Escolar Documentos
Profissional Documentos
Cultura Documentos
373-376
ISSN: 2222-2510
2011 WAP journal. www.waprogramming.com
Ronak Karimi
Department of Graphic
Shaneh Branch,
Islamic Azad University,
Shaneh, Iran.
hasanvand_6@yahoo.com
Abstract: Reversible data hiding methods are a group of secure data embedding techniques that are widely
used in secure communication.
This study will have brief look at the most impressive RDH methods in recent researches. Due to this, these
methods are categorized to two different domains. They are spatial and transform domains.
Spatial domain methods that are investigated are: Lossless Compression and Encryption of Bit-Planes, Highcapacity distortion-free data embedding, Reversible data hiding by utilizing the minimum points of the
histogram.
Investigated transform domain techniques are: Distortionless image data hiding algorithm based on integer
wavelet transform, High Capacity RDH technique based on difference expansion, Integer DCT-based
Reversible Watermarking for Images Using Companding Technique, Lossless Generalized-LSB Data
Embedding.
Key word: Reversible data hiding, data hiding, data security, RHD, spatial domain, transform domain
I.
INTRODUCTION
Data hiding are a group of techniques used to put a se ure data in a host media (like images) with small deterioration in
host and the means to extract the secure data afterwards [1][2].
Reversible data hiding is a technique which enables images to contain data in a hidden form and then restored to their
origin by removing the digital hidden data and replacing the image data that had been overwritten.
The earliest reference of RDH was indicated in a patent authentication method that was suggested by Honsinger et al
[3], that utilizes modulo arithmetic but suffers from salt-and-pepper visual artifact. Afterwards, many RDH techniques
were proposed by different researchers. RDH methods are classified into two main categories by various data
embedding domains:
The second category of methods are all facing the same problem: how to choose appropriate embedding locations to
avoid pixel value overflow and underflow, and all the solutions have to pay the overhead cost to record all the
embedding locations, which greatly reduces the embedding capacity.
In this paper, we will have a survey on different researches in two types of reversible data hiding techniques. So, in the
second section, we will get into RDH techniques in spatial domain. Third section is dedicated to transform domain
techniques. Finally, conclusion is placed at the end.
II.
In the field of spatial domain RDH, many methods can be referenced. But we will get into 3 methods that were
introduced by Fridrich et al. [4], M. Goljan et al. [5] and Zhicheng Ni et al. [6]. These methods are most impressible
than others.
373
Masoud Nosrati et al., World Applied Programming, Vol (2), No (6), June 2012.
II.3. Reversible data hiding by utilizing the minimum points of the histogram
Zhicheng Ni et al. [6] presented a novel reversible data hiding algorithm, which can recover the original image without
any distortion from the marked image after the hidden data have been extracted.
Proposed algorithm utilizes the zero or the minimum points of the histogram of an image and slightly modifies the
pixel grayscale values to embed data into the image. Authors claim that their method can embed more data than many
of the existing reversible data hiding algorithms. Also, they proved it analytically and indicated experimentally that the
peak signal-to-noise ratio (PSNR) of the marked image generated by this method versus the original image is
guaranteed to be above 48 dB. This lower bound of PSNR is much higher than that of all reversible data hiding
techniques reported in the literature.
The computational complexity of their proposed technique is low and the execution time is short.
Experimental results and performance comparison with other reversible data hiding schemes were presented to
demonstrate the validity of the proposed algorithm [6].
374
Masoud Nosrati et al., World Applied Programming, Vol (2), No (6), June 2012.
III.
In this section 4 methods that are most impressible in transform domain are talked. They are proposed by:
G. Xuan et al. [11], J. Tian [12][13], B. Yang et al. [14], M. Celik et al. [15].
III.1. Distortionless image data hiding algorithm based on integer wavelet transform
G. Xuan et al. [11] proposed a distortionless image data hiding algorithm based on integer wavelet transform that can
invert the stego-image into the original image without any distortion after the hidden data are extracted. This algorithm
hides data into one (or more) middle bit-plane(s) of the integer wavelet transform coefficients in the middle and high
frequency sub bands.
It can embed much more data compared with the existing distortionless data hiding techniques and satisfy the
imperceptibility requirement. The image histogram modification is used to prevent grey scales from possible
overflowing. Experimental results have demonstrated the validity of the algorithm.
III.3. Integer DCT-based Reversible Watermarking for Images Using Companding Technique
B. Yang et al. [14] present a high capacity reversible watermarking scheme using companding technique over integer
DCT coefficients of image blocks. This scheme takes advantage of integer DCT coefficients Laplacian-shape-like
distribution, which permits low distortion between the watermarked image and the original one caused by the bit-shift
operations of the companding technique in the embedding process.
