CFP last date
20 December 2024
Reseach Article

13/9 Lifting Wavelet Transform based Reversible Data Hiding

by Subash N., Jayachandra Prasad T., Sumalatha V.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 53
Year of Publication: 2018
Authors: Subash N., Jayachandra Prasad T., Sumalatha V.
10.5120/ijca2018917377

Subash N., Jayachandra Prasad T., Sumalatha V. . 13/9 Lifting Wavelet Transform based Reversible Data Hiding. International Journal of Computer Applications. 179, 53 ( Jun 2018), 20-26. DOI=10.5120/ijca2018917377

@article{ 10.5120/ijca2018917377,
author = { Subash N., Jayachandra Prasad T., Sumalatha V. },
title = { 13/9 Lifting Wavelet Transform based Reversible Data Hiding },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2018 },
volume = { 179 },
number = { 53 },
month = { Jun },
year = { 2018 },
issn = { 0975-8887 },
pages = { 20-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number53/29540-2018917377/ },
doi = { 10.5120/ijca2018917377 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:59:07.499650+05:30
%A Subash N.
%A Jayachandra Prasad T.
%A Sumalatha V.
%T 13/9 Lifting Wavelet Transform based Reversible Data Hiding
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 53
%P 20-26
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper a novel 13/9 lifting scheme for hiding data has been implemented. Lifting schemes are the part of wavelet transformation which decomposes image into wavelet coefficients using basis function for analyzing multi-resolution images. Lifting scheme is preferred for data hiding because the operations are performed in spatial domain by simple LSB replacement. The 13/9 lifting scheme contains 13 low pass and 9 high pass coefficients. As more information in image lies at low frequency components, 13/9 implemented lifting scheme contains 13 low-frequency components, whereas 5/3 lifting scheme contains 5 low frequencies and 9/7 lifting scheme contains 9 low frequencies. Simulation results show that the payload and average PSNR are increased than the existing methods with the PSNR 58.17 dB at bit rate of 0.05 for Lena image.

References
  1. J. Tian, “Reversible data embedding using a difference expansion”, IEEE Trans. Circuits Syst.Video Technol.,Vol. 12, No. 8, pp. 890-896, 2003
  2. Adnan M. Alattar, “Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform”, IEEE Trans On Image Processing., Vol. 13, No. 8, pp. 1147-1156, 2004.
  3. Yongjian Hu, Heung-Kyu Lee, and Jianwei Li, “DE-Based Reversible Data Hiding With Improved Overflow Location Map”, IEEE Transactions. Circuits and Systems for Video Technology., Vol. 19, No. 2, pp. 250-260, 2009.
  4. Ju-Yuan Hsiao, Ke-Fan Chan, J.Morris Chang, “Block-based reversible data embedding”, Signal Processing., pp. 556-569, 2008.
  5. Ni Z, Shi Y. Q, Ansari N. and Su W, “Reversible Data Hiding”, IEEE Transactions. Circuits and Systems for Video Technology., Vol. 16, No. 3, pp. 354-362, 2006.
  6. H.-W. Tseng and C.-P. Hsieh, “Reversible data hiding based on image histogram modification”, The Imaging Science Journal., Vol. 56, pp. 271-278, 2008.
  7. Thodi D.M, Rodríguez J.J, “Expansion embedding techniques for reversible watermarking”, IEEE Transactions on Image Processing, Vol. 16, No. 3, pp. 721–730, 2007.
  8. W.L. Tai, C.M. Yeh, and C.C. Chang, “Reversible data hiding based on histogram modification of pixel differences”, IEEE Trans. Circuits Syst. Video Technol., Vol. 19, pp. 906–910, 2009.
  9. Piyu Tsai , Yu-Chen Hu, Hsiu-LienYeh, “Reversible image hiding scheme using predictive coding and histogram shifting”, Signal Processing., pp. 1129-1143, 2008.
  10. Vasiliy Sachnev, Hyoung Joong Kim, Jeho Nam, Sundaram Suresh, and Yun Qing Shi, “Reversible Watermarking Algorithm Using Sorting and Prediction”, IEEE Transactions. Circuits and Systems for Video Technology., Vol. 19, No. 7, pp. 989-999, 2009.
  11. Chin-Feng Lee, Hsing-Ling Chen, Hao-Kuan Tso, “Embedding capacity raising in reversible data hiding based on prediction of difference expansion”, The Journal of Systems and Software.,pp. 1864-1872, 2010.
  12. Xiaolong Li , Jian Li , Bin Li , Bin Yang, “High-fidelity reversible data hiding scheme based on pixel-value-Ordering and prediction-error expansion”, Signal Processing., pp. 198-205, 2012.
  13. Bo Ou, Xiaolong Li , Yao Zhao, Rongrong Ni, “Reversible data hiding based on PDE predictor”,The Journal Of Systems and Software., pp. 2700-2709, 2013.
  14. Lixin Luo, Zhenyong Chen, Ming Chen, Xiao Zeng, and Zhang Xiong, “Reversible Image Watermarking Using Interpolation Technique”,IEEE Transactions On Information Forensics and Security, Vol. 5, No. 1, pp. 187-193, 2010.
  15. Xing-Tian Wang , Chin-Chen Chang , Thai-Son Nguyen and Ming-Chu Li, “Reversible data hiding for high quality images exploiting interpolation and direction order mechanism”, Digital Signal Processing., pp. 569-577, 2012.
  16. Y. Yalman and F. Akar, “A high-capacity reversible data hiding method: HCRHide”, The Imaging Science Journal., Vol. 62, No.2, pp. 121-126, 2013.
  17. Chia-Chen Lin and Pei-Feng Shiu, “High Capacity Data Hiding Scheme for DCT-based Images”, Journal of Information Hiding and Multimedia Signal Processing., Vol.1, No.3, pp. 220-240, 2010.
  18. Fei Peng, Xiaolong Li, Bin Yang, “Adaptive reversible data hiding scheme based on integer transform”, Signal Processing., pp. 54-62, 2011.
  19. Ching-Yu Yang, Chih-Hung Lin and Wu-Chih Hu, “Reversible Data Hiding for High-Quality Images Based on Integer Wavelet Transform”, Journal of Information Hiding and Multimedia Signal Processing., Vol.3, No.2, pp. 142-150, 2012.
  20. Yih-Kai Lin, “High capacity reversible data hiding scheme based upon discrete cosine transformation”, The Journal of Systems and Software., pp. 2395-2404, 2012.
  21. Engin Avci, Turker Tuncer, Derya Avci, “A Novel Reversible Data Hiding Algorithm Based on Probabilistic XOR Secret Sharing in Wavelet Transform Domain”, Arab J Sci Eng, Research Article - Computer Engineering and Computer Science., 2016.
  22. Fan Li, Qian Mao and Chin-Chen Chang, “Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method”, Multimed Tools Appl., 2017.
  23. Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu and Fenghua Li, “Reversible data hiding in encrypted images by reserving room before encryption”, IEEE Trans. Information forensics and security, , Vol. 8, pp. 553-562, 2013.
  24. I. Daubechies and W. Sweldens, “Factoring Wavelet Transforms into Lifting Schemes”, The Journal of Fourier Analysis and Applications, Vol. 4, pp. 247–269, 1998.
  25. Chengyi Xiong, Jinwen Tian and Liu, Jian, “Efficient Architectures for Two-Dimensional Discrete Wavelet Transform Using Lifting Scheme”, IEEE Transactions on Image Processing, Vol.16, No.3, pp. 607-614, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Reversible Data Hiding Encryption Lifting Wavelets Steganography.