A Turtle Shell based RDH scheme with two-dimensional histogram shifting
A turtle shell (TS) based reversible data hiding (RDH) scheme with two-dimensional histogram shifting (HS) is proposed. The proposed scheme extends the embeddable set from a peak point in HS scheme to a two-dimensional region, so as to improve the embedding capacity (EC). Firstly, a threshold T is used to divide the pixel-pairs into three groups: left-shifting set without embedding (LSS), right-shifting set without embedding (RSS), and embeddable set (ES). Secondly, pixel-pairs in sets LSS and RSS are shifted outward to vacate room for embedding. Lastly, secret data are embedded into pixel-pairs in set ES. After that, the embedded data can be extracted accurately and the cover image can be recovered losslessly. Furthermore, various requirements of EC can be obtained by adjusting the threshold T. Experimental results verify that this paper can achieve a higher EC than the existing pairwise based schemes while maintaining an acceptable image quality.
KeywordsTurtle shell Reversible data hiding Histogram shifting High capacity
This work is supported by Natural Science Foundation of P. R. China under Grant 61503316, Natural Science Foundation of Fujian Province under Grant 2018 J01572 and Open Fund of Engineering Research Center for Software Testing and Evaluation of Fujian Province.
- 6.Chang CC, Chou YC, Kieu TD (2008) “An information hiding scheme using Sudoku,” proceedings of the third international conference on innovative computing information and control. Dalian, China, pp 17–22Google Scholar
- 9.Barton JM (1997) “Method and apparatus for embedding authentication information within digital data,” U.S. Patent 5(646):997Google Scholar
- 12.Lin CC, Yang SP, Hsueh NL (2008) Lossless data hiding based on difference expansion without a location map. In: Proceedings of congress on image and signal processing (CISP '08), pp 8–12Google Scholar
- 14.Ni Z, Shi YQ, Ansari N, Wei S (2006) “Reversible data hiding,” IEEE transactions on circuits and Systems for Video. Technology 16(3):354–362Google Scholar
- 16.Yan Y, Cao W, Li S (2009) High capacity reversible image authentication based on difference image watermarking. Proc IEEE Int Workshop Image Syst Tech:179–182Google Scholar
- 22.He W, Xiong G, Weng S et al (2018) Reversible data hiding using multi-pass pixel-value-ordering and pairwise prediction-error expansion. Inf Sci:1–16Google Scholar
- 23.Cao F, An B, Yao H et al (2018) Local complexity based adaptive embedding mechanism for reversible data hiding in digital images. Multimed Tools Appl:1–16Google Scholar
- 26.Kim PH, Kim DS, Yoo KY (2015) “Improved histogram-shifting-imitated reversible data hiding scheme,” proceedings of information technology-new generations. Las Vegas, USA, pp 668–673Google Scholar
- 30.Liu Y, Chang CC (2018) A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimed Tools Appl 3:1–16Google Scholar
- 31.The USC-SIPI Image Database [Online]. Available: http://sipi.usc.edu/database/