Skip to main content

Reversible Shared Data Hiding Based on Modified Signed Digit EMD

  • Conference paper
  • First Online:
Digital-Forensics and Watermarking (IWDW 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9023))

Included in the following conference series:

  • 1273 Accesses

Abstract

The reversible data hiding schemes not only extract the embedded secret data from the stego-image but also recover the original cover image. This can be extended for use with multiple parties where the embedded secret data is undecipherable unless all members contribute. Recently, Chang et al. [2] proposed a reversible data hiding scheme based on EMD (Exploiting Modification Direction) which can be used for this purpose. However, the capacity of EMD decreases quickly with the increased number of stego-images. To address this disadvantage, we will propose a reversible data hiding scheme based on modified signed digit EMD in this paper. According to our experiments, this scheme achieves the requirement of reversible shared data hiding and keeping good image quality but also maintains embedding capacity of least 1 bpp (bits per pixel).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdulla, A.A., Jassimand, S.A., Sellahewa, H.: Efficient high-capacity steganography technique. In: Proceedings of SPIE8755, Mobile Multimedia/Image Processing, Security, and Applications (2013)

    Google Scholar 

  2. Chang, C.C., Huynh, N.T., Lin, C.C.: Strong tamper-localization, visual secret sharing scheme based on exploiting modification direction. In: 2012 Seventh Asia Joint Conference Information Security (Asia JCIS), pp. 10–16, August 2012

    Google Scholar 

  3. Jedwab, J., Mitchell, C.J.: Minimum weight modified signed-digit representation and fast exponentiation. Electron. Lett. 25(17), 1171–1173 (1989)

    Article  MATH  Google Scholar 

  4. Kuo, W.C., Wuu, L.C., Shyi, C.N., Kuo, S.H.: A data hiding scheme with high embedding capacity based on general improving exploiting modification direction method. In: The Ninth International Conference on Hybrid Intelligent Systems (HIS2009), pp. 69–73, August 2009

    Google Scholar 

  5. Kuo, W.C., Wang, C.C.: Data hiding based on generalised exploiting modification direction method. J. Imaging Sci. 61(6), 484–490 (2013)

    Article  Google Scholar 

  6. Kuo, W.C., Hou, H.C., Chuang, C.T.: Data hiding scheme based on binary coefficient EMD. In: NCS 2013, 13–14 December 2013

    Google Scholar 

  7. Lee, F.C., Wang, Y.R., Chang, C.C.: A steganographic method with high embedding capacity by improving exploiting modification direction. In: Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), pp. 497–500 (2007)

    Google Scholar 

  8. Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 1–3 (2006)

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported by MOST 103-2221-E-224 -046.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wen-Chung Kuo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kuo, WC., Wang, CC., Hou, HC., Chuang, CT. (2015). Reversible Shared Data Hiding Based on Modified Signed Digit EMD. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19321-2_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19320-5

  • Online ISBN: 978-3-319-19321-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics