ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Reversible Data Hiding: A Survey

D.R.Denslin Brabin1, Dr.J.Jebamalar Tamilselvi2
  1. Research Scholar, Anna University, Chennai, India
  2. Professor, Department of MCA, Jaya Engineering College, Chennai, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

Data hiding is the art and science of communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. Digital steganography and watermarking are the two kinds of data hiding. Reversible data hiding restores the carrier after the removal of hidden secret data. In this paper some important reversible data hiding schemes are explained and compared.

Keywords

Cryptography, Data Hiding, Steganography, Watermarking.

INTRODUCTION

Digital steganography and watermarking are the two kinds of data hiding technology to provide hidden communication and authentication. The word steganography is derived from the Greek words “stegos” meaning “cover” and “grafia” meaning “writing” [3] defining it as “covered writing”. In contrast to Cryptography, where the enemy is allowed to detect, intercept and modify messages without being able to violate certain security premises, the goal of steganography is to hide a secret message inside harmless medium in such a way that it is not possible even to detect that there is a secret message. The medium for data hiding is also called as cover, host and carrier.
To human eyes, data usually contains known forms, like images, videos, sounds and text. Most internet data naturally includes unwarranted headers too. These are media exploited using steganograpy techniques. Images are the most powerful medium for data hiding because of the limitation of Human visual System(HVS). Basic idea of watermarking is to embed covert information into a digital signal, like digital audio, image, or video, to trace ownership or protect privacy. Data hiding can be used in a large amount of data formats in the digital world of today. The most popular data formats used are .bmp, .doc, .gif, .jpeg, .mp3, .txt and .wav mainly because of their popularity on the Internet.
An information-hiding system is characterized using four different aspects: capacity, security, perceptibility and robustness[2] shown in Fig. 1.
Capacity refers to the amount of information that can be hidden in the cover medium.
Security refers the inability of the hacker to extract hidden information.
Perceptibility means the inability to detect the hidden information.
Robustness is the amount of modification the stego-medium can withstand before an adversary can destroy the hidden information.

REVERSIBLE DATA HIDING

The data embedding process will usually introduce permanent loss to the cover medium. However in some applications such as medical, military, and law forensics degradation of cover is not allowed. In these cases, a special kind of data hiding method called reversible data hiding or lossless data hiding is used. Reversible Data Hiding (RDH) in digital images is a technique that embeds data in digital images by altering the pixel values for secret communication and the cover image can be recovered to its original state after the extraction of the secret data. The block diagram of RDH is shown in Fig.2. Reversible steganography or watermarking can restore the original carrier without any distortion or with ignorable distortion after the extraction of hidden data. So reversible data hiding is now getting popular. In this paper some important reversible data hiding techniques for digital images are explained and the results are analyzed.

RDH TECHNIQUES

A considerable amount of research on reversible data hiding has been done over the past few years. Four important techniques are discussed here.

Integer Transform Technique

In this scheme, an integer transform is used to embed 1-bit watermark into one pixel pair in a way that the sum of the pixel pair remains unchanged. Based on the invariability of sum values and the equality between the parities of sum values and difference values, the extraction of watermarks and the recovery of pixel pairs can be easily achieved.
Shaowei Weng et al.[14] proposed an integer transform in which the forward transform is defined as
image
where b is used to denote one bit watermark, and d is the difference between the pixels x and y. Actually, x + y equals x’ + y’. x + y and d have the same parity. x’ and y’ are the watermarked image pixels corresponding to x and y.
On the decoding side, the sum of x’ and y’ is calculated first. Therefore x + y are determined. The difference value of x’ and y’ is calculated and denoted as d’. The actual difference d can be calculated as
image
The value of d and the watermark bit b can be uniquely deduced because the parity of d is known and b is a binary number. For example, if x = 7, y = 5 and b = 0, then x’ = 8, y’=4 after embedding. On the receiver side, (d’ + LSB(d’))/2 is calculated as 2. The parity of d can be guaranteed to be the same as d’. The parity of d’ is odd parity. The parity of d is odd if and only if b = 0. As a result, watermark bit b is correctly extracted and the value of d is obtained. Once d and x + y are obtained then the original pixel values x and y are calculated as
image

