Reversible Data Hiding

Author(s):  
Mehul S. Raval

The chapter presents an application of reversible data hiding for the authentication of image travelling over a hostile and insecure communication channel. The reversible data resides in the image and tracks any changes done to it on a communication channel. The extraction of data and any modification to its structure reveals changes in the image. This allows the use of data hiding for forensic purpose. The reversible data hiding provides an additional advantage along with active forensics. The image regains original form after removal of the embedded data. However, reversible data hiding is an interplay between the image quality and watermarking capacity. The chapter presents the generic framework for data hiding and discusses its special case reversible data hiding. It presents capacity-behavior analysis of the difference expansion scheme. It performs in-depth analysis on the type of predictor and its impact on the capacity of the reversible data hiding scheme. Finally, the chapter presents a case study to showcase the use of reversible data hiding for image authentication.

2020 ◽  
Vol 10 (3) ◽  
pp. 836 ◽  
Author(s):  
Soo-Mok Jung ◽  
Byung-Won On

In this paper, we proposed methods to accurately predict pixel values by effectively using local similarity, curved surface characteristics, and edge characteristics present in an image. Furthermore, to hide more confidential data in a cover image using the prediction image composed of precisely predicted pixel values, we proposed an effective data hiding technique that applied the prediction image to the conventional reversible data hiding technique. Precise prediction of pixel values greatly increases the frequency at the peak point in the histogram of the difference sequence generated using the cover and prediction images. This considerably increases the amount of confidential data that can be hidden in the cover image. The proposed reversible data hiding algorithm (ARDHA) can hide up to 24.5% more confidential data than the existing algorithm. Moreover, it is not possible to determine the presence of hidden confidential data in stego-images, as they possess excellent visual quality. The confidential data can be extracted from the stego-image without loss, and the original cover image can be restored from the stego-image without distortion. Therefore, the proposed algorithm can be effectively used in digital image watermarking, military, and medical applications.


2020 ◽  
Vol 16 (7) ◽  
pp. 155014772091100
Author(s):  
Pyung-Han Kim ◽  
Kwan-Woo Ryu ◽  
Ki-Hyun Jung

In this article, a new reversible data hiding scheme using pixel-value differencing in dual images is proposed. The proposed pixel-value differencing method can embed more secret data as the difference value of adjacent pixels is increased. In the proposed scheme, the cover image is divided into non-overlapping blocks and the maximum difference value is calculated to hide secret bits. On the sender side, the length of embeddable secret data is calculated by using the maximum difference value and the log function, and the decimal secret data are embedded into the two stego-images after applying the ceil function and floor function. On the receiver side, the secret data extraction and the cover image restoration can be performed by using the correlation between two stego-images. After recovering the cover image from two stego-images, the secret data can be extracted using the maximum difference value and the log function. The experimental results show that the proposed scheme has a higher embedding capacity and the proposed scheme differs in embedding the secret data depending on the characteristics of the cover image with less distortion. Also, the proposed scheme maintains the degree of image distortion that cannot be perceived by the human visual system.


2018 ◽  
Vol 173 ◽  
pp. 03088
Author(s):  
Dan Wu

A reversible data hiding scheme for encrypted image was proposed based on Arnold transformation. In this scheme, the original image was divided into four sub-images by sampling, the sub-images were scrambled by Arnold transformation using two secret keys, then the scrambled sub-images were reconstituted an encrypted image. Subsequently, additional data was embedded into the encrypted image by modifying the difference between two adjacent pixels. With an encrypted image containing additional data, the receiver can obtain a decrypt image using the decryption key. Meanwhile, with the aid of the decryption key and information hiding key, the receiver can pick the hiding information and recover the original image without any error. Experiment result shows that the proposed scheme can obtain a higher payload with good image quality.


2012 ◽  
Vol 66 (9) ◽  
pp. 758-766 ◽  
Author(s):  
Chin-Chen Chang ◽  
Ying-Hsuan Huang ◽  
Hsin-Yi Tsai ◽  
Chuan Qin

Entropy ◽  
2019 ◽  
Vol 21 (7) ◽  
pp. 625 ◽  
Author(s):  
Jingxuan Li ◽  
Xingyuan Liang ◽  
Ceyu Dai ◽  
Shijun Xiang

