Reversible data hiding for high quality images using modification of prediction errors

https://doi.org/10.1016/j.jss.2009.05.051Get rights and content

Abstract

In this paper, a reversible data hiding scheme based on modification of prediction errors (MPE) is proposed. For the existing histogram-shifting based reversible data hiding techniques, though the distortion caused by embedding is low, the embedding capacity is limited by the frequency of the most frequent pixel. To remedy this problem, the proposed method modifies the histogram of prediction errors to prepare vacant positions for data embedding. The PSNR of the stego image produced by MPE is guaranteed to be above 48 dB, while the embedding capacity is, on average, almost five times higher than that of the well-known Ni et al. techniques with the same PSNR. Besides, MPE not only has the capability to control the capacity-PSNR, where fewer data bits need less error modification, but also can be applied to images with flat histogram. Experimental results indicate that MPE, which innovatively exploits the modification of prediction errors, outperforms the prior works not only in terms of larger payload, but also in terms of stego image quality.

Introduction

During transmission, if the digital media itself shows artifact of hiding effect, the intentional opponent may doubt the digital media carries secret messages. Therefore, an embedded digital should maintain an imperceptible quality to keep the embedded media from drawing attention (Wang et al., 2008). In general, the major concerns of data hiding techniques are the embedding capacity and imperceptibility. These two concerns are different from the techniques of digital watermarking. The purpose of digital watermarking is to protect the ownership of a digital media. Since a digital media is easily tampered or modified, a watermarking technique must be designed to have the capability against some common signal processing operations such as noise or lossy compression. The retrieved watermarks may not be exactly the same as the original ones; however, the ownership can still be verified according to the retrieved watermarks. On the other hand, a data hiding technique must extract embedded data without losing any bit. Therefore, the requirements of the robustness against common signal processing operations, or the ability to prevent bit errors occurring during storage and transmission, are not as emphasized as in digital watermarking technique (Yu et al., 2007, Wang and Wang, 2004).

Any existing digital media such as audios, videos, and digital images can be used as carriers. The digital image is often used as carrier since it is delivered the most over the Internet. It is important that the image with embedded data should not arouse any suspicious. The image for carrying data is called a cover image, and the image carrying the embedded information is called a stego image. When the information is embedded into images, the pixel values in the image will be changed, and thus the image quality is degraded. Since the altered pixels cannot be recovered into their original state after the secret messages has been extracted, permanent distortion will occur. Distortion for some applications is unacceptable. For example, a distorted chest X-ray image could result in an incorrect medical diagnosis. In these applications, techniques for reversible data hiding are necessary.

Reversible data hiding is a technique that not only embeds data into cover images, but also restores the original images from the stego images after the embedded data have been extracted (Alattar, 2004). Since the original cover image must be recovered after extracting the secret message, this requirement imposed on reversible data hiding technique a penalty of lower payloads, larger distortion and higher computational cost-in comparison to those non-reversible techniques. Despite these drawbacks, the number of reversible data hiding techniques proposed in literature has increased recently; suggesting the increasing needs in this field. The reversible data hiding technique developed at the early stage mainly relies on lossless compression technique. In 2002, Fridrich et al. proposed an R–S scheme for which compressed message bits were reversibly embedded in the status of group of pixels (Fridrich et al., 2002). Gelik et al. devised a generalized least significant bit (G-LSB) technique to increase the payload of Fridrich et al. method (Celik et al., 2002). Awrangjeb and Kankanhalli proposed a reversible scheme that embedded compressed data into the original image with the consideration of the human visual system to minimize the perceptible artifacts (Awrangjeb et al., 2005). The methods mentioned above involved approaches that embedded losslessly compressed features extracted from the original cover image.

