Abstract

In recent years, reversible data hiding (RDH) has become a research hotspot in the field of multimedia security that has aroused more and more researchers’ attention. Most of the existing RDH algorithms are aiming at continuous-tone images. For RDH in encrypted halftone images (RDH-EH), the original cover image cannot be recovered losslessly after the watermark is extracted. For some application scenarios such as medical or military images sharing, reversibility is critical. In this paper, a reversible data hiding scheme in encrypted color halftone images (RDH-ECH) is proposed. In the watermark embedding procedure, the cover image is copied into two identical images to increase redundancy. We use wet paper code to embed the watermark into the image blocks. Thus, the receiver only needs to process the image blocks by the check matrices in order to extract the watermarks. To increase embedding capacity, we embed three layers in the embedding procedure and combine the resulting images into one image for convenience of transmission. From the experimental results, it can be concluded that the original image can be restored entirely after the watermarks are extracted. Besides, for marked color halftone images, our algorithm can implement high embedding capacity and moderate visual quality.

Highlights

  • Data hiding refers to making the cover image imperceptibly and keeping the existence of the hidden data confidential

  • We focus on the topic of Reversible data hiding (RDH) in encrypted color halftone images (RDH-ECH), where the original cover image can be restored from the stego image after extracting the watermark

  • To demonstrate the effectiveness and superiority of our scheme, experiments were conducted on six test images sized 512 × 512: Baboon, Beeflower, Goldgate, Lena, London, and Peppers

Read more

Summary

Introduction

Data hiding refers to making the cover image imperceptibly and keeping the existence of the hidden data confidential. For the situation in which the original continuous-tone image is available, Fu and Oscar proposed an algorithm that integrates the data hiding operation into the error diffusion process [25]. Lo et al.’s algorithm embedded the binary data into the halftone images with reference to the original continuous-tone image by evaluating the absolute difference between the neighboring gray-level pixels [28]. This method is extended from that of Fu and Au [25].

Related Works
Proposed Scheme
Image Encryption
Data Embedding
6: For I 0 do
Extraction and Recovery
Watermark Extraction
Image Recovery
Experimental Results and Discussions
Reversibility
Security
Embedding Capacity
Quality of the Marked Image
Computational Complexity
Feature Comparisons
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.