You are on page 1of 4

2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS -2016), Jan.

22 – 23, 2016, Coimbatore, INDIA

Survey on Reversible Data Hiding Techniques


Rathika R Prof.S.Kumaresan
PG Scholar, Dept. of CSE, Professor and Head, Dept. of CSE,
Government College of Technology, Coimbatore, Government College of Technology, Coimbatore,
rathikagctcse@gmail.com sukumaresan@gct.ac.in

Abstract- Data transmissions using computer networks has a conflict between these two requirements. In general, a higher
created the need for security. Many robust message encryption embedding capacity results in a higher degree of distortion.
techniques have been developed to supply this demand.
Steganography is one form of cryptography where we hide data
within large texts or images. Reversible data hiding can be
considered as a form of steganography in which we hide data
within images, but with a variation that, in reversible data hiding
the original cover can be recovered losslessly after the embedded
messages are extracted. This paper presents a detailed survey on
various techniques available for RDH. The techniques include
Histogram shifting, LSB modification method, Difference
Expansion, Interpolation Technique.

Keywords: RDH, Histogram Shifting, Interpolation Technique,


Figure 1 General Block Diagram of RDH
Difference Expansion.

I. INTRODUCTION In Fig 1, an overall view of the Reversible Data Hiding


Advancements in computer networks, signal processing process. I represent the image and D, the data to be hidden.
and digital multimedia are spread widely through the Internet These two data are fed into the embed block which hides the
nowadays. This causes security issues of exposing transmitted message bits into the image. This image is represented by ID.
digital data on the network with high risk of being copied or When ID is fed into the extract/reverse block produces the
intercepted illegally. In order to safeguard the privacy of data, original image after extracting the data. The restored image IR
various cryptographic techniques have been proposed to is same as the original image.
encrypt the data before data transmission. However, with Reversible Data Hiding techniques can be employed to
considerable increase in computing powers of modern retrieve stego images to their pristine states after the extraction
computers, the security of the data yielded by these of hidden data. This techniques can be classified into three
cryptographic techniques is threatened. In addition, though groups-Based on data compression, Based on pixel value
cryptographic techniques encrypt secret images before difference expansion, based on histogram shifting. Various
transmission, the apparent appearances of the encrypted techniques are available for the Reversible Data Hiding
message would easily arouse suspicion and bring unexpected process. One of the popular approaches is the difference
attacks from hackers. Information hiding techniques provides expansion (DE) method in which difference of pixel groups
another solution in protecting digital media. Such techniques are calculated and expanded to accommodate additional bits.
may be employed to embed secret information into cover Histogram shift mechanism utilizes the zero and peak points
media, in such a way that the existence of the hidden of the histogram image and lightly modifies the pixel gray
information is invisible but known only to a preconcert values to embed data into the image. Reversible Data Hiding
recipient. Nowadays huge attention is paid to Reversible Data technique for binary images is Pair-Wise Logical Computation
Hiding (RDH) of encrypted images, since it has the excellent (PWLC). It uses XOR binary operations to store the payload
property that the original cover can be lossless restored after in the host image. The image boundaries are chosen to hide
the embedded data is extracted while protecting the image data. Interpolation technique can be embedding a large amount
content’s confidentiality. This technique is useful in of data into images with imperceptible modification. Due to
applications such as medical and imaging where the original the slight modifications of pixels, high image quality is
image must not be altered after the embedded data are preserved. This technique is more useful in applications where
extracted. Essentially, RDH is realized by the use of the original image remains intact even after data embedded is
redundancy in the original image. The two important retrieved. Consider multimedia archival for military and
requirements for RDH techniques: The embedding capacity medical for valuable works. In such applications, minute
should be large and distortion should be low. There is always change in pixel is not accepted. Every bit of embedded data is
important. Any change occurs, it affects the hidden data and
raw data, access to original is required. Buyer-Seller systems
are also implemented using Reversible data hiding technique.
[978-1-4673-9206-8/16/$31.00 ©2016 IEEE]
2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS -2016), Jan. 22 – 23, 2016, Coimbatore, INDIA

