There are many invalid modifications of pixels in traditional reversible image information hiding algorithms based on asymmetric histogram modification. To solve this problem, a reversible information hiding scheme based on multi-pair asymmetric prediction error histogram modification is proposed in this paper. This scheme combines the advantages of asymmetric histogram modification algorithm and the characteristics of multihistogram modification algorithm, and selects the smooth region of the image to modify the asymmetric histogram for embedding information. At the same time of achieving the compensation reduction effect of asymmetric histogram, it can further reduce the invalid pixel modification and improve the rate distortion performance.
HE Yufen, TANG Jin, YIN Zhaoxia
. Reversible Data Hiding Based on Multi-Pair Asymmetric Histogram Modification[J]. Journal of Applied Sciences, 2022
, 40(2)
: 253
-265
.
DOI: 10.3969/j.issn.0255-8297.2022.02.008
[1] 张新鹏,殷赵霞.多媒体信息隐藏技术[J].自然杂志, 2017, 39(2):87-95. Zhang X P, Yin Z X. Data hiding in multimedia[J]. Chinese Journal of Nature, 2017, 39(2):87-95.(in Chinese)
[2] 张新鹏,钱振兴,李晟.信息隐藏研究展望[J].应用科学学报, 2016, 34(5):475-489. Zhang X P, Qian Z X, Li S. Prospect of digital steganography research[J]. Journal of Applied Sciences, 2016, 34(5):475-489.(in Chinese)
[3] Wang Z C, Qian Z X, Zhang X P, et al. On improving distortion functions for JPEG steganography[J]. IEEE Access, 2018, 6:74917-74930.
[4] Wang Z C, Zhang X P, Yin Z X. Joint cover-selection and payload-allocation by steganographic distortion optimization[J]. IEEE Signal Processing Letters, 2018, 25(10):1530-1534.
[5] Zhang X P, Wang S Z, Feng G R. Fragile watermarking scheme with extensive content restoration capability[J]. Lecture Notes in Computer Science, 2009, 5703:268-278.
[6] Yuan X C, Li M J. Local multi-watermarking method based on robust and adaptive feature extraction[J]. Signal Processing, 2018, 149:103-117.
[7] Li S, Zhang X P. Toward construction-based data hiding:from secrets to fingerprint images[J]. IEEE Transactions on Image Processing, 2019, 28(3):1482-1497.
[8] Barton J M. Method and apparatus for embedding authentication information within digital data:US 5646997[P].1997-07-08.
[9] Ni Z, Shi Y Q, Ansari N, et al. Reversible data hiding[J]. IEEE Transactions on Circuits& Systems for Video Technology, 2006, 16(3):354-362.
[10] Zhang W M, Ma K D, Yu N H. Reversibility improved data hiding in encrypted images[J]. Signal Processing, 2014, 94:118-127.
[11] Yi S, Zhou Y C. Parametric reversible data hiding in encrypted images using adaptive bit-level data embedding and checkerboard based prediction[J]. Signal Processing, 2018, 150:171-182.
[12] Ou B, Li X L, Zhao Y, et al. Pairwise prediction-error expansion for efficient reversible data hiding[J]. IEEE Transactions on Image Processing:a Publication of the IEEE Signal Processing Society, 2013, 22(12):5010-5021.
[13] Coltuc D, Chassery J M. Very fast watermarking by reversible contrast mapping[J]. IEEE Signal Processing Letters, 2007, 14(4):255-258.
[14] Thodi D M, Rodriguez J J. Expansion embedding techniques for reversible watermarking[J]. IEEE Transactions on Image Processing, 2007, 16(3):721-730.
[15] Ni Z C, Shi Y Q, Ansari N, et al. Reversible data hiding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(3):354-362.
[16] Zhang X P. Reversible data hiding with optimal value transfer[J]. IEEE Transactions on Multimedia, 2013, 15(2):316-325.
[17] Wang J X, Ni J Q. A GA optimization approach to HS based multiple reversible data hiding[C]//2013 IEEE International Workshop on Information Forensics and Security, 2013:203-208.
[18] Wang J X, Mao N X, Chen X, et al. Multiple histograms based reversible data hiding by using FCM clustering[J]. Signal Processing, 2019, 159:193-203.
[19] Jia Y J, Yin Z X, Zhang X P, et al. Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting[J]. Signal Processing, 2019, 163:238-246.
[20] Chen X Y, Sun X M, Sun H Y, et al. Reversible watermarking method based on asymmetrichistogram shifting of prediction errors[J]. Journal of Systems and Software, 2013, 86(10):2620- 2626.
[21] ?陈先意,孙星明.基于非对称预测误差直方图平移的可逆水印基本框架研究[C]//全国信息隐藏暨多媒体信息安全学术大会, 2015.
[22] 吕志恒,刘磊,陈思,等.基于非对称直方图修改的可逆信息隐藏方案[J]. 网络与信息安全学报, 2018, 4(5):69-75. Lyu Z H, Liu L, Chen S, et al. Reversible data hiding scheme based on asymmetric histogram modification[J]. Chinese Journal of Network and Information Security, 2018, 4(5):69-75.(in Chinese)
[23] 何玉芬,殷赵霞,汤进,等.基于非对称直方图平移的可逆信息隐藏算法[J]. 网络与信息安全学报, 2019, 5(5):80-89. He Y F, Yin Z X, Tang J, et al. Reversible data hiding algorithm based on asymmetric histogram shifting[J]. Chinese Journal of Network and Information Security, 2019, 5(5):80-89. (in Chinese)
[24] Li X L, Zhang W M, Gui X L, et al. Efficient reversible data hiding based on multiple histograms modification[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9):2016-2027.