89
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

A high-payload, reversible data hiding scheme based on histogram modification in JPEG bitstream

, , &
Pages 364-373 | Received 03 Feb 2014, Accepted 30 Jun 2016, Published online: 06 Dec 2016

References

  • Diffie, W. and Hellman, M. E. Exhaustive cryptanalysis of the NBS data encryption standard. Computer, 1977, 10, (6), 74–84. doi: 10.1109/C-M.1977.217750
  • Rivest, R., Shamir, A. and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 1978, 21, (2), 120–126. doi: 10.1145/359340.359342
  • Parnas, D. L. On the criteria to be used in decomposing systems into modules. Commun. ACM, 1972, 15, (12), 1053–1058. doi: 10.1145/361598.361623
  • Bender, W., Gruhl, D., Morimoto, N. and Lu, A. Techniques for data hiding. IBM Syst. J., 1996, 35, (3 and 4), 313–336. doi: 10.1147/sj.353.0313
  • Schyndel, R. G. V., Tirkel, A. Z. and Osborne, C. F. A digital watermark. Proc. ICIP, 1994, 2, 86–90.
  • Chang, C. C., Hsiao, J. Y. and Chan, C. S. Finding optimal LSB substitution in image hiding by dynamic programming strategy. Pattern Recogn., 2003, 36, (7), 1583–1595. doi: 10.1016/S0031-3203(02)00289-3
  • Katzenbeisser, S. and Petitcolas, F. A. P. Information hiding techniques for steganography and digital watermarking. 2000 (Artech House Publishers, Norwood, MA).
  • Barton, J. M.: Method and apparatus for embedding authentication information within digital data. U.S. Patent 5,646,997, 1997.
  • Goljan, M., Fridrich, J. and Du, R.: Distortion-free data embedding. Proceedings of 4th information hiding workshop, 2001, Pittsburgh, PA, 27–41.
  • Celik, M. U., Sharma, G., Tekalp, A. M. and Saber, E. Reversible data hiding. Proc. ICIP, 2002, 2, 157–160.
  • Wu, X.: CALIC-a context based adaptive lossess image codec. IEEE Int. Conf. on ‘Acousticsm speech, and signal processing’, 1996, Atlanta, GA, 1890–1893.
  • Tian, J. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol., 2003, 13, (8), 890–896. doi: 10.1109/TCSVT.2003.815962
  • Ni, Z. C., Shi, Y. U., Ansari, N. and Su, W. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol., 2006, 16, (3), 354–362. doi: 10.1109/TCSVT.2006.869964
  • Tai, W. L., Yeh, C. M., and Chang, C. C. Reversible data hiding based on histogram modification of pixel differences. IEEE Trans. Circuits Syst. Video Technol., 2009, 19, (6), 906–910. doi: 10.1109/TCSVT.2009.2017409
  • Chang, C. C., Huang, Y. H., Tsai, H. Y. and Qin, C. Prediction-based reversible data hiding using the difference of neighboring pixels. Int. J. Electron. Commun., 2012, 66, (9), 758–766. doi: 10.1016/j.aeue.2012.01.008
  • Fridrich, J., Goljanb, M. and Du, R. Invertible authentication for JPEG images. IEEE Int. Conf. on ‘Information technology: coding and computing’, 2001, Las Vegas, Nevada, 223–227.
  • Xuan, G., Zhu, J., Chen, J., Shi, Y. Q., Ni, Z. and Su, W. Distortionless data hiding based on integer wavelet transform. Electron. Lett., 2002, 38, (25), 1646–1648. doi: 10.1049/el:20021131
  • Chang, C. C., Lin, C. C., Tseng, C. S. and Tai, W. L. Reversible hiding in DCT-based compressed images. Inform. Sci., 2007, 177, 2768–2786. doi: 10.1016/j.ins.2007.02.019
  • Lin, C. C. and Shiu, P. F. DCT-based reversible data hiding scheme. J. Softw., 2010, 5, (2), 214–224. doi: 10.4304/jsw.5.2.214-224
  • Lin, Y. K. High capacity reversible data hiding scheme based upon discrete cosine transformation. J. Syst. Softw., 2012, 85, (10), 2395–2404. doi: 10.1016/j.jss.2012.05.032
  • Yang, B., Lu, Z. M. and Sun, S. H. Reversible watermarking in the VQ-compressed domain. Proc. 5th IASTED Int. Conf. on ‘Visualization, imaging and image processing’, 2005, 298–303.
  • Chang, C. C., Lin, C. Y. and Fan, Y. H. Lossless data hiding for color images based on block truncation coding. Pattern Recogn., 2008, 41, (7), 2347–2357. doi: 10.1016/j.patcog.2007.12.009
  • Chang, C. C., Kieu, T. D. and Wu, W. C. A lossless data embedding technique by joint neighboring coding. Pattern Recogn., 2009, 42, (7), 1597–1603. doi: 10.1016/j.patcog.2008.11.040
  • Sun, W., Lu, Z. M. and Wen, Y. C. High performance reversible data hiding for block truncation coding compressed images. Signal, Image Video Proc., 2013, 7, (2), 297–306. doi: 10.1007/s11760-011-0238-4
  • Liu, H., Shao, F. and Huang, J. A MPEG-2 video watermarking algorithm with compensation in bit stream. Proc. First Int. Conf. on ‘Digital rights management: technologies, issues, challenges and systems’, 2005, 123–134.
  • Mobasseri, B. G., Berger, R. J., Marcinak, M. P. and NaikRaiKar, Y. J. Data embedding in JPEG bitstream by code mapping. IEEE Trans. Image Proc., 2010, 19, (4), 958–966. doi: 10.1109/TIP.2009.2035227
  • Qian, Z. X. and Zhang, X. P. Lossless data hiding in JPEG bitstream. J. Syst. Softw., 2012, 85, (2), 309–313. doi: 10.1016/j.jss.2011.08.015
  • CCITT Recommendation T.81, ‘Information Technology-Digital Compression and Coding of Continuous-tone Still Images-Requirements and Guidelines’, Int. Telecommunication Union, 1992.
  • The USC-SIPI Image Database [Online], The University of Southern California, Available from: http://sipi.usc.edu/database.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.