In this case a seller encrypts the data and embeds an encrypted difference values. It also embedded into the marked image.
fingerprint given by buyer. Seller will not be able to get This method suits all audio and videos with limited payload
fingerprints of buyer until the buyer does not make payment capacity.
he will not be able to access the original version of data.
D. PREDICTION ERROR EXPANSION
II. ESTEEMED CONTRIBUTIONS Reversible watermarking [9] is a method of
This section presents a description of the various embedding useful information in a digital work (audio, image,
techniques for reversible data hiding. Each method offers video) without any loss of host information for the purpose of
several advantages and also has its own limitations. copy control, content authentication, distribution tracking,
broadcast monitoring etc. The drawbacks of difference
A. LSB MODIFICATION expansion method is analysed and propose an improved
A novel reversible data hiding technique enables the approach that incorporates a histogram technique. It helps to
exact discovery of the original image after extracting the increase the capacity control and undesirable distortion at low
embedded information. LSB (Least Significant Bit) embedding capacities. Combinations of histogram shifting and
modification is proposed as the data embedding method, difference expansion two algorithms are introduced. The first
which introduces additional operating points on the capacity- one uses a highly compressible overflow map and the second
distortion(C-D) curve. It modifies the lowest levels instead of one uses flag bits. Prediction Error based technique exploits
bit planes of the host image to accommodate the payload the inherent correlation in the neighborhood of a pixel better
information. A prediction based conditional entropy coder than the Difference Expansion scheme. The maximal
utilizes static portions of the host as side-information. embedding capacity of a PE-base embedding technique in a
Information bits are embedded by modifying the selected single pass is 1 bpp, which is double the maximal capacity of
features of the host image. It will improve the compression 0.5 bpp for a DE based embedding technique. It offers a
efficiency and lossless data embedding capacity. significant improvement in the quality of the watermarked
image, especially at moderate embedding capacities.
B. HISTOGRAM SHIFTING
In this method, [3] zero or minimum points of the E. INTERPOLATION TECHNIQUE
histogram of an image are utilized and the pixel gray scale An interpolation technique [8] can embed a large
values slightly modified to embed a large amount of data (5- amount of covert data into images with imperceptible
80 kb) into the original image. It keeps good quality of the modification. It utilizes the interpolation error, the difference
natural images, specifically PSNR value of marked image is between interpolation value and corresponding pixel value, to
guaranteed above 48 dB. For embedding process, the main embed bit by expanding it additively or leaving it unchanged.
goal of finding the peak point is to increase the embedding The data embedding approach of this proposed scheme,
capacity as large as possible. The number of pixels associated namely preservative interpolation error expansion, is a kind of
with the peak point equals to the number of bits that can be DE. But it is different from most DE approaches in two
embedded into an image. aspects. One is it uses interpolation error instead of inter pixel
First, histogram of the image H(x) is generated and difference or prediction error to embed data. Secondly, it
maximum and minimum points (a, b) are found. If the expands difference by addition instead of bit shifting. The
minimum point H(b) > 0, recode the coordinate of those pixels advantages of this method are that the distortion of
and set as H(b)=0. Then without loss of generality, Move the preservative expansion is smaller since each pixel is altered at
whole part of the histogram with to the right by 1 unit. This most by 1. It does not require a location map to tell between
method can be applied for all type of images and videos which expanded interpolation errors. Interpolation errors are more
consist of sequential of images. It provides a low expandable than inter pixel differences or prediction errors. It
computational complexity and a faster execution time. guarantees high image quality without sacrificing embedding
capacity.
C. DATA EMBEDDING USING DIFFERENCE
EXPANSION F. OPTIMAL WEIGHT BASED PREDICTION SCHEME
Recently, [4] Reversible Data Embedding has drawn In this paper [14], a weight based prediction scheme
lots of interest. Being reversible, the original digital content is presented to improve the performance of many reversible
can be completely restored. A common approach of high histogram based data hiding approach. From least-squares
capacity Reversible Data Embedding is to select an embedding problem, we obtain the optimal set of loads for the
area. DE technique discovers extra storage space by exploring neighbouring pixels to enhance the prediction accuracy of the
the redundancy in the image content. In digital image, one can prospective pixel across the entire image. The level of the
select the expandable difference values of pixels and embed peak points in the histogram can then be evaluated to boost the
one bit into each of them to extract the embedded data and to embedding capacity. The proposed technology improved the
restore the original values, the decoder needs to know which embedding volume upon many techniques and still retained
difference values have been selected for the DE. Location map the caliber of stego images.
contains the location information of all selected expandable
2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS -2016), Jan. 22 – 23, 2016, Coimbatore, INDIA

