CLC number: TP309.2
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2009-09-29
Cited: 3
Clicked: 9487
Xian-ting ZENG, Xue-zeng PAN, Ling-di PING, Zhuo LI. Robust lossless data hiding scheme[J]. Journal of Zhejiang University Science C, 2010, 11(2): 101-110.
@article{title="Robust lossless data hiding scheme",
author="Xian-ting ZENG, Xue-zeng PAN, Ling-di PING, Zhuo LI",
journal="Journal of Zhejiang University Science C",
volume="11",
number="2",
pages="101-110",
year="2010",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.C0910177"
}
%0 Journal Article
%T Robust lossless data hiding scheme
%A Xian-ting ZENG
%A Xue-zeng PAN
%A Ling-di PING
%A Zhuo LI
%J Journal of Zhejiang University SCIENCE C
%V 11
%N 2
%P 101-110
%@ 1869-1951
%D 2010
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.C0910177
TY - JOUR
T1 - Robust lossless data hiding scheme
A1 - Xian-ting ZENG
A1 - Xue-zeng PAN
A1 - Ling-di PING
A1 - Zhuo LI
J0 - Journal of Zhejiang University Science C
VL - 11
IS - 2
SP - 101
EP - 110
%@ 1869-1951
Y1 - 2010
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.C0910177
Abstract: This paper presents a robust lossless data hiding scheme. The original cover image can be recovered without any distortion after data extraction if the stego-image remains intact, and conversely, the hidden data can still be extracted correctly if the stego-image goes through JPEG compression to some extent. A cover image is divided into a number of non-overlapping blocks, and the arithmetic difference of each block is calculated. By shifting the arithmetic difference value, we can embed bits into the blocks. The shift quantity and shifting rule are fixed for all blocks, and reversibility is achieved. Furthermore, because the bit-0- and bit-1-zones are separated and the particularity of the arithmetic differences, minor changes applied to the stego-image generated by non-malicious attacks such as JPEG compression will not cause the bit-0- and bit-1-zones to overlap, and robustness is achieved. The new embedding mechanism can enhance embedding capacity and the addition of a threshold can make the algorithm more robust. Experimental results showed that, compared with previous schemes, the performance of the proposed scheme is significantly improved.
[1] Alattar, A.M., 2004. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process., 13(8):1147-1156.
[2] Bender, W., Gruhl, D., Morimoto, N., Lu, A., 1996. Techniques for data hiding. IBM Syst. J., 35(3-4):313-336.
[3] Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E., 2005. Lossless generalized-LSB data embedding. IEEE Trans. Image Process., 14(2):253-266.
[4] Celik, M.U., Sharma, G., Tekalp, A.M., 2006. Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans. Image Process., 15(4):1042-1049.
[5] Fridrich, J., Goljan, M., Du, R., 2001. Invertible authentication. Proc. SPIE, 4314:197-208.
[6] Fridrich, J., Goljan, M., Du, R., 2002. Lossless data embedding: new paradigm in digital watermarking. EURASIP J. Appl. Signal Process., 2002(2):185-196.
[7] Hartung, F., Kutter, M., 1999. Multimedia watermarking techniques. Proc. IEEE, 87(7):1079-1107.
[8] Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C., 2001. Lossless Recovery of an Original Image Containing Embedded Data. US Patent 6 278 791.
[9] Katzenbeisser, S., Petitcolas, A.P., 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Inc., Norwood, MA, USA.
[10] Langelaar, G.C., Setyawan, I., Lagendijk, R.L., 2000. Watermarking digital image and video data. IEEE Signal Process. Mag., 17(5):20-46.
[11] Lee, C.C., Wu, H.C., Tsai, C.S., Chu, Y.P., 2008. Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recogn., 41(6):2097-2106.
[12] Li, Z., Chen, X.P., Pan, X.Z., Zeng, X.T., 2009. Lossless Data Hiding Scheme Based on Adjacent Pixel Difference. Proc. Int. Conf. on Computer Engineering and Technology, 1:588-592.
[13] Lin, C.C., Hsueh, N.L., 2008. A lossless data hiding scheme based on three-pixel block differences. Pattern Recogn., 41(4):1415-1425.
[14] Maniccam, S.S., Bourbakis, N., 2004. Lossless compression and information hiding in images. Pattern Recogn., 37(3):475-486.
[15] Marvel, L.M., Boncelet, C.G.Jr., Retter, C.T., 1999. Spread spectrum image steganography. IEEE Trans. Image Process., 8(8):1075-1083.
[16] Ni, Z., Shi, Y.Q., Ansari, N., Su, W., Sun, Q., Lin, X., 2004. Robust Lossless Image Data Hiding. IEEE Int. Conf. on Multimedia and Expo, 3:2199-2202.
[17] Ni, Z., Shi, Y.Q., Ansari, N., Su, W., 2006. Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol., 16(3):354-362.
[18] Ni, Z., Shi, Y.Q., Ansari, N., Su, W., Sun, Q., Lin, X., 2008. Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Trans. Circ. Syst. Video Technol., 18(4):497-509.
[19] Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G., 1999. Information hiding: a survey. Proc. IEEE, 87(7):1062-1078.
[20] Swanson, M.D., Kobayashi, M., Tewfik, A.H., 1998. Multimedia data embedding and watermarking technologies. Proc. IEEE, 86(6):1064-1087.
[21] Tian, J., 2003. Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Technol., 13(8):890-896.
[22] Vleeschouwer, C.D., Delaigle, J.F., Macq, B., 2003. Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. Multimedia, 5(1):97-105.
[23] Zou, D., Shi, Y.Q., Ni, Z., Su, W., 2006. A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. IEEE Trans. Circ. Syst. Video Technol., 16(10):1294-1300.
Open peer comments: Debate/Discuss/Question/Opinion
<1>