is discussed, in which the pixel gray values of difference image are altered slightly to perform the embedding and extraction. Specifically, we design two reversible data hiding schemes based on S-type scanning and Hilbert curve scanning, and compare them with the reversible data hiding scheme by difference between adjacent columns of the cover image. Embedding capacity and PSNR are calculated to figure out how difference ways influence the effect of hiding. Keywords: Reversible Data Hiding; Difference; Histogram Modification. 1. Introduction With the rapid development of network technology and multimedia processing technology, images, videos and other digital products are largely distributed, communicated and shared online, which brings great convenience for people's life. However, information disclosure, content tampering and infringement problems become increasingly serious consequently. In order to solve these problems, encryption and information hiding provide two effective approaches. In image processing research field, data hiding is referred to a process to embed the secret data into a cover image. The embedded data can provide information for cover image authentication, author signature, etc. Embedded information will affect the cover image quality more or less, but after the watermark extraction, one hopes to be able to fully reconstruct the original cover image, i.e., realizing reversible data hiding. Reversible data hiding has been widely used in sensitive areas, such as medical, military and judicial field [1, ]. Reversible data hiding has become a hot spot in the field of digital watermarking research. Many scholars put forward many kinds of reversible Copyright 017, the Authors. Published by Atlantis Press. This is an open access article under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/). 184

data hiding algorithms recently, see for example [3-6]. Reversible watermarking algorithms based on difference expansion perform the reversible watermark data embedding by extending the difference of adjacent pixels [3]. Reversible data embedding based on histogram translation embeds watermark data in the vacancy of grayscale using statistical characteristic of the image histogram [4]. In recent years, combining histogram modification and reversible data hiding algorithms has become one of the important methods in the field of reversible data hiding technology research. In 004, Lee et al. used difference histogram modification to embed secret information data, resulting in higher image quality as well as large capacity [5]. In 008, Lin et al. proposed a multi-level reversible watermarking algorithm based on difference histogram modification and further improve the embedded information capacity [6]. How to generate the difference image, improve the peak value frequency of difference image, the adopted difference way is a worth considering issue. This paper considers the design of two different difference schemes, S-type scanning difference and Hilbert curve scanning difference. As the S-type curve and Hilbert curve can traverse the whole cover image, one can determine the calculation rules of the corresponding difference of scanned adjacent pixels. S-type scanning and Hilbert curve scanning are used respectively to design reversible hiding algorithms based on difference image histogram modification. The simulation results are compared with those using the column difference method proposed in [6]. The influence of differential method and embedding level to embedded capacity and peak signal to noise ratio are analyzed.. Multi-level Scheme Based on Histogram Modification of Difference Image Using Curve Scanning.1. S-type scanning based reversible hiding scheme Difference method based on S-type scanning converts the two-dimensional image data into one-dimensional data by S-type curve. The hiding phase and the extracting phase of the proposed scheme are explained in details in the sequel. We assume that the proposed cover image is sized M N and let T ( M N) / ( A B). The hiding stage based on S-type scanning is described by Step 1-5 and 0 i A B, 0 b T 1 in Step 1-4. Step 1. The original cover image is divided into small blocks H b, each of size A B. For S-type scanning, the image block pixel values are shown in Figure 1(a) (the origin is referred to the scanning starting point and the arrow represents the scanning end point). The two-dimensional matrix block H is scanned and converted to one vector H with length A B, and then get the b 185

difference image D with length A B 1 by neighbouring pixels gray value subtraction: D i H i H i 1. Step. Generate the histogram of the difference image peak value P for each block. Step 3. If the pixel value change the pixel value D D i to 1 D and record its i of block b is larger than its peak value P, D i. Otherwise, the pixel value D i Db s i +1 if Db s i Pb s, i = D i otherwise. remains unchanged, that is, D Step 4. The pixels in the modified difference image bit m 0,1 as follows: D i D having grayscale P can be modified to hide embedded message values the same as peak value D i + m if D i P, = D i otherwise. Step 5. The original scanned cover image H and its hidden difference D are used to reconstruct the cover image embedded secret data by image performing the following transformation. For the first two pixels, the inverse operation is represented by H 0 if H 0 H 1, Sb s 0 H 1 D 0 otherwise, H 0D 0 if H 0 H 1, Sb s 1 H 1 otherwise. For the remaining pixels, the inverse operation is expressed by S i 1 D i 1 if H i 1 H i, S i S i 1 D i 1 otherwise, for i A B, 0 b T 1. The generated vector S with length A B is then reconstructed to be one two-dimensional matrix block with size A B. All the blocks are accumulated to be the resulted cover image SH embedded secret message. We can extract the embedded message and reconstruct the original cover image losslessly. The process is the reverse of the above-mentioned embedding phase. We note that the above process is one round of embedding and extraction process. The algorithm can be implemented several rounds and it is referred to one multi-level algorithm. The marked cover image can be regarded as a new cover image where other secret data can be embedded. As a result, more secret information can be hidden to improve the embedding capacity. For the sake of 186