G. EFFICIENT COMPRESSION OF ENCRYPTED o Watermark insertion protocol


IMAGES o Copyright violation detection protocol
Wei Liu et.al suggested a lossless compression o Dispute resolution protocol
method for encrypted gray image which used progressive
decomposition and punctured turbo codes that were rate- I. RDH IN ENCRYPTED IMAGES
compatible. In this method they developed resolution Zhang [9] proposed a Reversible Data Hiding
progressive compression, which had much better coding technique for encrypted images. It includes encryption of the
efficiency and a lesser computational complexity. Wei Liu image, embedding data and data extraction image recovery
et.al observed that lossless compression of encrypted sources phases. The data of original image is encrypted entirely by a
can be achieved through Slepian-Wolf coding. It is being tried stream cipher. This method offers a low computational
to improve the compression efficiency for encrypted real- complexity. The following steps describe the entire scheme.
world sources such as images. In this paper, a resolution o A data hider can embed additional data into the
progressive compression scheme compressed an encrypted encrypted image by modifying a part of encrypted
image progressively in resolution, so that the decoder data. This data hider need not necessarily know the
observed a low-resolution version of the image, study local original content of the encryption image.
statistics based on it, and used the statistics to decode the next o Using the encrypted image containing embedded
resolution level. Resolution progressive compression which data, a receiver first decrypts it using the encryption
has much better coding efficiency and less computational key, and the decrypted version is similar to the
complexity than existing approaches was used in this problem. original image.
o The embedded data can be correctly extracted while
H. BUYER-SELLER PROTOCOL the original image can be perfectly restored using the
Memon et.al [3] proposed an interactive protocol for data hiding key with the assistance of spatial
invisible watermarking in which the seller will not know the correlation in natural image.
exact watermarked copy that the buyer receives. Hence, the
copies of the original content containing the buyer’s J. SIDE MATCH MECHANISM
watermark cannot be created by the seller. However, in case The previous paper poses two issues. The data
the seller finds an unauthorized copy has originated, it can be extraction and image recovery can be achieved by examining
determined from which buyer it originated and furthermore the block smoothness. Zhang’s [9] work did not fully exploit
this can be proved to a third party by means of dispute the pixels in calculating the smoothness of each block and also
resolution protocol. But the reverse process is not possible i.e., the pixel correlations in the border of neighboring blocks were
the buyer cannot claim an unauthorized copy originating from not considered. These two issues could reduce the correctness
the seller. The dispute resolution protocol is a three-party of data extraction. This decreases the error rate of extracted
protocol which requires the buyer to participate to prove his bits.
innocence in case the seller accuses him of making III. COMPARISON OF THE VARIOUS TECHNIQUES
unauthorized copies. If a buyer refuses to participate then it The following Table 1 summarizes the techniques of RDH
would be taken as an admission of guilt on the buyer’s part. with various advantages and describes its limitations.
The buyer-seller watermarking protocol has four sub
protocols.
o Watermark generation protocol

Table 1 Summary of RDH Techniques

RDH TECHNIQUES DESCRIPTION MERITS DEMERITS

LSB modification method Each signal sample is over written -High embedding Higher distortion in the
by a payload data bit capacity restored image

