Gray-Version Invariant Reversible Data Hiding Scheme Based on 2D Histogram Modification for Color Images

Author(s):  
Aruna Malik ◽  
Samayveer Singh ◽  
Shashank Awasthi ◽  
Piyush Yadav
2018 ◽  
Vol 16 (3) ◽  
pp. 661-671 ◽  
Author(s):  
Tong Zhang ◽  
Xiaolong Li ◽  
Wenfa Qi ◽  
Wei Li ◽  
Zongming Guo

2014 ◽  
Vol 6 (1) ◽  
pp. 51-64 ◽  
Author(s):  
Shun Zhang ◽  
Tie-gang Gao ◽  
Fu-sheng Yang

A reversible data hiding scheme based on integer DWT and histogram modification is proposed. In the scheme, the cover media is firstly transformed by Integer DWT (Discrete Wavelet Transformation); then information is embedded through the modification of histograms of the middle and high frequency sub-bands of the DWT coefficients. In order to increase the embedding capacity, a multi-level scheme is proposed, which achieved both high embedding capacity and reversibility. Extensive experimental results have shown that the proposed scheme achieves both higher embedding capacity and lower distortion than spatial domain histogram modification based schemes; and it achieved better performance than integer DCT (Discrete Cosine Transformation) based histogram modification scheme.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 83332-83342 ◽  
Author(s):  
Hao-Tian Wu ◽  
Weiqi Mai ◽  
Shuyi Meng ◽  
Yiu-Ming Cheung ◽  
Shaohua Tang

2014 ◽  
Vol 2014 ◽  
pp. 1-12 ◽  
Author(s):  
Shun Zhang ◽  
Tiegang Gao ◽  
Guorui Sheng

A joint encryption and reversible data hiding (joint encryption-RDH) scheme is proposed in this paper. The cover image is transformed to the frequency domain with integer discrete wavelet transform (integer DWT) for the encryption and data hiding. Additional data is hidden into the permuted middle (LH, HL) and high (HH) frequency subbands of integer DWT coefficients with a histogram modification based method. A combination of permutations both in the frequency domain and in the spatial domain is imposed for the encryption. In the receiving end, the encrypted image with hidden data can be decrypted to the image with hidden data, which is similar to the original image without hidden data, by only using the encryption key; if someone has both the data hiding key and the encryption key, he can both extract the hidden data and reversibly recover the original image. Experimental results demonstrate that, compared with existing joint encryption-RDH schemes, the proposed scheme has gained larger embedding capacity, and the distribution of the encrypted image with data hidden has a random like behavior. It can also achieve the lossless restoration of the cover image.


Sign in / Sign up

Export Citation Format

Share Document