Reversible Data Hiding using Histogram Shifting

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
Reversible watermarking Wu Dan Introduction Difference expansion Histogram bin shifting.
Reversible Data Hiding ECE643 Digital Image Processing (I) Course Project Professor: Yun Q. Shi Su Yu 12/02/2011.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
A Review on: Spread Spectrum Watermarking Techniques
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Figure 1.a AVS China encoder [3] Video Bit stream.
ECE643 Course Project, Fall /21/20081 Optimum histogram pair based image lossless data embedding By G. Xuan, Y. Q. Shi, etc. Summarized By: Zhi.
Reversible watermarking Wu Dan Introduction What?
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Advisor: Chin-Chen Chang Student: Thai-Son Nguyen
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
(k, n)-Image Reversible Data Hiding
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Reversible Data Hiding in JPEG Images using Ordered Embedding
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source : Signal Processing, vol. 126, pp ,  November 2016
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Source : Journal of Visual Communication and Image Representation, vol
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
New Framework for Reversible Data Hiding in Encrypted Domain
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Dynamic improved pixel value ordering reversible data hiding
Department of Computer Science, University of Central Florida ,Orlando
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

Reversible Data Hiding using Histogram Shifting Sai Saketh Nandagiri 1001097897

Need for reversible data hiding Restoring the original cover image after extraction of payload from the stego image in which the payload is hidden. E.g., in medical images it is required that the image is losslessly reconstructed after extraction of payload. Content authentication to verify the authenticity of the multimedia material. E.g., to verify the authenticity of a bank check transmitted over the internet. A watermarked image is deemed to be authentic if pixel values in the stego image are not altered after embedding the data.

Reversible Data Hiding-Histogram Shifting Original image is modified based on tonal distribution to hide the payload. The peak and zero points in the histogram are used for embedding data. The peak and zero values should be transmitted as side-information to the receiver for payload extraction.

Algorithm-I First reversible data hiding algorithm as proposed by Ni et al [25]. Steps: Find the peak and zero point in the histogram of cover image. Scan the whole image in a sequential order, such as row-by-row, from top to bottom. Shift the histogram to left/right based on the location of zero point. If zero point is on the left side of histogram, i.e. v_zero < v_peak, shift the histogram towards left. Embed data in the shifted histogram.

Step 1: From the original image matrix f, histogram is plotted to locate zero and peak values. Figure 1: Original image f Figure 2: Original histogram h

Step 2: Figure 3: (a)Original image f (left) (b)Shifted image 𝑓 (right) Shift the histogram to the left as the zero point is located on the left side of the histogram using equation 1. 𝑓 𝑥 = 𝑓 𝑥,𝑦 −1, 𝑣 𝑧𝑒𝑟𝑜 <𝑓 𝑥,𝑦 < 𝑣 𝑝𝑒𝑎𝑘 𝑓(𝑥,𝑦), 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 Eq. 1 Figure 4: (a)Original histogram h (left) (b)Shifted histogram ℎ (right)

Step 3: Figure 5: (a)Shifted image 𝑓 (left) (b)Stego image 𝑓 (right) Embed payload p = ‘1 0 1 1 0’ in the shifted image using equation 2. 𝑓 𝑥,𝑦 = 𝑓 𝑥,𝑦 −1, 𝑓 𝑥,𝑦 = 𝑣 𝑝𝑒𝑎𝑘 𝑎𝑛𝑑 𝑝 𝑙 =0 𝑓 (𝑥,𝑦), 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 Eq. 2 Figure 6: (a)Shifted histogram ℎ (right) (b)Stego histogram ℎ (left)

Algorithm-II Reversible data hiding algorithm proposed by Pan et al [26]. Steps: Divide the cover image into blocks of size s x s. For each block B, the peak value v_peak is located from its histogram. The neighboring points v_peak-1 and v_peak+1 are also located. Histogram is shifted to the left and right based on v_peak-2 and v_peak+2 Embed data in the shifted histogram.

