Skip to main content

Advertisement

Log in

A multi-layered “plus-minus one” reversible data embedding scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Reversible Data Hiding (RDH) is one of the most well-known methods adopted for concealed communication. One of the major issues in RDH is the overflow/underflow which exists in almost all the embedding techniques. This is a major issue which hinders the hiding capacity in many existing techniques. In the proposed novel LSB ODD/EVEN embedding algorithm, neither histogram modification (which involves shifting) nor difference expansion (which involves shifting and expansion of error) techniques are involved. No overflow/underflow problem is reported in the proposed method and involves multilayer embedding. Performance of this approach or any data hiding schemes are usually measured in terms of MSE, PSNR, and SSIM. After multiple layer of embedding the PSNR for 1.5 bpp stands at 43 dB approximately. This approach is tested over standard test images that includes medical images also and compared with well-known existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Abadi MAM, Danyali H, Helfroush MS (2010) Reversible watermarking based on interpolation error histogram shifting. 5th International Symposium on Telecommunications (IST), Kish Island, Iran, pp 840–845

  2. Abdulla AA, Jassim SA, Sellahewa H (2013) Secure Steganography Technique Based on Bitplane Indexes, vol 2013. IEEE International symposium on multimedia, Anaheim, pp 287–291. https://doi.org/10.1109/ISM.2013.55

  3. Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition. Proc. SPIE 9120, Mobile Multimedia/ Image Processing, Security, and Applications 2014, 912005. 10.1117 /12.2050518

  4. Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78:17799–17823. https://doi.org/10.1007/s11042-019-7166-7

    Article  Google Scholar 

  5. Arsalan M, Sana AM, Asifullah K (2012) Intelli-gent reversible watermarking in integer wavelet domain for medical im-ages. J Syst Software Elsevier 85:883–894

    Article  Google Scholar 

  6. Atawneh S, Almomani A, Al Bazar H et al (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76:18451–18472. https://doi.org/10.1007/s11042-016-3930-0

    Article  Google Scholar 

  7. Bao F, Deng R-H, Ooi B-C, Yang Y (2005) Tailored reversible watermarking schemes for authentication of electronic clinical atlas IEEE Trans Inf Technol Biomed 9(4):554–563

  8. Barton JM (1997) Method and apparatus for embedding authentication information within digital data, U.S. Patent 5,646,997

  9. Caldelli R, Filippini F, Becarelli R (2010) Reversible watermarking techniques: an overview and a classification. EURASIP J Inf Secur. https://doi.org/10.1155/2010/134546

  10. Cancellaro M, Battisti F, Carli M, Boato G, De Natale FGB, Neri A (2011) A commutative digital image watermarking and encryption method in the tree structured Haar transform domain. Signal Process, Image Commun 26(1):1–12

    Article  Google Scholar 

  11. Celik MU, Sharma G, Tekalp AM, Saber E (2005) Losslessgeneralized-LSB data embedding. IEEE Trans Image Process 14(2):253–266

    Article  Google Scholar 

  12. Celik MU, Sharma G, Tekalp AM (2006) Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans. Image Process 15(4):1042–1049. https://doi.org/10.1109/TIP.2005.863053

  13. Coatrieux G, Le Guillou C, Cauvin J-M, Roux C (2009) Reversible watermarking for knowledge digest embedding an reliability control in medical images. IEEE Trans Inf Technol Biomed 13(2):158–165

    Article  Google Scholar 

  14. Coltuc D (2011) Improved embedding for prediction-based reversible watermarking. IEEE Trans Inf Forensic Secur 6(3):873–882. https://doi.org/10.1109/TIFS.2011.2145372

    Article  Google Scholar 

  15. Coltuc D, Caciula I (2009) Stereo embedding by reversible watermarking:Further results. In Proc. Int Symp Signals Circuits Syst, pp 1–4

  16. Coltuc D, Chassery JM (2007) Very fast watermarking by reversible contrast mapping. IEEE Signal Process Lett 14(4):255–258

    Article  Google Scholar 

  17. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann, San Mateo

    Google Scholar 

  18. Eswaraiah R, Sreenivasa Reddy E (2014) Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl vol

  19. Fallahpour M, Sedaaghi MH (2007) High capacity lossless data hiding based on histogram modification. IEICE Electron Exp 4(7):205–210

    Article  Google Scholar 

  20. Fridrich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge Univ. Press, Cambridge

    Book  Google Scholar 

  21. Fridrich J ,Goljan M, Du R (2001) Invertible authentication, in:Security and Watermarking of Multimedia Contents III,vol.4314, SPIE, pp 197–208

  22. Fridrich J, Goljan M, Du R (2002) Lossless data embedding new paradigm in digital watermarking,EURASIP. J Appl Signal Process 2(2002):185–196

    MATH  Google Scholar 

  23. Geetha R, Geetha S (2018) Improved reversible data embedding in medical images using I-IWT and pairwise pixel difference expansion. Smart and innovative trends in NGCT 2017, CCIS 828, springer Nature pp 601–611

  24. Gui X, Li X, Yang B (2014) A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Process 98:370–380. https://doi.org/10.1016/j.sigpro.2013.12.005

    Article  Google Scholar 

  25. Hirak KM, Santi PM (2012) Joint robust and reversible watermarking for medical images. 2nd international conference on communication, Computing & Security [ICCCS-2012], Elsevier. Procedia Technol 6:275–282