This paper proposes a reversible data hiding scheme by exploiting the DGHV fully homomorphic encryption, and analyzes the feasibility of the scheme for data hiding from the perspective of information entropy. In the proposed algorithm, additional data can be embedded directly into a DGHV fully homomorphic encrypted image without any preprocessing. On the sending side, by using two encrypted pixels as a group, a data hider can get the difference of two pixels in a group. Additional data can be embedded into the encrypted image by shifting the histogram of the differences with the fully homomorphic property. On the receiver side, a legal user can extract the additional data by getting the difference histogram, and the original image can be restored by using modular arithmetic. Besides, the additional data can be extracted after decryption while the original image can be restored. Compared with the previous two typical algorithms, the proposed scheme can effectively avoid preprocessing operations before encryption and can successfully embed and extract additional data in the encrypted domain. The extensive testing results on the standard images have certified the effectiveness of the proposed scheme.


2019 ◽  
Vol 7 (3) ◽  
pp. 101
Author(s):  
Maja Turnsek ◽  
Tatjana Zupančič ◽  
Barbara Pavlakovič

From living museums to heritage escape rooms, edutainment is becoming a norm in interpretation of heritage, yet not much is known, of the specific role humour plays in the creation and performance of such educational products. This paper explores concepts of authenticity, functions of humour and experience design dimensions on an in-depth case study of a tourism product. The product “Smart Head Primary School” is a re-enactment of teaching as it occurred in the 1950’s in Slovenia. It gained a high extent of popularity primarily due to its extensive inclusion of humour. The product uses the role of a strict teacher to interpret to the “pupils” (visitors) the prime elements of the regions’ heritage. To analyse the intertwining of humour with heritage interpretation, the authors combine two research methods: (a) the in-depth analysis of a transcribed video-recording of a sample performance including the self-analysis and the reflections by one of the “teachers” and (b) a survey distributed to the visitors of the product. The results show that with the use of humour, visitors are able to perceive and recognize the difference between objective and constructive authenticity more effectively.


2019 ◽  
Vol 19 (2) ◽  
pp. 101-110
Author(s):  
Adrian Firdaus ◽  
M. Dwi Yoga Sutanto ◽  
Rajin Sihombing ◽  
M. Weldy Hermawan

Abstract Every port in Indonesia must have a Port Master Plan that contains an integrated port development plan. This study discusses one important aspect in the preparation of the Port Master Plan, namely the projected movement of goods and passengers, which can be used as a reference in determining the need for facilities at each stage of port development. The case study was conducted at a port located in a district in Maluku Province and aims to evaluate the analysis of projected demand for goods and passengers occurring at the port. The projection method used is time series and econometric projection. The projection results are then compared with the existing data in 2018. The results of this study show that the econometric projection gives adequate results in predicting loading and unloading activities as well as the number of passenger arrival and departure in 2018. This is indicated by the difference in the percentage of projection results towards the existing data, which is smaller than 10%. Whereas for loading and unloading activities, time series projections with logarithmic trends give better results than econometric projections. Keywords: port, port master plan, port development, unloading activities  Abstrak Setiap pelabuhan di Indonesia harus memiliki sebuah Rencana Induk Pelabuhan yang memuat rencana pengem-bangan pelabuhan secara terpadu. Studi ini membahas salah satu aspek penting dalam penyusunan Rencana Induk Pelabuhan, yaitu proyeksi pergerakan barang dan penumpang, yang dapat dipakai sebagai acuan dalam penentuan kebutuhan fasilitas di setiap tahap pengembangan pelabuhan. Studi kasus dilakukan pada sebuah pelabuhan yang terletak di sebuah kabupaten di Provinsi Maluku dan bertujuan untuk melakukan evaluasi ter-hadap analisis proyeksi demand barang dan penumpang yang terjadi di pelabuhan tersebut. Metode proyeksi yang dipakai adalah proyeksi deret waktu dan ekonometrik. Hasil proyeksi selanjutnya dibandingkan dengan data eksisting tahun 2018. Hasil studi ini menunjukkan bahwa proyeksi ekonometrik memberikan hasil yang cukup baik dalam memprediksi aktivitas bongkar barang serta jumlah penumpang naik dan turun di tahun 2018. Hal ini diindikasikan dengan selisih persentase hasil proyeksi terhadap data eksisting yang lebih kecil dari 10%. Sedangkan untuk aktivitas muat barang, proyeksi deret waktu dengan tren logaritmik memberikan hasil yang lebih baik daripada proyeksi ekonometrik. Kata-kata kunci: pelabuhan, rencana induk pelabuhan, pengembangan pelauhan, aktivitas bongkar barang


Sign in / Sign up

Export Citation Format

Share Document