The other type of reversible data hiding methods can be categorized as expansion–embedding based techniques. A common feature of these techniques is using a decorrelation operator to create features with small magnitudes. Data can be embedded by expanding these features to create vacant space into which message bits are embedded. The first approach under this category was proposed by Tian (Tian, 2003), and extended by many recent researches (Alattar, 2004, Kamstra and Heijmans, 2005, Thodi and Rodriguez, 2007, Kim et al., 2008). Expansion embedding based approaches usually suffer from undesirable distortion when the values of features are large. Therefore, this method might not be suitable for applications where higher image quality is demanded. Another category of reversible data hiding can be classified as histogram-shifting based techniques. In these techniques, a histogram of feature elements is created, and data can be embedded by shifting histogram bins. The well-known technique proposed by Ni et al. in 2006 is of this category (Ni et al., 2006). Some other histogram-shifting based reversible data hiding techniques can be found in Hwang et al., 2006, Fallahpour and Sedaaghi, 2007. Unfortunately, the capacity of histogram-shifting based techniques is low and highly dependent on the histogram distribution of the cover image. In general, the higher the peak of image histogram, the more the embedding capacity is. In addition to the techniques mentioned above, Coltuc introduced a very different approach to reversibly embedded data based on simple transforms with low mathematical complexity (Coltuc, 2007). These emerging remarkable reversible techniques suggested the increasing attention of the reversible data hiding techniques have been receiving.

Many applications demand high quality images, such as medical or military images. The well-known reversible data hiding method proposed by Ni et al. can produce relatively high quality stego image (⩾48.13 dB); however, the embedding capacity is low and is limited by the distribution of image histogram. Several studies were based on Ni et al.’s method and were either trying to enhance the image quality further or to increase the embedding capacity (Hwang et al., 2006, Fallahpour and Sedaaghi, 2007, Xuan et al., 2007). For example, Xuan et al. proposed a novel optimum histogram pair based reversible data hiding technique using integer wavelet transform and adaptive histogram modification with excellent performance (Xuan et al., 2007). However, their method involved integer wavelet transform (IWT) and optimal parameters selection, the computational cost is higher than Ni et al. method.

In this paper, we proposed a new reversible data hiding technique based on modification of prediction errors (MPE). Since the histograms in the domain of prediction errors are sharply distributed, the embedding capacity is higher than that of traditional histogram-shifting method for the same image quality. Besides, MPE only modifies less error values for embedding fewer data bits; therefore, a high quality stego image can be obtained.

Detailed advantages of MPE over Ni et al. method will be discussed in Section 4. The rest of this paper is organized as follows. In Section 2, Ni et al.’s histogram-shifting technique for reversible data hiding will be described. The MED predictor and the proposed method are presented in Section 3, followed by the experimental results in Section 4. Conclusions from the experimental results are addressed in Section 5.

Section snippets

Reviews of the histogram-shifting technique

The histogram-shifting technique proposed by Ni et al. (2006) reversibly embeds data into images by shifting the histogram bins. In their method, one grayscale level will be changed at most in every pixel; therefore, an acceptable stego image quality can be obtained (PSNR  48.13 dB). The embedding procedure of Ni et al. technique is listed below:

  • (1)

    Obtain the histogram h(x), x ϵ [0, 255] of the 8-bit cover image.

  • (2)

    Find the maximum value h(α) and the minimum value h(β) of h(x), where α, β ϵ [0, 255]. The

The proposed method

Histogram-shifting is a technique for embedding data into histogram bins by shifting the histograms of the feature elements to prepare vacant positions for embedding. The occurrence of the most frequent feature elements determines the embedding capacity. These most frequent feature elements are called the embeddable elements. The distortion resulting from histogram-shifting embedding primarily depends on the number of feature elements that are shifted. Therefore, it is desirable to increase the

Experimental results

In this section, we will show the feasibility and the performance of MPE in terms of pure payload and image quality over the relevant techniques proposed by Ni et al. and other researchers. The algorithms were implemented in Matlab, and the experiments were performed by embedding and extracting random generated bit streams. In all experiments, two pairs of peak and minimum points were used for data embedding. Note that the prediction error e is obtained by subtracting the predicted value Iˆi,j

Conclusions

In this paper, we proposed a novel reversible data hiding technique based on modification of prediction errors. Pixel values are first predicted, and then error values are obtained. Message bits are embedded reversibly by modifying the values of prediction errors. MPE remedies the major drawbacks of Ni et al. method – low embedding capacity and inability to control the capacity, by embedding secret message bits into errors values. MPE has the capability to keep the distortion low when embedding

Wien Hong received his M.S. and Ph.D. degree from State University of New Your at Buffalo in 1994 and 1997, respectively. Since 1999, he is an assistant professor in the Department of Information Management at Yu-Da College of Business, Taiwan. His research interests include digital watermarking, data hiding and data compression.

