Abstract
This proposed scheme reversibly embeds data into image prediction-errors by using histogram-pair method with the following four thresholds for optimal performance: embedding threshold, fluctuation threshold, left- and right-histogram shrinking thresholds. The embedding threshold is used to select only those prediction-errors, whose magnitude does not exceed this threshold, for possible reversible data hiding. The fluctuation threshold is used to select only those prediction-errors, whose associated neighbor fluctuation does not exceed this threshold, for possible reversible data hiding. The left- and right-histogram shrinking thresholds are used to possibly shrink histogram from the left and right, respectively, by a certain amount for reversible data hiding. Only when all of four thresholds are satisfied the reversible data hiding is carried out. Different from our previous work, the image gray level histogram shrinking towards the center is not only for avoiding underflow and/or overflow but also for optimum performance. The required bookkeeping data are embedded together with pure payload for original image recovery. The experimental results on four popularly utilized test images (Lena, Barbara, Baboon, Airplane) and one of the JPEG2000 test image (Woman, whose histogram does not have zero points in the whole range of gray levels, and has peaks at its both ends) have demonstrated that the proposed scheme outperforms recently published reversible image data hiding schemes in terms of the highest PSNR of marked image verses original image at given pure payloads.
This research is largely supported by Shanghai City Board of education scientific research innovation projects (12ZZ033) and National Natural Science Foundation of China (NSFC) on project (90304017).
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
References
Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data. US Patent: 6,278,791 (2001)
Fridrich, J., Goljan, M., Du, R.: Invertible authentication. In: Proc. SPIE Photonics West, Security and Watermarking of Multimedia Contents III, San Jose, California, vol. 397, pp. 197–208 (January 2001)
Xuan, G., Zhu, J., Chen, J., Shi, Y.Q., Ni, Z., Su, W.: Distortionless data hiding based on integer wavelet transform. IEE Electronics Letters 38(25), 1646–1648 (2002)
Tian, J.: Reversible data embedding using a difference expansion. IEEE Transaction on Circuits and Systems for Video Technology 13(8), 890–896 (2003)
Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS), Bangkok, Thailand, vol. 2, pp. 912–915 (May 2003); Also appear in Ni, Z., Shi, Y. Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3), 354-362 (2006)
Xuan, G., Shi, Y.Q., Yang, C., Zheng, Y., Zou, D., Chai, P.: Lossless data hiding using integer wavelet transform and threshold embedding technique. In: IEEE International Conference on Multimedia and Expo (ICME 2005), Amsterdam, Netherlands (July 2005)
Xuan, G., Yao, Q., Yang, C., Gao, J., Chai, P., Shi, Y.Q., Ni, Z.: Lossless data hiding using histogram shifting method based on integer wavelets. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 323–332. Springer, Heidelberg (2006)
Xuan, G., Shi, Y.Q., Chai, P., Cui, X., Ni, Z., Tong, X.: Optimum histogram pair based image lossless data embedding. In: Shi, Y.Q., Kim, H.-J., Katzenbeisser, S. (eds.) IWDW 2007. LNCS, vol. 5041, pp. 264–278. Springer, Heidelberg (2008)
Thodi, D.M., Rodríguez, J.J.: Reversible watermarking by prediction-error expansion. In: Proceedings of 6th IEEE Southwest Symposium on Image Analysis and Interpretation, Lake Tahoe, CA,USA, March 28-30, pp. 21–25 (2004); Also appear as Thodi, D.M., Rodriguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process 16(3), 721–730 (2007)
Kamstra, L., Heijmans, H.J.A.M.: Reversible data embedding into images using wavelet techniques and sorting. IEEE Transactions on Image Processing 14(12), 2082–2090 (2005)
Coltuc, D., Chassery, J.M.: Very fast watermarking by reversible contrast mapping. IEEE Signal Processing Letters 14(4), 255–258 (2007)
Lee, S., Yoo, C.D., Kalker, T.: Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Transactions on Information Forensics and Security 2(3), pt. 1, 321–330 (2007)
Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm using sorting and prediction. IEEE Transactions on Circuits and Systems for Video Technology 19(7), 989–999 (2009)
Xuan, G., Shi, Y.Q., Teng, J., Tong, X., Chai, P.: Double-threshold reversible data hiding. In: IEEE International Symposium on Circuits and Systems (ISCAS 2010), Paris, France (May 2010); Also appear in Xuan, G., Shi, Y.Q., Chai, P., Teng, J., Ni, Z., Tong, X.: Optimum histogram pair based image lossless data embedding. In: Shi, Y.Q. (ed.) Transactions on DHMS IV. LNCS, vol. 5510, pp. 84–102. Springer, Heidelberg (2009)
Shi, Y.Q.: Reversible data hiding. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 1–12. Springer, Heidelberg (2005)
Ni, Z., Ni, Z., Shi, Y.Q., Ansari, N., Su, W., Sun, Q., Lin, X.: Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Transactions on Circuits and Systems for Video Technology 18(4), 497–509 (2008)
Source JPEG2000 (JPSEC), ISO/IEC 15444-8 (April 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xuan, G., Tong, X., Teng, J., Zhang, X., Shi, Y.Q. (2013). Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data Hiding. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-40099-5_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40098-8
Online ISBN: 978-3-642-40099-5
eBook Packages: Computer ScienceComputer Science (R0)