Histogram is shifted to the left and right using equation 3. 𝐵′ 𝑖,𝑗 = 𝐵 𝑖,𝑗 +1, 𝑣 𝑝𝑒𝑎𝑘 +2≤𝐵(𝑖,𝑗)≤254 𝐵 𝑖,𝑗 −1, 1≤𝐵(𝑖,𝑗)≤ 𝑣 𝑝𝑒𝑎𝑘 −2 Eq. 3 Binary bit stream is embedded in the cover image using equation 4. 𝐵′′ 𝑖,𝑗 = 𝐵′ 𝑖,𝑗 +1, & 𝐵 ′ 𝑖,𝑗 =𝑣 𝑝𝑒𝑎𝑘 +1, 𝑝 𝑙 =1 𝐵′ 𝑖,𝑗 −1, & 𝐵 ′ 𝑖,𝑗 =𝑣 𝑝𝑒𝑎𝑘 −1, 𝑝 𝑙 =1 Eq. 4

Proposed method to achieve RDH-HS Fig 7: Flowchart of the proposed data hiding method

Proposed method to achieve RDH(cont.) Steps: At the transmitter: The cover image (512 × 512) is 8 bits quantized as shown in fig. 7, is split into four blocks, each of size (256 × 256) as shown in fig. 8. The histogram of each block is shown in fig. 9. Then the histogram of each block is inverted as shown in fig. 10 using eq. 5. 𝐵 𝑖,𝑗 =255−𝐼 𝑖,𝑗 , 1≤𝑖≤𝑟𝑜𝑤𝑠;1≤𝑗≤𝑐𝑜𝑙𝑢𝑚𝑛𝑠 Eq. 5 Fig 8: Cover image

Fig 9: Cover image split into blocks Fig 10: Histogram of individual blocks(see fig. 9) Fig 11: Inverted histogram of individual blocks(see fig. 10)

Continued Histogram shifting of each block as proposed by Pan et al. [26]. 𝐵′ 𝑖,𝑗 = 𝐵 𝑖,𝑗 +1, 𝑣 𝑝𝑒𝑎𝑘 +2≤𝐵(𝑖,𝑗)≤254 𝐵 𝑖,𝑗 −1, 1≤𝐵(𝑖,𝑗)≤ 𝑣 𝑝𝑒𝑎𝑘 −2 Eq. 6 Fig 12

Continued The data is embedded in each block along using eq. 7. 𝐵′′ 𝑖,𝑗 = 𝐵′ 𝑖,𝑗 +1, & 𝐵 ′ 𝑖,𝑗 =𝑣 𝑝𝑒𝑎𝑘 +1, 𝑝 𝑙 =1 𝐵′ 𝑖,𝑗 −1, & 𝐵 ′ 𝑖,𝑗 =𝑣 𝑝𝑒𝑎𝑘 −1, 𝑝 𝑙 =1 Eq. 7 Fig 13

Continued The histograms of each block are inverted and stitched to form a stego image of size (512 × 512). 𝐵′′′ 𝑖,𝑗 =255−𝐵′′ 𝑖,𝑗 , 1≤𝑖≤𝑟𝑜𝑤𝑠;1≤𝑗≤𝑐𝑜𝑙𝑢𝑚𝑛𝑠 Eq. 8 Fig 14

Fig 15

Continued Fig 16 At the receiver: The stego image (512 × 512) is split into four blocks, each of size (256 × 256). Fig 16

Continued Eq. 9 Fig 17 Invert the histogram of each block using eq. 9. 𝐶 𝑖,𝑗 =255−𝐵′′′ 𝑖,𝑗 , 1≤𝑖≤𝑟𝑜𝑤𝑠;1≤𝑗≤𝑐𝑜𝑙𝑢𝑚𝑛𝑠 Eq. 9 Fig 17

Continued The data is extracted from each block and shifted histogram is obtained using equation 10. 𝐶 ′ (𝑖,𝑗)= 𝐶 𝑖,𝑗 −1, 𝐶 𝑖,𝑗 =𝑣 𝑝𝑒𝑎𝑘 +2, 𝑝 𝑙 =1 𝐶 𝑖,𝑗 +1, 𝐶 𝑖,𝑗 =𝑣 𝑝𝑒𝑎𝑘 −2, 𝑝 𝑙 =1 𝐶 𝑖,𝑗 , 𝐶 𝑖,𝑗 = 𝑣 𝑝𝑒𝑎𝑘 ±1 ,𝑝 𝑙 =0 Eq. 10 Fig 18

Continued The shifted blocks are re-shifted using equation 11. 𝐶′′ 𝑖,𝑗 = 𝐶′ 𝑖,𝑗 −1, 𝑣 𝑝𝑒𝑎𝑘 +3≤𝐶′(𝑖,𝑗)≤255 𝐶′ 𝑖,𝑗 +1, 0≤𝐶′(𝑖,𝑗)≤ 𝑣 𝑝𝑒𝑎𝑘 −3 Eq. 11 Fig 19

Continued The histogram of each block is inverted using equation 12. 𝐶′′′ 𝑖,𝑗 =255−𝐶′′ 𝑖,𝑗 , 1≤𝑖≤𝑟𝑜𝑤𝑠;1≤𝑗≤𝑐𝑜𝑙𝑢𝑚𝑛𝑠 Eq. 12 Fig 20