Utilizes the minimum points of -Execution time is Uncompressed image


Histogram shifting the histogram and slightly short. used for embedding.
modifies the pixel gray scale -Applicable to videos
value to embed data.
Select some expandable -Applied to audio and
Difference Expansion difference values of pixels and video as well. Computational
embed one bit into each of them. -visual quality of complexity is high.
image is high.
2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS -2016), Jan. 22 – 23, 2016, Coimbatore, INDIA

Exploits the correlation inherent -Increase the capacity


Prediction error expansion in the neighborhoods of a pixel control -undesirable Uncompressed image
better than the Difference distortion at low used for embedding.
Expansion scheme. embedding capacities.
Gives a new role of value -Better performance
Optimal transfer mechanism modification and can be used on -Estimation errors Computational
various cover values. closer to zero. complexity is high.

utilizes the interpolation error, the -It guarantees high


difference between interpolation image quality without
Interpolation technique value and corresponding pixel sacrificing embedding Uncompressed image
value, to embed bit by expanding capacity. used for embedding.
it additively or leaving it -computational cost is
unchanged very small.

IV. CONCLUSION pairs,” in Image Analysis and Recognition. Berlin,


Thus this paper provides a brief description of the various Germany: Springer, pp. 715–727.
techniques used for reversible data hiding. All these [8] Lixin Luo, Zhenyong Chen, Ming Chen, Xiao Zeng
techniques aim at reproducing the original image in which the and Zhang Xiong, 2010, “Reversible Image
data was hidden with maximum accuracy. watermarking using Interpolation technique,” IEEE
Transactions on Information Forensics and security,
REFERENCES vol. 5, no. 1, pp. 187–193.
[1] Int. Telecommunication Union, “CCITT [9] X. L. Li, B. Yang, and T. Y. Zeng,2011, “Efficient
Recommendation T.81, Information Technology- reversible watermarking based on adaptive
Digital Compression and Coding of Continuoustone prediction-error expansion and pixel selection,”
Still Images-Requirements and Guidelines,” 1992. IEEE Trans. Image Process., vol. 20, no. 12, pp.
[2] N. Memon and P. W. Wong, 2001, “A buyer-seller 3524–3533.
watermarking protocol,” IEEE Trans. Image [10] X. Zhang, “Reversible data hiding in encrypted
Process., vol. 10, no. 4, pp. 643–649. images,2011, ” IEEE Signal Process. Lett., vol. 18,
[3] Mehmet U. Celik, Gaurav Sharma, A. Murat Telkalp, no. 4, pp. 255–258.
and Eli Saber, 2002, “Reversible Data Hiding,” in [11] W. Zhang, B. Chen, and N. Yu,2012, “Improving
IEEE ICIP.pp.157–160 various reversible data hiding schemes via optimal
[4] Jun Tian, 2003, “Reversible Data Embedding Using codes for binary covers,” IEEE Trans. Image
a Difference Expansion,” in IEEE Transactions on Process., vol. 21, no. 6, pp. 2991–3003.
Circuits and Systems for Video Technology, VOL [12] W. Hong, T. Chen, and H.Wu, 2012, “An improved
13, No 18. pp. 890-896. reversible data hiding in encrypted images using side
[5] Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, and Wei match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp.
Su 2006, “Reversible Data Hiding,” in IEEE 199–202.
Transactions on Circuits and Systems for Video [13] X. Zhang, 2013,“Reversible data hiding with optimal
Technology, VOL 16, No 3. pp. 354362. value transfer,” IEEE Trans. Multimedia, vol. 15, no.
[6] Diljith M. Thodi and Jeffrey J. Rodriguez, 2007, 2, pp. 316–325.
“Expansion Embedding Techniques for Reversible [14] X. Zhang, 2012, “Separable reversible data hiding in
Watermarking”, IEEE Transactions on Image encrypted image,” IEEE Trans. Inf. Forensics
Processing, VOL. 16, NO. 3. Pp. 721-730 Security, vol. 7, no. 2, pp. 826–832.
[7] G. Xuan, Y. Q. Shi, and Z. Ni et al., 2007,“Reversible
data hiding for JPEG images based on histogram

You might also like