An Adaptive Reversible Data Hiding Scheme for JPEG Images

  • Jiaxin Yin
  • Rui Wang
  • Yuanfang GuoEmail author
  • Feng Liu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10082)


Currently JPEG is the most popular image file format and the majority of images are stored in JPEG format due to storage constraint. Recently, reversible data hiding (RDH) for JPEG images draws researchers attention and has been developed rapidly. Due to the compression, performing RDH on a typical JPEG image is much more difficult than that on an uncompressed image. In this paper, we propose an adaptive reversible data hiding method for JPEG images, which is based on histogram shifting. We propose to select the optimal expandable bins-pair at image level by adopting a k-th nearest neighbors (KNN) algorithm. By developing a new block selection strategy, we can adaptively select the to-be-embedded blocks. Then, the message bits are embedded into the selected blocks at a specific bins-pair via the histogram shifting algorithm. Experimental results demonstrate that our proposed method can achieve a higher image quality and a less increased file size compared to the current state-of-the-art RDH method for JPEG images.


Reversible data hiding JPEG image KNN Histogram shifting 



This work was supported by National Key Research and Development Plan (No. 2016YFC0801004, 2016YFB0800100), National Natural Science Foundation of China (No. 61332012, 61671448), “Strategic Priority Research Program” of the Chinese Academy of Sciences (No. XDA06010701), and National Program for Support of Top-notch Young Professionals.


  1. 1.
    Altman, N.: An introduction to kernel and nearest-neighbor nonparametric regression. Am. Stat. 46(3), 175–185 (1992)MathSciNetGoogle Scholar
  2. 2.
    Bas, P., Filler, T., Pevný, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-24178-9_5 CrossRefGoogle Scholar
  3. 3.
    Fridrich, J., Goljan, M., Du, R.: Lossless data embedding: new paradigm in digital watermarking. EURASIP J. Appl. Sig. Process. 2002(1), 185–196 (2002)CrossRefzbMATHGoogle Scholar
  4. 4.
    Hu, Y., Wang, K., Lu, Z.: An improved VLC-based lossless data hiding scheme for JPEG images. J. Syst. Softw. 86(8), 2166–2173 (2013)CrossRefGoogle Scholar
  5. 5.
    Huang, F., Qu, X., Kim, H., Huang, J.: Reversible data hiding in JPEG images. IEEE Trans. Circ. Syst. Video Technol. 26(9), 1610–1621 (2016)CrossRefGoogle Scholar
  6. 6.
    Jaiswal, S.P., Au, O.C., Jakhetiya, V., Guo, Y., Tiwari, A.K., Yue, K.: Efficient adaptive prediction based reversible image watermarking. In: 2013 IEEE International Conference on Image Processing, pp. 4540–4544. IEEE (2013)Google Scholar
  7. 7.
    Li, Q., Wu, Y., Bao, F.: A reversible data hiding scheme for JPEG images. In: Proceedings of 11th Pacific Rim Conference on Multimedia, pp. 653–664 (2010)Google Scholar
  8. 8.
    Mobasseri, B., Berger, R., Marcinak, M.P., NaikRaikar, Y.: Data embedding in JPEG bitstream by code mapping. IEEE Trans. Image Process. 19(4), 958–966 (2010)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Ni, Z., Shi, Y., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16(3), 354–362 (2006)CrossRefGoogle Scholar
  10. 10.
    Nikolaidis, A.: Reversible data hiding in JPEG images utilising zero quantised coefficients. IET Image Proc. 9(7), 560–568 (2015)CrossRefGoogle Scholar
  11. 11.
    Pevnỳ, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of 12th International Workshop on Information Hiding, pp. 161–177, April 2010Google Scholar
  12. 12.
    Sakai, H., Kuribayashi, M., Morii, M.: Adaptive reversible data hiding for JPEG images. In: International Symposium on Information Theory and its Applications, ISITA 2008, pp. 1–6. IEEE (2008)Google Scholar
  13. 13.
    Subramanyam, A., Emmanuel, S., Kankanhalli, M.: Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Trans. Multimedia 14(3), 703–716 (2012)CrossRefGoogle Scholar
  14. 14.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Techn. 13(8), 890–896 (2003)CrossRefGoogle Scholar
  15. 15.
    Tuncer, T., Avci, E.: A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images. Displays 41, 1–8 (2016)CrossRefGoogle Scholar
  16. 16.
    Wallace, G.: The JPEG still picture compression standard. IEEE Trans. Consum. Electron. 38(1), xviii–xxxiv (1992)Google Scholar
  17. 17.
    Wang, K., Lu, Z., Hu, Y.: A high capacity lossless data hiding scheme for JPEG images. J. Syst. Softw. 86(7), 1965–1975 (2013)CrossRefGoogle Scholar
  18. 18.
    Wang, Z.H., Zhuang, X., Chang, C.C., Qin, C., Zhu, Y.: Reversible data hiding based on geometric structure of pixel groups. Int. J. Netw. Secur. 18(1), 52–59 (2016)Google Scholar
  19. 19.
    Xuan, G., Shi, Y.Q., Ni, Z., Chai, P., Cui, X., Tong, X.: Reversible data hiding for JPEG images based on histogram pairs. In: Kamel, M., Campilho, A. (eds.) ICIAR 2007. LNCS, vol. 4633, pp. 715–727. Springer, Heidelberg (2007). doi: 10.1007/978-3-540-74260-9_64 CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Jiaxin Yin
    • 1
    • 3
  • Rui Wang
    • 1
  • Yuanfang Guo
    • 1
    Email author
  • Feng Liu
    • 1
    • 2
  1. 1.State Key Laboratory of Information Security, Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  2. 2.School of Cyber SecurityUniversity of Chinese Academy of SciencesBeijingChina
  3. 3.School of Computer and Control EngineeringUniversity of Chinese Academy of SciencesBeijingChina

Personalised recommendations