Continued The inverted blocks are stitched together to get the original cover image. Fig 21

PSNR of stego image (in dB) Results Block size PSNR of stego image (in dB) Max number of bits 256 x 256 48.3141 8987 128 x 128 48.3913 12675 32 x 32 48.6880 24209 16 x 16 48.8930 29579 8x8 49.1838 33960 Table 1: Results for Lena image

PSNR of stego image (in dB) Continued Block size PSNR of stego image (in dB) Max number of bits 256 x 256 48.2512 5797 128 x 128 48.3061 8322 32 x 32 48.5328 17438 16 x 16 48.6917 21798 8x8 48.9185 24808 Table 2: Results for Barbara image

PSNR of stego image (in dB) Continued Block size PSNR of stego image (in dB) Max number of bits 256 x 256 48.2750 7160 128 x 128 48.3358 9966 32 x 32 48.5343 17385 16 x 16 48.6937 21806 8x8 48.9157 24237 Table 3: Results for Goldhill image

PSNR of stego image (in dB) Continued Block size PSNR of stego image (in dB) Max number of bits 256 x 256 48.6141 22754 128 x 128 48.7194 27149 32 x 32 49.0965 38959 16 x 16 49.3330 44047 8x8 49.6595 47568 Table 4: Results for Airplane image

PSNR of stego image (in dB) Cont. Block size PSNR of stego image (in dB) Max number of bits 256 x 256 48.4693 16409 128 x 128 48.6105 21617 32 x 32 49.0057 35272 16 x 16 49.2274 40449 8x8 49.5564 44490 Table 5: Results for Tiffany image

Conclusions & Future work The objective of this research is to improve the security of the present data hiding algorithms. This is achieved using histogram inversion before embedding the data in the cover image. In the results section it is also clear that the PSNR of the image improves with decrease in block size. The only tradeoff is, when the block size decreases, there is significant increase in number of blocks to be processed. This leads to increase in the embedding time. This research is mainly based on algorithm proposed by Pan et al [26]. Future work can be, extending the present algorithm by using the stego image to embed data again. This is defined as multi-layer embedding.

Acronyms and Abbreviations HS-RDH – Histogram shifting based RDH ICMP – Internet Control Message Protocol IWT – Integer Wavelet Transform JPEG – Joint Photographic Experts Group LSB – Least Significant Bit PSNR – Peak Signal to Noise Ratio  QIM – Quantization Index Modulation RDH - Reversible Data Hiding

References M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber: Reversible data hiding, Proceedings of IEEE International Conference on Image Processing, Rochester, NY, pp. 157-160, 2002. I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” in IEEE Trans. on Image Processing, vol. 6. No. 12, pp. 1673-1687, Dec. 1997. C. C. Chang, J. Y. Hsiao, and C. S. Chan: Finding optimal LSB substitution in image hiding by dynamic programming strategy, Pattern Recognition, vol. 36, no. 7, pp. 1583-1595, July. 2003. J. Huang and Y. Q. Shi, "An adaptive image watermarking scheme based on visual masking," IEE Electronics Letters, vol. 34, no. 8, pp. 748-750, April 1998. B. Chen, G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.

References C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel, “Lossless recovery of an original image containing embedded data,” US Patent: 6,278,791, 2001. S. Katzenbeissar and F. Petitcolas, (Editors), “Information hiding techniques for steganography and digital watermarking,” Artech House, 1999. Liu, Shao-Hui, Tun-Hang Chen, Hong-Xun Yao, and Wen Gao. “A variable depth LSB data hiding technique in images”. Proceedings of IEEE International Conference on  Machine Learning and Cybernetics, vol. 7, pp. 3990-3994, Aug., 2004. Z. M. Lu, J. S. Pan, and S. H. Sun, “VQ-based digital image watermarking method”, Electronics Letters, vol. 36, no. 14, pp. 1201-1202, April, 2000. M. Goljan, J. Fridrich, and R. Du, “Distortion-free data embedding,” Proceedings of 4th Information Hiding Workshop, pp. 27-41, Pittsburgh, PA, April 2001.