convenience, we will denote the embedded level as n if the algorithm is performed n rounds... Hilbert curve scanning based reversible hiding scheme Thanks to the good filling nature, space-filling curves have been widely applied in many fields, especially in digital image processing, such as image clustering, image encryption, image encoding, image storing, image retrieving, etc. The Hilbert curve, one famous space-filling curve presented by Hilbert to traverse points on a two-dimensional square grid, preserves point neighborhoods as much as possible. This paper will use the Hilbert curve to scan square image pixels, and realize the difference histogram modification based reversible data hiding. Based on the Hilbert curve generation algorithm [7], the Hilbert curves with first, second and fourth order are depicted in Figure 1(b)-(d). The curve starts from bottom left, then scans the pixels in its unique way and ends at bottom right. The image data information is first read according to the Hilbert curve and rearranged to be 1D vector data orderly. Difference operation is then performed for the adjacent pixels to get the difference image. The histogram translation and difference image s modification are next carried out and the inverse operation is finally implemented to reconstruct the marked image. 1 3 4 5 1 1 3 4 5 6 7 8 9 10 11 1 13 14 15 16 17 1 3 4 5 (a) (b) (c) (d) Fig. 1 Scanning type: (a) S-type; (b)-(d) Hilbert curves with orders 1, and 4 3 4 5 6 7 8 9 10 11 1 13 14 15 16 17 3. Analysis of Hiding Effect (i) Comparison of embedding capacity expansion. The peak value frequency of the difference image is worthy of attention which is related to the cover image embedding capacity. Different difference ways will generate different peak value frequencies for the same processed cover image. Three test cover images with size 56 56, Lena.bmp, Rice.png, and Baboon.png (see Figure (a)-(c)), all 56 56 in size, are used to perform the difference operation respectively. We generate the difference image histogram, and record the corresponding pixel peak value and its frequency for each image. The peak value frequencies for the test images and their difference images are demonstrated in Table 1. One can draw the following conclusions from Tab. 1. 1) No matter what kind of difference way is adopted, the peak value frequency of the difference image is larger than that of the original cover image. Therefore adjacent pixels difference 187

PSNR (db) Hiding capacity (bpp) Advances in Engineering Research (AER), volume 116 operation is helpful for improving image embedding capacity. ) The S-type scanning based difference is the most effective way to improve the embedding capacity among the three difference ways. 3) When the peak value frequency of the original cover image is large, the column difference way seems better. 4) Hilbert curve scanning based difference method can usually improve the embedding capacity compared with the column difference method. (ii) Embedding level. We turn to discuss the influence of embedding level. Given the block size 4 4, the results of the image quality and embedding capacity with respect to embedding level by different difference ways are demonstrated in Figure (d)-(e). It follows from the experimental results that the quality of image degrades as the embedded level increases. The three algorithms have almost the same degree of decline because the image quality is caused by embedded information. The more secret message is embedded, the worse is the image quality. However, the image embedding capacity rate increases as the embedding level increases. The embedding capacities for both S-type scanning and Hilbert curve scanning algorithms are consistent, while that for column difference algorithm is different in some ways. Within the same embedding level, the embedding capacities obtained by S-type scanning and Hilbert curve scanning algorithms are a little larger than that generated by the algorithm based on column difference. The conclusion regarding PSNR is just the reverse. 45 40 S-type scanning Hilbert curve scanning.4 35 1.6 30 5 1. 0.8 S-type scanning Hilbert curve scanning 0 0.4 15 1 3 4 5 6 7 8 9 10 11 1 13 14 15 16 17 18 19 0 1 Hiding level 0 1 3 4 5 6 7 8 9 10 11 1 13 14 15 16 17 18 19 0 1 Hiding level (a) Lena.bmp (b) Rice.png (c) Baboon.png (d) (e) Fig. Original test images (a)-(c), the PSNR values curve (d) and the embedding rates curve for three methods with block size 4 4 188

Tab. 1 The histogram peak values for three test images and their difference images (Pb, Pb_D, Pb_Ds and Pb_Dh stand for the frequencies of original test images, adjacent column, s-type scanning and Hilbert curve scanning ways respectively) Test image Pb Pb_D Pb_Ds Pb_Dh Lena.bmp 580 903 11758 10368 Rice.png 1418 6519 8063 7366 Baboon.png 109 4074 4336 467 Tab. The PSNR values for three ways with different block sizes and embedding levels Method S-type scanning difference Hilbert curve scanning difference Block size Embedding level 1 3 4 5 4 4 48.36 4.67 39.4 36.79 34.88 8 8 43.35 37.69 34.36 3.01 30.17 16 16 39.07 33.47 30.0 7.9 6.14 4 4 43.11 37.64 34.37 3.07 30.17 8 8 37.54 3.41 9.5 7.00 5.8 16 16 3.94 7.30 4.01.11 0.3 4 4 43.41 38.00 34.79 3.45 30.6 8 8 37.694 3.68 9.67 7.35 5.66 16 16 33.18 7.71 4.53.36 0.85 Tab. 3 The embedding rates for three ways with different block sizes and embedding levels Method S-type scanning difference Block size Embedding level 1 3 4 5 4 4 0.0 0.35 0.49 0.61 0.7 8 8 0.15 0.8 0.38 0.48 0.56 16 16 0.14 0.6 0.36 0.44 0.5 4 4 0.5 0.44 0.61 0.76 0.89 8 8 0.0 0.36 0.49 0.61 0.7 16 16 0.18 0.33 0.46 0.57 0.67 4 4 0.4 0.4 0.59 0.73 0.87 Hilbert curve scanning difference 8 8 0.19 0.34 0.46 0.57 0.67 16 16 0.17 0.31 0.4 0.5 0.6 (iii) Difference method. From the analysis above, we can see that when the embedding level is more than 5, the PSNR values for the marked cover image will be lower than 35 usually, and hence the marked cover image will have large distortion. Here we only delve into cases of embedding levels ranging from 1 to 5. The results are shown in Table and Table 3. We can draw the following conclusions: 1) Algorithm based on column difference under high embedding level can still maintain a good image quality, while S-type scanning and Hilbert curve scanning algorithm cannot achieve it. ) Considering the same image quality and block size, S-type scanning algorithm can obtain larger embedding 189

capacity if embedded with the level 1 to avoid attack, otherwise, column difference algorithm with high embedding level is adopted to embed more secret data. Acknowledgments This research is supported by National Natural Science Foundation of China (No. 117138). References 1. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. Image Process., 6, 1673-1687(1997).. R. Ye, H. Huang, and R. Chen, A Color Image Watermarking Scheme Based on D Tent Map and Chebyshev Map, Applied Mechanics and Materials, Vols. 543-547, 304-307(014). 3. J. Tian, Reversible data embedding using a difference expansion. IEEE Transaction on Circuits and Systems for Video Technology (S1051-815), 13(8), 890-896(003). 4. Z. Ni, Y. Q. Shi, N. Ansari, et al. Reversible Data Hiding. IEEE Transaction on Circuits and Systems for Video Technology (S1051-815), 16(3), 354-36(006). 5. S. K. Lee, Y. H. Suh, Y. S. Ho, et al. Lossless data hiding based on histogram modification of difference images, Advances in Multimedia Information Processing-PCM 004. Germany: Springer Berlin Heidelberg (S030-9743), 340-347(005). 6. Chia-Chen Lin and Wei-Liang Tai, and Chin-Chen Chang. Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognition, 41, 358-3591(008). 7. R. Ye and L. Liu, An iterated function system based method to generate Hilbert-type space-filling curves, I. J. Information Technology and Computer Science, 1, 1-(015). 190