References (20)

  • C. Wang et al.

    A high quality steganographic method with pixel-value differencing and modulus function

    Journal of Systems and Software

    (2008)
  • Y.H. Yu et al.

    A new steganographic method for color and grayscale image hiding

    Computer Vision and Image Understanding

    (2007)
  • A.M. Alattar

    Reversible watermark using the difference expansion of a generalized integer transform

    IEEE Transactions on Image Processing

    (2004)
  • M. Awrangjeb et al.

    Reversible watermarking using a perceptual model

    Journal of Electronic Imaging

    (2005)
  • Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E., 2002. Reversible data hiding. In: Proceedings of the International...
  • Coltuc, D., 2007. Improved capacity reversible watermarking. In: IEEE International Conference on Image Processing,...
  • M. Fallahpour et al.

    High capacity lossless data hiding based on histogram modification

    IEICE Electronics Express

    (2007)
  • J. Fridrich et al.

    Lossless data embedding – new paradigm in digital watermarking

    Special Issue on Emerging Applications of Multimedia Data Hiding

    (2002)
  • R.C. Gonzalez et al.

    Digital Image Processing

    (2002)
  • Hwang, J.H., Kim, J.W., Choi, J.U., 2006. A reversible watermarking based on histogram. Shifting. In: Proceedings of...
There are more references available in the full text version of this article.

Cited by (325)

  • A review of different prediction methods for reversible data hiding

    2023, Journal of Information Security and Applications
  • Adaptive multi-histogram reversible data hiding with contrast enhancement

    2022, Journal of Visual Communication and Image Representation
    Citation Excerpt :

    In contrast, prediction-error expansion (PEE)-based RDH, which was first proposed by Thodi et al. [5], achieves a higher embedding capacity with lower distortion by modifying the prediction error histogram (PEH) for embedding data using expansion and shifting. Subsequently, some researchers [2,6] incorporate HS into PEE and modify PEH using HS to further enhance the embedding performance. Essentially, HS-based RDH methods uniformly modify a single image histogram or PEH, but ignore the local properties of pixels or prediction errors.

View all citing articles on Scopus

Wien Hong received his M.S. and Ph.D. degree from State University of New Your at Buffalo in 1994 and 1997, respectively. Since 1999, he is an assistant professor in the Department of Information Management at Yu-Da College of Business, Taiwan. His research interests include digital watermarking, data hiding and data compression.

Tung-Shou Chen received the B.S. and Ph.D. degrees from National Chiao Tung University in 1986 and 1992, respectively, both in Computer Science and Information Engineering. From 1994 through 1997, he was the faculty of the Department of Information Management at National Chin-Yi Institute of Technology in Taiwan. From 1998 through 2000, he was both the dean of Student Affairs and a professor of the Department of Computer Science and Information Management at Providence University in Taiwan. Since August 2000 he has been a professor of Graduate School of Computer Science and Information Technology at National Taichung Institute Technology in Taiwan. From 2004 through 2007, he was also the dean of the Graduate School of Computer Science and Information Technology at National Taichung Institute of Technology. His current research interests include data mining, imagel cryptosystems, and image compression.

Chih-Wei Shiu received his M.S. degree from Yu-Da College of Business, Department of Information Management in 2009. Currently, he is working towards his Ph.D. degree at National Chung-Hsing University, Graduate school of Computer Information Engineering, Taiwan. His current research interests include data compression and steganography.

View full text