Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Reversible Data Hiding Using Contrast Enhancement Approach
Amjed S. Al-Fahoum, Mohammed Yaser
Pages - 248 - 265     |    Revised - 15-05-2013     |    Published - 30-06-2013
Volume - 7   Issue - 3    |    Publication Date - June 2013  Table of Contents
Reversible Data Hiding, Histogram, Stenography, Performance, Watermarking.
Reverse Data Hiding is a technique used to hide the object's data details. This technique is used to ensure the security and to protect the integrity of the object from any modification by preventing intended and unintended changes. Digital watermarking is a key ingredient to multimedia protection. However, most existing techniques distort the original content as a side effect of image protection. As a way to overcome such distortion, reversible data embedding has recently been introduced and is growing rapidly. In reversible data embedding, the original content can be completely restored after the removal of the watermark. Therefore, it is very practical to protect legal, medical, or other important imagery. In this paper a novel removable (lossless) data hiding technique is proposed. This technique is based on the histogram modification to produce extra space for embedding, and the redundancy in digital images is exploited to achieve a very high embedding capacity. This method has been applied to various standard images. The experimental results have demonstrated a promising outcome and the proposed technique achieved satisfactory and stable performance both on embedding capacity and visual quality. The proposed method capacity is up to 129K bits with PSNR between 42-45dB. The performance is hence better than most exiting reversible data hiding algorithms.
1 CiteSeerX 
2 refSeek 
3 Scribd 
4 SlideShare 
5 PdfSR 
1 . G.Braudway, K. Magerlin. And F. Mintezer. "protecting publicity available images with a visual image watermark," Proc. SPIE: optical security and Counterfeit Deterrence Techniques, Vol.2659. pp.126-133, 1996.
2 . B.Macq and J.Quisquater. "Cryptology for Digital TV broadcasting," Proc. Of IEEE. Vol. 83.No.6, pp 944-957, June 1995.
3 . W. Zeng, “Digital watermarking and data hiding: technologies and applications,” in Proc. Int.Conf. Inf. Syst., Anal. Synth., vol. 3, pp. 223–229, , 1998.
4 . N. Zhichenge, ,Y. Q. Shi,N. Ansari, and W. Su,“ Reversible Data Hiding” IEEE Transactions on circuits and systems for video technology, vol.16, No. 3, March 2006.
5 . J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673–1687, Dec. 1997.
6 . Z. Tirkel, C. F. Osborne, and R. G. Van Schyndel, “Image watermarking a spread spectrum application,” in Proc. IEEE 4th Int. Symp. Spread Spectrum Techn. Applicat., vol. 2, pp. 785–789, Sep. 1996.
7 . A. van Leest, M. van der Veen, and F. Bruekers, “Reversible Image Watermarking,” in Proc.Int. Conf. Image Processing, Vol. 2, pp. 731-734, 2003.
8 . J. Huang and Y. Q. Shi, “An adaptive image watermarking scheme based on visual masking,”Electron. Lett., vol. 34, no. 8, pp. 748–750, 1998.
9 . J. Huang, Y. Q. Shi, and Y. Shi, “Embedding image watermarks in DC component,” IEEE Trans. Circuits Syst.: Video Technol., vol. 10, no. 6, pp. 974–979, Sep. 2000.
10 . J. Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Trans. Circuits and Systems for Video Technology, Vol. 13, No. 8, pp. 890-896, 2003.
11 . J. Irvine and D. Harle, Data Communications and Networks: An Engineering Approach. New York: Wiley, 2002.
12 . B. Macq and F. Deweyand, “Trusted headers for medical images,” presented at the DFG VIII-D II Watermarking Workshop, Erlangen, Germany, Oct. 1999.
13 . M. M. Yeung and F. C. Mintzer, “Invisible watermarking for image verification,” Electron.Imag., vol. 7, no. 3, pp. 578–591, Jul. 1998.
14 . B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inf. Theory, vol.47, no. 4, pp. 1423–1443, May 2001.
15 . C. De Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular interpretation on histogram for reversible watermarking,” in IEEE Int. Multimedia Signal Process. Workshop, France, pp.345–350, Oct. 2001.
16 . C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel, “Lossless Recovery of an Original Image Containing Embedded Data,” U.S. Patent 6 278 791 B1, Aug. 21, 2001.
17 . J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,” in Proc. SPIE Security Watermarking Multimedia Contents, San Jose, CA, pp. 197–208, Jan. 2001,.
18 . M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Reversible data hiding,” in Proc. IEEE Int. Conf. Image Process., vol. 2, Sep. 2002, pp. 157–160.