In proposed scheme, B. Yang et al. choose AC coefficients in the integer DCT domain for the bit-shift operation, and
therefore the capacity and the quality of the watermarked image can be adjusted by selecting different numbers of
coefficients of different frequencies. To prevent overflows and underflows in the spatial domain caused by
modification of the DCT coefficients, they design a block discrimination structure to find suitable blocks that can be
used for embedding without overflow or underflow problems.
They also use this block discrimination structure to embed an overhead of location information of all blocks suitable
for embedding. With this scheme, watermark bits can be embedded in the saved LSBs of coefficient blocks, and
retrieved correctly during extraction, while the original image can be restored perfectly.
375
Masoud Nosrati et al., World Applied Programming, Vol (2), No (6), June 2012.
IV.
CONCLUSION
In this paper, we got into different impressive reversible data hiding methods in recent studies. They were categorized
and investigated in spatial and transform domains.
Investigated spatial domain methods are: Lossless Compression and Encryption of Bit-Planes by Fridrich et al., Highcapacity distortion-free data embedding by M. Goljan et al., Reversible data hiding by utilizing the minimum points of
the histogram Zhicheng Ni et al.
Investigated transform domain techniques are: Distortionless image data hiding algorithm based on integer wavelet
transform by G. Xuan et al., High Capacity RDH technique based on difference expansion by Tian et al., Integer DCTbased Reversible Watermarking for Images Using Companding Technique by B. Yang et al., and Lossless
generalized-LSB data embedding by M. Celik et al.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
Mehdi Hariri, Ronak Karimi, Masoud Nosrati. An introduction to steganography methods. World Applied Programming, Vol (1), No (3),
August 2011. 191-195.
Masoud Nosrati, Ronak Karimi, Mehdi Hariri. Reversible Data Hiding: Principles, Techniques, and Recent Studies. World Applied
Programming, Vol (2), Issue (5), May 2012. 349-353
C. Honsinger, P. Jones, M. Rabbani and J.Stoffel, Lossless recovery of an original image containing embedded data, US Patent,
No.US6278791, 1999.
J. Fridrich, M. Goljan and R. Du, Invertible authentication, Proc. SPIE, Security and watermarking of multimedia contents, San Jose,
California, pp. 197-208, January 23-24, 2001.
M. Goljan, J. Fridrich and R. Du, Distortion-free data embedding, Proc. 4th Information Hiding Workshop, Pittsburgh, pp. 27-41, Apr. 2001.
Z. Ni, Y. Shi, N.Ansari and W. Su, Reversible data hiding, IEEE Trans. on Circuits and Systems for Video Technology, Vol.16, No.3,
March 2006.
R. Rivest, The MD5 Message-Digest Algorithm, In DDN Network Information Center, http://www.ietf.org/rfc/ rfc1321.txt, April 1992.
K. Sayood, Introduction to Data Compression, Morgan Kaufmann, 1996, pp. 87-94.
J. Fridrich, Symmetric Ciphers Based on Two-Dimensional Chaotic Maps, On Int. Journal of Bifurcation and Chaos, 8(6), pp. 1259-1284,
June 1998.
Mohammad Awrangjeb, An Overview of Reversible Data Hiding, ICCIT 2003, 19-21 Dec, Jahangirnagar University, Bangladesh, pp 75-79.
G. Xuan, J. Zhu, J. Chen, Y. Shi, Z. Ni and W. Su, Distortionless data hiding based on integer wavelet transform, IEE Electronics Letters,
Vol.38, No.25, pp. 1646-1648, Dec. 2002.
J. Tian, Wavelet Based Reversible Watermarking for Authentication, In Proc. Security and Watermarking of Multimedia Contents IV,
Electronic Imaging 2002, Vol. 4675, pp. 679-690, 20-25 January 2002.
J. Tian, Reversible Watermarking by Difference Expansion, In Proc. of Workshop on Multimedia and Security, pp. 19-22, December 2002.
B. Yang, M. Schmucker, W. Funk, C. Busch and S. Sun, Integer DCT-based reversible watermarking for images using companding
technique Proceeding of SPIE, Security and watermarking of Multimedia Content, San Jose (USA), 2004.
M. Celik, G. Sharma, A. Tekalp and E. Saber, Lossless generalized-LSB data embedding IEEE trans. on image processing, Vol.14, No.2,
February 2005.
376