    Article  Google Scholar 

  26. Honsinger CW, Jones PW, Rabbani M, Stoffel JC (2001) Lossless recovery of an original image containing embedded data. U.S. Patent 6 278 791 B1, 21 Aug 2001

  27. Jung K, Yoo K (2009) Data hiding method using image interpolation. Comput Stand Interfaces 31:465–470. https://doi.org/10.1016/j.csi.2008.06.001

    Article  Google Scholar 

  28. Kamstra L, Heijmans HJAM (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082–2090

    Article  MathSciNet  Google Scholar 

  29. Lee CF, Huang YL (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl Elsevier 39:6712–6719

    Article  Google Scholar 

  30. Lee S-K, Suh Y-H, Ho Y-S (2006) Reversible image authentication based on watermarking. In Proc. IEEE Int. Conf. Multimedia Expo, pp 1321–1324

  31. Li X, Yang B, Zeng T (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20(12):3524–3533

  32. Lian S, Liu Z, Ren Z, Wang H (2007) Commutative encryption and watermarking in video compression. IEEE Trans Circuits Syst Video Technol 17(6):774–778

    Article  Google Scholar 

  33. Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187–193

    Article  Google Scholar 

  34. Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hidingin encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8(3):553–562

    Article  Google Scholar 

  35. Ni Z, Shi Y-Q, Ansari N, Su W (2003) Reversible data hiding. In: ISCAS Proceedings of the 2003 International Symposium on Circuits and Systems, Bangkok, pp II-912–II-915

  36. Otsu N (1979) A threshold selection method from gray-level histograms. IEEE Trans Syst Man Cybern 9(1):62–66

    Article  MathSciNet  Google Scholar 

  37. Ou B, Li X, Zhao Y, Ni R, Shi Y (Dec. 2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans Image Process 22(12):5010–5021

    Article  MathSciNet  Google Scholar 

  38. Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Informatics 66:214–230. https://doi.org/10.1016/j.jbi.2017.01.006

    Article  Google Scholar 

  39. Peng F, Lei Y-Z, Long M, Sun X-M (2011) A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput-Aided Design 43(8):1018–1024

    Article  Google Scholar 

  40. Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst VideoTechnol 19(7):989–999

    Article  Google Scholar 

  41. Schmitz R, Li S, Grecos C, Zhang X (2012) A new approach to commutative watermarking-encryption In Proc. 13th Joint IFIP TC6/TC11 Conf Commun Multimedia Secur pp 117–130

  42. Shi YQ (2004) Reversible data hiding,” in Proc. Int. Workshop Digit.Watermarking, pp. 1–12

  43. Shi YQ, Ni Z, Zou D, Liang C, Xuan G (2004) Lossless data hiding:Fundamentals, algorithms and applications. Proc IEEE Int Symp Circuits Syst 2:33–36. https://doi.org/10.1109/ISCAS.2004.1329201

    Article  Google Scholar 

  44. Thodi DM, Rodriguez JJ (Mar. 2007) Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process 16(3):721–730

    Article  MathSciNet  Google Scholar 

  45. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst 13(8):890–896

    Google Scholar 

  46. Tong X et al (2014) Stereo image coding with histogram-pair based reversible data hiding, in Proc. Int. Workshop Digital-Forensics Watermarking, pp 201–214

  47. Wang X, Shao C, Xu X, Niu X (2007) Reversible data-hiding scheme for 2-D vector maps based on difference expansion. IEEE Trans Inf Forensics Secur 2(3):311–320

    Article  Google Scholar 

  48. Weng S, Zhao Y, Pan J-S, Ni R (2008) Reversible watermarking based on invariability and adjustment on pixel pairs. IEEE Signal Process Lett 15:721–724

    Article  Google Scholar 

  49. Wu H-T, Dugelay J-L, Shi Y-Q (2015) Reversible image data hiding with contrast enhancement. IEEE Signal Process Lett 22(1):81–85. https://doi.org/10.1109/LSP.2014.2346989

    Article  Google Scholar 

  50. XuanG, Shi YQ, Chai P, Cui X, Ni Z, Tong X (2007) Optimum histogram pair based image lossless data embedding, In Proc Int Workshop Digit Watermarking pp 264–278

  51. Yi S, Zhou Y, Hua Z (2018) Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Process Image Commun 64(January):78–88. https://doi.org/10.1016/j.image.2018.03.001

    Article  Google Scholar 

  52. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258

    Article  Google Scholar 

  53. Zhang W, Chen B, Yu N (2012) Improving various reversible data hiding schemes via optimal codes for binarycover. IEEE TransImage Process 21(6):2991–3003

    Article  Google Scholar 

  54. Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94(1):118–127. https://doi.org/10.1016/j.sigpro.2013.06.023

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Geetha.

Ethics declarations

Conflict of interest

Author A declares that he/she has no conflict of interest. Author B declares that he/she has no conflict of interest.

Ethical approval

This article does not contain any studies with human participants performed by any of the authors.

(Or) Ethical approval: This article does not contain any studies with animals performed by any of the authors.

(Or) Ethical approval: This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Geetha, R., Geetha, S. A multi-layered “plus-minus one” reversible data embedding scheme. Multimed Tools Appl 80, 14123–14136 (2021). https://doi.org/10.1007/s11042-021-10514-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10514-x

Keywords

Navigation