DOI QR코드

DOI QR Code

A novel Reversible Data Hiding Scheme based on Modulo Operation and Histogram Shifting

모듈러 연산과 히스토그램 이동에 기반한 새로운 가역 정보 은닉 기법

  • 김대수 (경북대학교 정보보호학과) ;
  • 유기영 (경북대학교 IT 대학 컴퓨터학부)
  • Received : 2011.11.10
  • Accepted : 2012.03.13
  • Published : 2012.05.31

Abstract

In 2009, Tsai et al. proposed reversible image hiding scheme using linear prediction coding and histogram shifting. Tsai et al.'s scheme improved the hiding capacity of Ni et al.'s scheme by using the prediction coding and two histograms. However, Tsai et al.'s scheme has problems. In the prediction coding, the basic pixel is not used from embedding procedure. Many additional communication data are generated because two peak and zero point pairs are generated by each block. To solve the problems, this paper proposes a novel reversible data hiding scheme based on modulo operation and histogram shifting. In experimental results, the hiding capacity was increased by 28% than Tsai et al.'s scheme. However, the additional communication data was decreased by 71%.

Tsai 등은 2009년에 예측 코딩과 히스토그램 이동 기법을 이용한 가역 은닉 방법을 제안하였다. Tsai 등의 방법은 비밀 정보를 숨길 수 있는 양을 향상시키기 위해 예측 코딩을 이용하고, 히스토그램을 두 개 생성하였다. 하지만, 예측 코딩은 삽입과정에서 기준 픽셀이 사용되지 않고, 히스토그램을 두 개로 나누는 방법은 한 블록마다 두 쌍의 최대값과 최소값이 생성되기 때문에 기존 히스토그램 이동 기법보다 많은 양의 추가 전송 데이터가 발생하게 된다. 이러한 문제점을 해결하기 위해 본 논문에서는 모듈러 연산과 히스토그램 이동에 기반한 새로운 가역 정보 은닉 기법을 제안한다. 실험결과를 통해 제안한 방법의 비밀 정보를 숨길 수 있는 양은 Tsai 등의 방법보다 28% 증가 하면서도 추가 전송 데이터의 양은 71% 감소하는 것을 볼 수 있었다.

Keywords

References

  1. D. Artz, "Digital Steganography: Hiding Data Within Data," IEEE Internet Computing, Vol. 5, No.3, pp. 75-80, 2001. https://doi.org/10.1109/4236.935180
  2. R.Z.Wang, C.F. Lin, and J.C. Lin, "Image Hiding by Optimal LSB Substitution and Genetic Algorithm," Pattern Recognition, Vol.34, No.3, pp. 671-683, 2001. https://doi.org/10.1016/S0031-3203(00)00015-7
  3. C.C. Chang, Y.H. Yu, and Y.C. Hu, "Hiding Secret Data in Images Via Predictive Coding," Pattern Recognition, Vol.38, No.5, pp. 691-705, 2005. https://doi.org/10.1016/j.patcog.2004.11.006
  4. Y.C. Hu, "High Capacity Image Hiding Scheme Based on Vector Quantization," Pattern Recognition, Vol.39, No.9, pp. 1715-1724, 2006. https://doi.org/10.1016/j.patcog.2006.02.005
  5. C.L Liu and S.R Liao, "High-Performance JPEG Steganography using Complementary Embedding Strategy," Pattern Recognition, Vol. 41, No.9, pp. 2945-2966, 2008. https://doi.org/10.1016/j.patcog.2008.03.005
  6. M.U. Celik, G. Sharma, A.M. Tekalp., and E. Saber, "Reversible Data Hiding," Proc. of International Conference on Image Processing, Rochester, NY, USA, Vol.2, pp. 157-160, September 24, 2002.
  7. J. Tian, "Wavelet-based Reversible Watermarking for Authentication," Proc. Security and Watermarking of Multimedia Contents IV, Electronic Imaging 2002, Vol.4675, pp. 679-690, 2002.
  8. J. Tian, "Reversible Watermarking by Difference Expansion," Proc. of Workshop on Multimedia and Security, pp. 19-22, 2002.
  9. H.C. Wu, C.C. Lee, C.S. Tsai, Y.P. Chu, and H.R. Chen, "A High Capacity Reversible Data Hiding Scheme with Edge Prediction and Difference Expansion," The Journal of Systems and Software, Vol.82, No.12, pp. 1966-1973, 2009. https://doi.org/10.1016/j.jss.2009.06.056
  10. H.C. Wu, H.C. Wang, C.S. Tsai, and C.M. Wang, "Reversible Image Steganographic Scheme Via Predictive Coding," Displays, Vol.31, No.1, pp. 35-43, 2010. https://doi.org/10.1016/j.displa.2009.10.002
  11. Y.C. Li, C.M. Yeh, and C.C. Chang, "Data Hiding Based on the Similarity Between Neighboring Pixels with Reversibility," Digital Signal Processing, Vol.20, Issue4, pp. 1116-1128, 2010. https://doi.org/10.1016/j.dsp.2009.10.025
  12. Z. Ni, Y.U. N.Q. Shi, N. Ansari, and W.E.I. Su, "Reversible Data Hiding," IEEE Transactions on Circuits and Systems for Video Technology, Vol.16, No.3, pp. 354-362, 2006. https://doi.org/10.1109/TCSVT.2006.869964
  13. P. Tsai, Y.C. Hu, and H.L. Yeh, "Reversible Image Hiding Scheme using Predictive Coding and Histogram Shifting," Signal Processing, Vol.89, No.6, pp. 1129-1143, 2009. https://doi.org/10.1016/j.sigpro.2008.12.017
  14. D.S. Kim, G.J. Lee, and K.Y. Yoo, "A Reversible Image Scheme Using Novel Linear Prediction Coding and Histogram Shifting," The 2011 International Conference on Security & Management, pp. 282-287, 2011.
  15. I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Vol.1. Morgan Kaufmann, 2 edition, 2008.
  16. S.H, Bae, "A High Capacity Reversible Watermarking Using Histogram Shifting", Journal of Korea Multimedia Society, Vol. 13, No. 1, pp. 76-82, 2010.

Cited by

  1. Data Hiding Using Pixel-Value Modular Operation vol.18, pp.4, 2015, https://doi.org/10.9717/kmms.2015.18.4.483
  2. A Data Hiding Scheme for Grayscale Images Using a Square Function vol.17, pp.4, 2014, https://doi.org/10.9717/kmms.2014.17.4.466
  3. Study of Information Hiding Methods for SONAR Images in the Naval Combat System vol.18, pp.6, 2015, https://doi.org/10.9766/KIMST.2015.18.6.779
  4. A Key Exchange Protocol based on the Steganography with the QR code vol.50, pp.6, 2013, https://doi.org/10.5573/ieek.2013.50.6.173
  5. 함정 전투체계 군사영상 특성에 기반한 하이브리드 정보은닉 기법 vol.19, pp.9, 2012, https://doi.org/10.9717/kmms.2016.19.9.1669