Advertisement

Multimedia Tools and Applications

, Volume 77, Issue 20, pp 26449–26467 | Cite as

Effective reversible image steganography based on rhombus prediction and local complexity

  • Thai-Son NguyenEmail author
  • Chin-Chen Chang
  • Tso-Hsien Shih
Article

Abstract

Reversible image steganography attracts much attention of researchers since such technique has ability to reconstruct the original version of the host image losslessly after image steganography. In this paper, we propose a new reversible image steganography based on rhombus prediction and local complexity. To maintain good quality of stego images and to achieve high accuracy of tamper detection, the local complexity of each pixel is first evaluated, then, the prediction error is calculated by using rhombus prediction for embedding the authentication code. Experimental results demonstrated that the proposed scheme has ability to recover the original version of the host images. In addition, the proposed scheme obtains better performance than previous schemes in terms of tamper detection and image quality.

Keywords

Image steganography tamper detection fragile watermark reversibility rhombus prediction 

Notes

Acknowledgements

This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.01-2016.06.

References

  1. 1.
    Chan CS (2011) An image steganography method by applying Hamming code on rearranged bits. Pattern Recogn Lett 32(14):1679–1690CrossRefGoogle Scholar
  2. 2.
    Chang CC, Nguyen TS, Lin CC (2013) A blind reversible robust watermarking scheme for relational databases. Sci World J (SWJ)Google Scholar
  3. 3.
    Chen S, Leung H (2008) Chaotic watermarking for video authentication in surveillance applications. IEEE Trans Circuits Syst Video Technol 18(5):704–709CrossRefGoogle Scholar
  4. 4.
    Chuang JC, Hu YC (2011) An adaptive image steganography scheme for vector quantization compressed image. J Vis Commun Image Represent 22(5):440–449CrossRefGoogle Scholar
  5. 5.
    Farid H (2009) Exposing digital forgeries from JPEG ghosts. IEEE Trans Inf Forens Secur 4(1):154–160CrossRefGoogle Scholar
  6. 6.
    Hu J, Li TR (2015) Reversible steganography using extended image interpolation technique. Comput Electr Eng 46:447–455CrossRefGoogle Scholar
  7. 7.
    Hu YC, Chen WL, Lo CC, Wu CM (2013) A novel tamper detection scheme for BTC compressed images. Opto-Electro Rev 21(1):137–146Google Scholar
  8. 8.
    Hu YC, Lo CC, Chen WL, Wen CH (2013) Joint image coding and image steganography based on absolute moment block truncation coding. J Electro Imaging 22(1):1–12Google Scholar
  9. 9.
    Huang FJ, Huang JW, Shi YQ (2012) New channel selection rule for JPEG steganography. IEEE Trans Inf Forens Sec 7(4):1181–1191CrossRefGoogle Scholar
  10. 10.
    Lee TY, Lin SFD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506MathSciNetCrossRefGoogle Scholar
  11. 11.
    Lo CC, Hu YC (2014) A novel reversible image steganography scheme for digital images. Signal Process 98:174–185CrossRefGoogle Scholar
  12. 12.
    Nguyen TS, Chang CC, Chung TF (2014) A tamper-detection scheme for BTC-compressed images with high-quality images. KSII Trans Internet Info Syst 8(6):2005–2012CrossRefGoogle Scholar
  13. 13.
    Nguyen TS, Chang CC, Huynh NT (2015) A novel reversible data hiding scheme based on difference-histogram modification and optimal EMD algorithm. J Vis Commun Image Represent 33:389–397CrossRefGoogle Scholar
  14. 14.
    Nguyen TS, Chang CC, Chang WC (2016) High capacity reversible data hiding scheme for encrypted images. Signal Process Image Commun 44:84–91CrossRefGoogle Scholar
  15. 15.
    Qin C, Chang CC, Chen PY (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137–1150CrossRefGoogle Scholar
  16. 16.
    Qin C, Chang CC, Chen KN (2013) Adaptive self-recovery for tampered images based on VQ indexing and inpainting. Signal Process 93:933–946CrossRefGoogle Scholar
  17. 17.
    Qin C, Chang CC, Huang YH, Liao LT (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circ Syst Video Technol 23(7):1109–1118CrossRefGoogle Scholar
  18. 18.
    Qin C, Chang CC, Horng G, Huang YH, Chen YC (2015) Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching. Sec Commun Netw 8(6):899–906CrossRefGoogle Scholar
  19. 19.
    Qin C, Chang CC, Hsu TJ (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed Tools Appl 74(15):5861–5872CrossRefGoogle Scholar
  20. 20.
    Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circ Syst Video Technol 19(7):989–999CrossRefGoogle Scholar
  21. 21.
    Stalling W (2003) Cryptography and network security: principles and practice, 3rd edn. Prentice-Hall, Upper Saddle River, NJGoogle Scholar
  22. 22.
    Swaminathan A, Wu M, Liu KJR (2008) Digital image forensics via intrinsic fingerprints. IEEE Trans Inf Forens Secur 2(3):101–117CrossRefGoogle Scholar
  23. 23.
    Tian WX, Chang CC, Nguyen TS, Li MC (Mar. 2013) Reversible data hiding for high quality image exploiting interpolation and direction order mechanism. Digital Signal Processing 23(2):569–577MathSciNetCrossRefGoogle Scholar
  24. 24.
    Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image steganography and ownership verification. IEEE Trans Image Process 10(10):1593–1601CrossRefGoogle Scholar
  25. 25.
    Wu HT, Tang SH, Huang JW, Shi YQ (2018) A novel reversible data hiding method with image contrast enhancement. Signal Process Image Commun 62:64–73CrossRefGoogle Scholar
  26. 26.
    Zhang XP, Wang SZ (2007) Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process Lett 14(10):727–730CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Engineering and TechnologyTra Vinh UniversityTra Vinh ProvinceVietnam
  2. 2.Department of Information Engineering and Computer ScienceFeng Chia UniversityTaichungRepublic of China
  3. 3.Department of Computer Science and Information EngineeringNational Chung Cheng UniversityChiayiRepublic of China

Personalised recommendations