Reversible Data Hiding Using an Improved Pixel Value Ordering and Complementary Strategy
Abstract
:1. Introduction
2. Related Works
3. The Proposed RDH Scheme
3.1. Embedding Algorithm
Algorithm 1. Embedding Algorithm |
|
|
|
If is represented by ‘0’ in , then |
is assumed to be a probable overflow/underflow block, which is not considered for embedding . |
else is represented by ‘1’ in , then |
compute noise level () such that , and |
if > , then |
is assumed to be a complex block, which, again, is not considered for embedding . |
else is assumed to be a smooth block, which is considered for embedding S. |
end if |
end if |
|
Compute the prediction differences and using Equations (1) and (2), respectively, which are defined as follows: |
where , , and |
Embed the bits from into the maximum-valued pixel and minimum-valued pixel using Equations (3) and (4), respectively, which are defined as follows: |
Compute the new prediction differences and between the newly obtained first maximum () and second maximum pixels () and the first minimum () and second minimum pixels () using Equations (1) and (2), respectively. |
Embed the bits from into the newly obtained maximum-valued pixel and newly obtained minimum-valued pixel using Equations (5) and (6), respectively, which are defined as follows.
|
The process of secret information embedding is halted in a case where the all the bits from are embedded or the last information carrying block is reached. |
|
|
3.2. Illustrative Example of Embedding Algorithm
3.3. Extraction and Image Recovery Algorithm
Algorithm 2. Extraction and Image Recovery Algorithm |
|
|
|
|
Compute the two prediction differences and between the first maximum () and second maximum pixels () and the first minimum () and second minimum pixels () using Equations (1) and (2), respectively. |
Extract the concealed bits of secret information and restore the pixel values using following the ruleset: |
if then |
b = ‘0′ and . |
else if then |
b = ‘1′ and + 1. |
else if , then |
, and there is no hidden data. |
else + 1. |
end if |
if then |
b = ‘0′ and . |
else if then |
b = ‘1′ and 1. |
else if , then |
, and there is no hidden data. |
else 1. |
end if |
Compute the two prediction differences and between the first maximum () and second maximum pixels () and the first minimum () and second minimum pixels () using Equations (1) and (2), respectively. |
Extract the concealed bits of secret information and restore the pixel values using the following ruleset: |
if , then |
b = ‘1′ and . |
else if , then |
b = ‘0′ and 1. |
else if , then |
, and there is no hidden data. |
else . |
end if |
if , then |
b = ‘1′ and . |
else if , then |
b = ‘0′ and 1. |
else if , then |
, and there is no hidden data. |
else . |
end if |
end if |
The step is repeated until the bits are retrieved by processing the bocks of the image. |
|
3.4. Illustrative Example of the Extraction and Image Recovery Algorithm
4. Experimental Results and Discussion
4.1. Histogram Attack
4.2. Statistical Attack
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Singh, Y.; Singh, S.; Kumar, R. A distributed energy-efficient target tracking protocol for three level heterogeneous sensor networks. Int. J. Comput. Appl. 2012, 51, 0975–8887. [Google Scholar] [CrossRef] [Green Version]
- Kumar, R.; Saini, K.K.; Chand, S. A new steganography technique using snake scan ordering strategy. Int. J. Image 2013, 6, 25–32. [Google Scholar] [CrossRef] [Green Version]
- Kumar, R.; Chand, S. A reversible high capacity data hiding scheme using pixel value adjusting feature. Multimed. Tools Appl. 2016, 75, 241–259. [Google Scholar] [CrossRef]
- Kumar, R.; Chand, S. A reversible data hiding scheme using pixel location. Int. Arab J. Info. Tech. 2018, 15, 763–768. [Google Scholar]
- Malik, A.; Singh, S.; Kumar, R. Recovery based high capacity reversible data hiding scheme using even-odd embedding. Multimed. Tools Appl. 2018, 77, 15803–15827S. [Google Scholar] [CrossRef]
- Tian, J. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 890–896. [Google Scholar] [CrossRef] [Green Version]
- Kumar, R.; Chand, S.; Singh, S. An Improved Histogram-Shifting-Imitated Reversible Data Hiding based on HVS Characteristics. Multimed. Tools Appl. 2018, 77, 13445–13457. [Google Scholar] [CrossRef]
- Kumar, R.; Chand, S. A novel high capacity reversible data hiding scheme based on pixel intensity segmentation. Multimed. Tools Appl. 2017, 76, 979–996. [Google Scholar] [CrossRef]
- Thodi, D.M.; Rodriguez, J.J. Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 2007, 16, 721–730. [Google Scholar] [CrossRef]
- Li, X.; Li, J.; Li, B.; Yang, B. High-fidelity reversible data hiding scheme based on pixel–value-ordering and prediction–error expansion. Signal Process. 2013, 93, 198–205. [Google Scholar] [CrossRef]
