Advertisement

Capacity-Approaching Codes for Reversible Data Hiding

  • Weiming Zhang
  • Biao Chen
  • Nenghai Yu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6958)

Abstract

By reversible data hiding, the original cover can be losslessly restored after the embedded information is extracted. Kalker and Willems established a rate-distortion model for reversible data hiding, in which they proved the capacity bound and proposed a recursive code construction. In this paper we improve the recursive construction by designing a data embedding method for all-zero covers and a more efficient compression algorithm. We prove that the proposed codes can approach the capacity bound under various distortion constraints. We also apply this coding method to RS method for spatial images, and the experimental results show that the novel codes can significantly reduce the embedding distortion.

Keywords

data hiding watermark reversible data hiding recursive construction arithmetic coder 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Fridrich, J., Goljan, M.: Lossless Data Embedding for All Image Formats. In: Proc. of EI SPIE, Security and Watermarking of Multimedia Contents IV, San Jose, vol. 4675, pp. 572–583 (2002)Google Scholar
  2. 2.
    Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless Generalized-LSB Data Embedding. IEEE Trans. on Image Processing 14(2), 253–266 (2005)CrossRefGoogle Scholar
  3. 3.
    Xuan, G., Shi, V., Chai, P., et al.: Reversible Binary Image Data Hiding by Run-Length Histogram Modification. In: 19th International Conference on Pattern Recognition, ICPR 2008 (2008)Google Scholar
  4. 4.
    Li, S., Kot, A.C.: Privacy Protection of Fingerprint Database Using Lossless Data Hiding. In: Proceedings of the 2010 IEEE International Conference on Multimedia and Expo., pp. 1293–1298 (2010)Google Scholar
  5. 5.
    Du, R., Fridrich, J.: Lossless Authentication of MPEG-2 Video. In: Proc. of IEEE International Conference on Image Processing, vol. 2, pp. 893–896 (2002)Google Scholar
  6. 6.
    Wong, K., Tanaka, K., Takagi, K., Nakajima, Y.: Complete Video Quality-Preserving Data Hiding. IEEE Trans. on Circuits and Systems for Video Technology 19(10), 1499–1512 (2009)CrossRefGoogle Scholar
  7. 7.
    Tian, J.: Reversible Data Embedding Using a Difference Expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)CrossRefGoogle Scholar
  8. 8.
    Thodi, D.M., Rodriguez, J.J.: Expansion Embedding Techniques for Reversible Watermarking. IEEE Trans. Image Process. 16(3), 721–730 (2007)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Hu, Y., Lee, H.-K., Li, J.: DE-based Reversible Data Hiding with Improved Overflow Location Map. IEEE Trans. Circuits Syst. Video Technol. 19(2), 250–260 (2009)CrossRefGoogle Scholar
  10. 10.
    Ni, Z., Shi, Y.Q., Ansari, N., Wei, S.: Reversible Data Hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)CrossRefGoogle Scholar
  11. 11.
    Tsai, P., Hu, Y.C., Yeh, H.L.: Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting. Signal Process. 89, 1129–1143 (2009)CrossRefzbMATHGoogle Scholar
  12. 12.
    Luo, L.X., Chen, Z.Y., Chen, M., et al.: Reversible Image Watermarking Using Interpolation Technique. IEEE Trans. Inf. Forensics and Security 5(1), 187–193 (2010)CrossRefGoogle Scholar
  13. 13.
    Kalker, T., Willems, F.M.: Capacity Bounds and Constructions for Reversible Data-Hiding. In: Proc. of 14th International Conference on Digital Signal Processing, DSP 2002, pp. 71–76 (2002)Google Scholar
  14. 14.
    Maas, D., Kalker, T., Willems, F.M.: A Code Construction for Recursive Reversible Data-Hiding. In: Proc. Multimedia and Security Workshop at ACM Multimedia, Juan-les-Pins, France (December 6, 2002)Google Scholar
  15. 15.
    Sayood, K.: Introduction to Data Compression, pp. 87–94. Morgan Kaufmann Publishers, San Francisco (1996)zbMATHGoogle Scholar
  16. 16.
    Crandall, R.: Some Notes on Steganography. Posted on steganography mailing list (1998), http://os.inf.tu-dresden.de/~westfeld/crandall.pdf
  17. 17.
    Miscelaneous gray level images, http://decsai.ugr.es/cvg/dbimagenes/g512.php

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Weiming Zhang
    • 1
    • 2
  • Biao Chen
    • 1
  • Nenghai Yu
    • 1
  1. 1.Department of Electrical Engineering & Information ScienceUniversity of Science and Technology of ChinaHefeiChina
  2. 2.Department of Information ResearchZhengzhou Information Science and Technology InstituteZhengzhouChina

Personalised recommendations