19 . F. Perez-Gonzlez and F. Balado, “Quantized projection data hiding,” in Proc. IEEE Int. Conf.Image Process., vol. 2, pp. 889–892, Sep. 2002.
20 . T. Kalker, and F.M.J Willems, “Capacity Bounds and Code Constructions for Reversible Data-Hiding,” in Proc. Electronic Imaging, Security, and Watermarking of Multimedia Contents V, 2003.
21 . G. Xuan, J. Zhu, J. Chen, Y. Q. Shi, Z. Ni, and W. Su, “Distortion less data hiding based on integer wavelet transform,” IEE Electron. Lett., vol. 38, no. 25, pp. 1646–1648, Dec. 2002.
22 . W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Syst. J., vol.35, no. 3–4, pp. 313–336, 1996.
23 . Y. Q. Shi, Z. Ni, D. Zou, and C. Liang, “Lossless data hiding: fundamentals, algorithms and applications,” in IEEE Int. Symp. Circuits Syst., Vancouver, Canada, pp. 33–36, May 2004.
24 . M. Goljan, J. Fridrich, and R. Du, “Distortion-free data embedding,” in Proc. 4th Inf. Hiding Workshop, Pittsburgh, PA, pp. 27–41, , Apr. 2001.
25 . R. Calderbank, I. Daubechies, W. Sweldens, and B. Yeo, “Wavelet transforms that map integers to integers,” Appl. Comput. Harmonic Anal., vol. 5, no. 3, pp. 332–369, 1998.
26 . Daubechies and W. Sweldens, “Factoring wavelet transforms into lifting steps,” J. Fourier Anal. Appl., vol. 4, pp. 247–269, 1998.
27 . Park, J. Y., Lim, J. H., Kim, G. S. and Won, C.S. “Invertible Semi-Fragile Watermarking Algorithm Distinguishing MPEG-2 Compression from Malicious Manipulation,” in Proc. Int.Conf. Consumer Electronics (ICCE ’02), pp.18-19, 2002.
28 . Yang, Y. and Bao, F. “An Invertible Watermarking Scheme for Authentication of Electronic Clinical Brain Atlas,” in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing(ICASSP '03), Vol. 3, pp. 533-536, 2003.
29 . Zou D., Wu, C. W., Xuan, G. and Shi, Y.Q. “A Content-Based Image Authentication System with Lossless Data Hiding,” in Proc. Int. Conf. Multimedia and Expo (ICME '03), Vol. 2, pp.213-216, 2003.
30 . P. Roos, M. A. Viegerver, M.C.A Van Dijke, and J. A. Peters, “Reversible Intraframe of Medical Images,” IEEE Trans. Medical Image, Vol. 7, pp. 328-336, 1998.
31 . J. Y.Park, J. H. Lim, G.S. Kim, and C. S. Won, “Invertible Semi-Fragile Watermarking Algorithm Distinguishing MPEG-2 Compression from Malicious Manipulation,” in Proc. Int.Conf. Consumer Electronics (ICCE ’02), pp.18-19, 2002.
32 . X. Luo, Q. Cheng, and J. Tan, “A Lossless Data Embedding Scheme for Medical Images in Application of E-Diagnosis,” in Proc. IEEE 25th Annual Int. Conf. Engineering in Medicine and Biology Society, Vol. 1, pp. 852-855, 2003.
33 . C. T. Hsu and J. L. Wu: Hidden Digital Watermarks in Images, IEEE Transactions on Image Processing,,58-68, 1999.
34 . Y. K. Lin " High capacity reversible data hiding scheme based upon discrete cosine Transformation" , The Journal of System and Software, vol:85(10), pp:2395-2404, 2012.
35 . P. Tsai, Y. ChenHu, , H.L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting" Signal Processing , pp: 1129-1143, 2009.
36 . W. Hong, T. S. Chen, " A local variance-controlled reversible data hiding method using prediction and histogram-shifting" The Journal of System and Software,vol. 83 (12), pp: 2653-2663, 2010.
37 . Ch. Ch. Chang, Y. H. Huang, H. Y. Tsai, and Ch. Qin," Prediction-based reversible data hiding using the difference of neighboring pixels" International Journal of Electronics and Communication (AEU),vol. 66. issue 9, pp:758:766, 2012.
Associate Professor Amjed S. Al-Fahoum
Hijjawi Faculty for Eng. Tech./Biomedi Yarmouk University Irbid,21163 - Jordan
Mr. Mohammed Yaser
Hijjawi Faculty for Eng. Tech./Biomedi Yarmouk University Irbid,21163 - Jordan