- Peng, F.; Li, X.L.; Yang, B. Improved PVO-based Reversible Data Hiding. Digit. Signal Process. 2014, 25, 255–265. [Google Scholar] [CrossRef]
- Kumar, R.; Kumar, N.; Jung, K.H. I-PVO based high capacity reversible data hiding using bin reservation strategy. Multimed. Tools Appl. 2020, 79, 22635–22651. [Google Scholar] [CrossRef]
- Kumar, N.; Kasana, S.S. High-capacity reversible data hiding using modified pixel value ordering approach. J. Circuits Syst. Comput. 2018, 17, 175–185. [Google Scholar]
- Kumar, R.; Kim, D.S.; Lim, S.; Jung, K.H. High-Fidelity Reversible Data Hiding Using Block Extension Strategy. In Proceedings of the 34th International Technical Conference on Circuits/Systems, Jeju, Republic of Korea, 23–26 June 2019; Volume 19, pp. 1–4. [Google Scholar]
- Qu, X.; Kim, H.J. Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Process. 2015, 111, 249–260. [Google Scholar] [CrossRef]
- Weng, S.; Shi, Y.; Hong, W.; Yao, Y. Dynamic improved pixel value ordering reversible data hiding. Inf. Sci. 2019, 489, 136–154. [Google Scholar] [CrossRef]
- Wang, X.; Ding, J.; Pei, Q. A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition. Inf. Sci. 2015, 310, 16–35. [Google Scholar] [CrossRef]
- Di, F.; Zhang, M.; Liao, X.; Liu, J. High-fidelity reversible data hiding by quadtree-based pixel value ordering. Multimed. Tools Appl. 2018, 78, 7125–7141. [Google Scholar] [CrossRef]
- Zhao, W.; Yang, B.; Gong, S. A higher efficient reversible data hiding scheme based on pixel value ordering. J. Inf. Hiding Multimed. Signal Process. 2018, 9, 918–928. [Google Scholar]
- Lu, T.C.; Tseng, C.Y.; Huang, S.W.; Vo, T.N. Pixel-value-ordering based reversible information hiding scheme with self-adaptive threshold strategy. Symmetry 2018, 10, 764. [Google Scholar] [CrossRef] [Green Version]
- Lee, C.F.; Shen, J.J.; Kao, Y.C. High-Capacity Reversible Data Hiding Based on Star-Shaped PVO Method. In Proceedings of the 14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Sendai, Japan, 26–28 November 2018; Volume 109. [Google Scholar]
- He, W.; Zhou, K.; Cai, J.; Wang, L.; Xiong, G. Reversible data hiding using multi-pass pixel value ordering and prediction-error expansion. J. Vis. Commun. Image Represent. 2017, 49, 351–360. [Google Scholar] [CrossRef]
- Weng, S.; Chen, Y.; Ou, B.; Chang, C.; Zhang, C. Improved K-Pass Pixel Value Ordering Based Data Hiding. IEEE Access 2019, 7, 34570–34582. [Google Scholar] [CrossRef]
- Ou, B.; Li, X.; Wang, J. High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion. J. Vis. Commun. Image Represent. 2016, 39, 12–23. [Google Scholar] [CrossRef] [Green Version]
- He, W.; Xiong, G.; Weng, S.; Cai, J.; Wang, Y. Reversible data hiding using multi-pass pixel-value-ordering and pairwise prediction-error expansion. Inf. Sci. 2018, 467, 784–799. [Google Scholar] [CrossRef]
- Kumar, R.; Jung, K.H. Enhanced pairwise IPVO-based reversible data hiding scheme using rhombus context. Inf. Sci. 2020, 536, 101–119. [Google Scholar] [CrossRef]
- Kaur, G.; Singh, S.; Rani, R.; Kumar, R.; Malik, A. High-quality reversible data hiding scheme using sorting and enhanced pairwise PEE. IET Image Process. 2022, 16, 1096–1110. [Google Scholar] [CrossRef]
- Kaur, G.; Singh, S.; Rani, R.; Kumar, R. A comprehensive study of reversible data hiding (RDH) schemes based on pixel value ordering (PVO). Arch. Comput. Methods Eng. 2021, 28, 3517–3568. [Google Scholar] [CrossRef]
Test Image | CC | SD (Cover Image) | SD′ (Stego-Image) | Difference (SD′-SD) |
Lena | 0.9998 | 47.8557 | 47.8942 | 0.0382 |
Baboon | 0.9999 | 42.3135 | 42.3845 | 0.0710 |
Airplane | 0.9999 | 46.4120 | 46.4341 | 0.0220 |
Peppers | 0.9999 | 53.8794 | 53.9227 | 0.0433 |
Fishing Boat | 0.9998 | 46.6772 | 46.7309 | 0.0537 |
Sail-Boat | 0.9999 | 65.5815 | 65.6142 | 0.0328 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kumar, R.; Kumar, N.; Jung, K.-H. Reversible Data Hiding Using an Improved Pixel Value Ordering and Complementary Strategy. Symmetry 2022, 14, 2477. https://doi.org/10.3390/sym14122477
Kumar R, Kumar N, Jung K-H. Reversible Data Hiding Using an Improved Pixel Value Ordering and Complementary Strategy. Symmetry. 2022; 14(12):2477. https://doi.org/10.3390/sym14122477
Chicago/Turabian StyleKumar, Rajeev, Neeraj Kumar, and Ki-Hyun Jung. 2022. "Reversible Data Hiding Using an Improved Pixel Value Ordering and Complementary Strategy" Symmetry 14, no. 12: 2477. https://doi.org/10.3390/sym14122477
APA StyleKumar, R., Kumar, N., & Jung, K. -H. (2022). Reversible Data Hiding Using an Improved Pixel Value Ordering and Complementary Strategy. Symmetry, 14(12), 2477. https://doi.org/10.3390/sym14122477