Difference Expansion Technique

Yongjian Hu [19] uses the predicted image pixel error instead of the pixel-pair difference for Difference Expansion(DE) embedding. A predictor below can exploit the neighboring information to predict an image pixel.
image
where x’ represents the predicted pixel value corresponds to pixel value x. a, c and b are right, lower, and diagonal neighbors of x. One information bit is embedded into a predicted error e = x – x’. To ensure lossless recovery of the original image, embed information bits into predicted errors that do not cause the overflow/underflow of image gray levels. In other words, predicted error does not exceed the integer range [0,255] for an 8-bit image.
In the embedding scheme, divide the histogram of predicted errors into two parts: the inner region for embedding and the outer regions for shifting. Assume that two thresholds, Tr and Tl, are used to control the right and left boundaries of the inner region, respectively. So the inner region is represented as [-Tl ,Tr-1], and the corresponding outer regions are [-Pel , -Tl-1] and [Tr , Per]. Here Pel and Per refer to the left and right ends of the histogram. The whole embedding process includes two manipulations. First, the outer region has to be shifted before embedding. The shifted pixel value x’’ is
image
Then, in the inner region, secret bit b is embedded by DE embedding as
x'’ = x + Pe + b , if -Tl <= Pe <= Tr-1 (6)
The recovery process also includes two manipulations. In the inner/embedded region, the embedded/hidden bit is extracted. In the shifted regions, the original pixel value is resumed. For difference expansion based reversible data hiding, the embedded bit-stream mainly consists of two parts: one part that conveys the secret message and the other part that contains the binary (overflow) location map and the header file. The first part is the payload while the second part is the auxiliary information package for blind detection. To increase embedding capacity, we have to make the size of the second part as small as possible. The compressibility of location map has to be increased for different types of images.

Histogram Modification Technique

In histogram modification technique [17], the differences between adjacent pixels instead of simple pixel value is considered. Since image neighbor pixels are strongly correlated, the difference is expected to be very close to zero.
At the sending side, first scan the image in an inverse s-order and calculate the pixel difference di between pixels xi-1 and xi by
image
Determine the peak point P from the histogram of pixel differences. Then again scan the whole image in the same inverse s-order and if di > P, shift xi by 1 unit as follow
image
where yi is the watermarked value of pixel i. If di = P, modify xi according to the message bit b as follow
image
At the receiving end, the recipient extracts message bits from the watermarked image by scanning the image in the same order as during the embedding. The message bit b can be extracted by
image
where xi−1 denotes the restored value of yi−1. The original pixel value can be restored by
image
Thus, an exact copy of the original host image is obtained. These steps complete the data hiding and extraction process in which only one peak point is used. Large hiding capacities can be obtained by repeating the data hiding process. However, recipients may not be able to retrieve both the embedded message and the original host image without knowledge of the peak points of every hiding pass. A binary tree structure used to deal with communication of multiple peak points. Modification of a pixel may not be allowed if the pixel is saturated (0 or 255). To prevent overflow and underflow, histogram shifting technique is used that narrows the histogram from both sides.

Interpolation Technique

In this technique [10], the difference between interpolation value and corresponding pixel value is used to embed bit “1” or “0” by expanding it additively or leaving it unchanged. It is different from most differential expansion approaches in two important aspects:
1) It uses interpolation-error, instead of interpixel difference or prediction- error, to embed data.
2) It expands difference, which is interpolation-error here, by addition instead of bit-shifting.
First, interpolation values of pixels are calculated using interpolation technique, which works by guessing a pixel value from its surrounding pixels. Then interpolation-errors are obtained by
image
where x’ are the interpolation values of pixels x. The secret bit b is embedded by additively expanding the interpolation error values. The additive interpolation-error expansion is formulated as
image
where LM and RM denote the corresponding values of the two highest points of interpolation-errors histogram and LN and RN denote the corresponding values of the two lowest points of interpolation-errors histogram. The watermarked pixels x’’ becomes
image
During the extracting process, the interpolation value x’ is computed with the same interpolation algorithm and the corresponding interpolation-errors are obtained. Once the interpolation errors, LM, RM, LN and RN are known, the embedded secret data can be extracted. Then the inverse function of additive interpolation-error expansion is applied to recover the original interpolation-errors. Finally, we can restore the original pixels x by adding interpolation value x’ and the interpolation error e.
After secret messages are embedded, some overhead information is needed to extract the covert information and restore the original image. The overhead information are the information to identify those pixels containing embedded bit(LM,LN,RM and RN) and the information to solve the overflow/underflow problem.

RESULTS AND DISCUSSION

The four different techniques explained in the above section was tested on several gray-level and color images. Results obtained for the classical 512 x 512 Lena image is shown here. Total number of pixels in that image is 262144. Peak Signal to Noise Ratio (PSNR) value and BPP(Bits Per Pixel) value are used as quality measures. The hiding capacity of different techniques for PSNR value nearly 40 and 48 are shown in Table 1. The hiding capacity of interpolation method is higher when comparing with other techniques. Integer transform method and Difference expansion based method have the hiding capacity near to 0.5 bpp when PSNR value is near to 40. Histogram modification method has low hiding capacity. Integer transform method, DE based method and Interpolation method crosses the standard capacity mark 0.5 bpp when PSNR Value is near to 40. These results are also shown as graph in Fig.3.

CONCLUSION

Reversible data hiding techniques getting popular because of the reversibility of carrier medium in the receiving end after extraction of secret data. In this paper four different types of reversible data hiding techniques for digital images: Integer transform technique, Difference expansion technique, Histogram modification technique and Interpolation technique are studied, analyzed and compared. The survey results show each technique has its own advantage and disadvantages.
 

Tables at a glance

Table icon
Table 1
 

Figures at a glance

Figure 1 Figure 2 Figure 3
Figure 1 Figure 2 Figure 3
 

References