Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

A novel reversible data hiding scheme by introducing current state codebook and prediction strategy for joint neighboring coding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Reversible data hiding (RDH) in compression domain is an important research issue in the security of digital multimedia. Obtaining a high embedding rate and a low compression rate are the main goals of compression domain RDH. This paper proposes a novel RDH scheme to improve joint neighboring coding (JNC) scheme. In embedding process, the first index SC 1st in current state codebook (SC) and median edge detector (MED) prediction P med are exploited. These two parameters are employed to replace the right-up and left-up neighboring SMVQ indices, which have lower correlation with the current index. As a result, a more concentrated distribution of difference “d” is obtained. Difference “d” is computed by the difference between the current SMVQ index and its left, upper neighboring indices, P med and SC 1st after embedding secret bits. The experimental results show that our work achieves the average compression rate of 0.45/0.51/0.57 bpp and the average embedding efficiency of 0.28/0.36/0.43 after embedding 2/3/4 bits secret data into each SMVQ index. As demonstrated in the comparative results, it can be observed that the proposed scheme outperforms the other previous works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Bentley JL, Sleator DD, Tarjan RE, Wei VK (1986) A locally adaptive data compression scheme. Commun ACM 29(4):320–330

    Article  MathSciNet  MATH  Google Scholar 

  2. Chang CC, Lu TC (2006) A difference expansion oriented data hiding scheme for restoring the original host images. J Syst Softw 79(12):1754–1766

    Article  Google Scholar 

  3. Chang CC, Kieu TD, Wu WC (2009) A lossless data embedding technique by joint neighboring coding. Pattern Recogn 42(7):1597–1603

    Article  MATH  Google Scholar 

  4. Chang CC, Nguyen TS, Lin CC (2014) Reversible data embedding for indices based on histogram analysis. J Vis Commun Image Represent 25(7):1704–1716

    Article  Google Scholar 

  5. Chen X, Sun X, Sun H, Zhou Z, Zhang J (2013) Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. J Syst Softw 86(10):2620–2626

    Article  Google Scholar 

  6. Fridrich J, Goljan M, Du R (2002) Lossless data embedding-new paradigm in digital watermarking. Spec Issue Emerg Appl Multimed Data Hiding 2002(2):185–196

    MATH  Google Scholar 

  7. Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications E98.B(1):190–200

  8. Gray RM (1984) Vector quantization. IEEE ASSP Mag 1(2):4–29

    Article  Google Scholar 

  9. Huang HC, Wang FH, Pang JS (2001) Efficient and robust watermarking algorithm with vector quantization. Electron Lett 37(13):826–828

    Article  Google Scholar 

  10. Huang HC, Wang FH, Pan JS (2002) A VQ-based robust multi-watermarking algorithm. IEICE Trans Fundam E-85A(7):1719–1726

    Google Scholar 

  11. Kieu TD, Ramroach S (2015) A reversible steganographic scheme for VQ indices based on joint neighboring coding. Expert Syst Appl 42(2):713–722

    Article  Google Scholar 

  12. Kim T (1992) Side match and overlap match vector quantizers for Images. IEEE Trans Image Process 1(2):170–185

    Article  Google Scholar 

  13. Lee JD, Chiou YH, Guo JM (2010) Reversible data hiding based on histogram modification of SMVQ indices. IEEE Trans Inf Forensics Secur 5(4):638–648

    Article  Google Scholar 

  14. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287

    Article  Google Scholar 

  15. Qin C (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969–978

    Article  MathSciNet  MATH  Google Scholar 

  16. Qin C, Chang CC, Huang YH, Liao LT (2013a) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23(7):1109–1118

    Article  Google Scholar 

  17. Qin C, Chang CC, Chen YC (2013b) Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Process 93(9):2687–2695

    Article  Google Scholar 

  18. Qin C, Chang CC, Horng G, Huang YH, Chen YC (2015a) Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching. Secur Commun Netw 8(6):899–906

    Article  Google Scholar 

  19. Qin C, Chang CC, Hsu TJ (2015b) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed Tools Appl 74(15):5861–5872

    Article  Google Scholar 

  20. Wang SY (2013) Reversible data hiding based on two-dimensional prediction errors. IET Image Process 7(9):805–816

    Article  Google Scholar 

  21. Wang J, Lu Z (2009) A path optional lossless data hiding scheme based on VQ joint neighboring coding. Inf Sci 179(9):3332–3348

    Article  Google Scholar 

  22. Wang WJ, Huang CT, Liu CM, Su PC, Wang SJ (2013) Data embedding for vector quantization image processing on the basis of adjoining state codebook mapping. Inf Sci 246:69–82

    Article  MathSciNet  Google Scholar 

  23. Wang L, Pan Z, Ma X, Hu S (2014) A novel high-performance reversible data hiding scheme using SMVQ and improved locally adaptive coding method. J Vis Commun Image Represent 25(2):454–465

    Article  Google Scholar 

  24. Weinberger MJ, Seroussi G, Sapiro G (2000) The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS. IEEE Trans Image Process 9(8):1309–1324

    Article  Google Scholar 

  25. Wright MA (2001) The advanced encryption standard. Netw Secur 10:11–13

    Article  Google Scholar 

  26. Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27(2):340–352

  27. Yang B, Lu ZM, Sun SH (2005) Reversible watermarking in the VQ-compressed domain. Proc Fifth IASTED Int Conf Visualization, Imag, Image Process, Benidorm, Spain: 298–303

  28. Zhang XP, Wang SZ (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):1–3

    Article  Google Scholar 

  29. Zhou X, Lai D, Yuan S, Li DH, Hu JP (2007) A method for hiding information utilizing double-random phase-encoding technique. Opt Laser Technol 39(7):1360–1363

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported in part by the Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD), the Open Research Fund of Key Laboratory of Spectral Imaging Technology, Chinese Academy of Sciences (Grant No. LSIT201606D), the Key Science and Technology Program of Shaanxi Province (Grant No. 2016GY-097) and the Industrial Program of Zhejiang Province (Grant No. 2016C31G4180003).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhibin Pan.

Additional information

Highlights

• We use SMVQ index map to replace VQ index map in joint neighboring coding (JNC).

• We use the first index in current state codebook replacing right-up neighboring index.

• We use median edge detector (MED) prediction replacing left-up SMVQ neighboring index.

• Higher correlation leads to a better distribution of “d” and enhances the performance.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, L., Pan, Z. & Zhu, R. A novel reversible data hiding scheme by introducing current state codebook and prediction strategy for joint neighboring coding. Multimed Tools Appl 76, 26153–26176 (2017). https://doi.org/10.1007/s11042-016-4000-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4000-3

Keywords

Navigation