References C. I. Podilchuk and E. J Delp, “Digital watermarking: Algorithms and applications,” IEEE Signal Processing Magazine, pp. 33–46, July, 2001. G. Xuan et al, “Distortionless data hiding based on integer wavelet transform,” IEE Electronics Letters, pp. 1646-1648, Dec 2002. H. C. Wu, N. I. Wu, C. S. Tsai and M. S. Hwang, "Image steganographic scheme based on pixel-value differencing and LSB replacement methods," IEE Proceedings - Vision, Image and Signal Processing, vol. 152, no. 5, pp. 611-615, 7 Oct. 2005. B. Yang et al, "Integer DCT Based Reversible Image Watermarking by Adaptive Coefficient Modification" in E. J. Delp, editor, Proceedings of Electronic Imaging, volume VII of Security and Watermarking of Multimedia Contents, SPIE vol. 7, pp. 218-229, Jan, 2005. Jun Tian, "Reversible data embedding using a difference expansion," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890-896, Aug. 2003.

References G. Xuan et al, “Lossless data hiding based on integer wavelet transform”, IEEE Workshop on Multimedia Signal Processing, 2002, pp. 312-315, Dec., 2002. Y. C. Hu, “High capacity image hiding scheme based on vector quantization”, Pattern Recognition, vol. 39, no. 9, pp. 1715-1724, Sep., 2006. G. Xuan, Y. Q. Shi, and Z. Ni, “Reversible data hiding using integer wavelet transform and companding technique,” Proc. IWDW04, Korea, October 2004. J. Fridrich, M. Goljan and R. Du, “Invertible authentication,” Proc. SPIE, Security and Watermarking of Multimedia Contents, pp. 197-208, San Jose, CA, January 2001. M. Thodi and J. J. Rodríguez, “Reversible watermarking by prediction-error expansion,” Proceedings of 6th IEEE Southwest Symposium on Image Analysis and Interpretation, pp. 21-25, Lake Tahoe, CA,USA, March 28-30, 2004.

References C. De Vleeschouwer, J. F. Delaigle and B. Macq, “Circular interpretation of bijective transformations in lossless watermarking for media asset management,” IEEE Trans. Multimedia, vol. 5, pp. 97-105, March 2003. W. Bender, D. Gruhl, N. Mprimoto and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, Nos. 3&4, pp. 313-336, 1996. Z. Ni et al, “Robust lossless data hiding,” IEEE International Conference and Expo, Taipei, Taiwan, June 2004. D. Zou, Y. Q. Shi and Z. Ni, "A semi-fragile lossless digital watermarking scheme based on integer wavelet transform,"  IEEE 6th Workshop on Multimedia Signal Processing, pp. 195-198, Oct., 2004. Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354–362, Mar 2006.

References Z. Pan, S. Hu, X. Ma, and L. Wang, “Reversible data hiding based on local histogram shifting with multilayer embedding,” Journal of Visual Communication and Image Representation, vol. 31, pp. 64–74, Aug., 2015. [Online]. Available: http://linkinghub.elsevier.com/retrieve/pii/S1047320315000838 G. Xuan et al., "High capacity lossless data hiding based on integer wavelet transform," Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium on, Vol.2, pp. II-29-32, May, 2004. Z. Zhang et al, "A unified authentication framework for JPEG2000," IEEE International Conference on Multimedia and Expo, Vol. 2, pp. 915-918, Taipei, June, 2004. N. Ramaswamy, “Digital signature in H.264/AVC MPEG4 Part 10,” M.S. Thesis, Dept. of Electrical Engineering, University of Texas at Arlington, Aug 2004. S. Puthussery, “A progressive secret reveal system for color images,” M.S. Thesis, Dept. of Electrical Engineering, University of Texas at Arlington, Aug 2004.

References M. T. Sandford II, J. N. Bradley, and T. G. Handel, “Data embedding method,”Proc. SPIE 2615, Integration Issues in Large Commercial Media Delivery Systems, pp. 226–259, Jan, 1996. C. A. Allen and J. L. Davidson, “Steganography using the minimax eigenvalue decomposition,” Proc. SPIE 3456, Mathematics of Data/Image Coding, Compression, and Encryption, pp. 13–24, Nov., 1998. S. Takano, K. Tanaka, and T. Sugimura, “Steganograpic image transformation,” Proc. SPIE 3657, Security and Watermarking of Multimedia Contents, pp. 365–374, April, 1999. L.-C. Huang, L.-Y. Tseng, and M.-S. Hwang, “A reversible data hiding method by histogram shifting in high quality medical images,” Journal of Systems and Software, vol. 86, no. 3, pp. 716–727, March, 2013. H. J. Hwang, “Reversible Watermarking Method Using Optimal Histogram Pair Shifting Based on Prediction and Sorting,” KSII Transactions on Internet and Information Systems, vol. 4, no. 4, pp. 655–670, Aug, 2010.

References J. Gupta, P. Gupta, and S. C. Gupta, “Reversible data hiding technique using histogram shifting,”2nd International Conference on Computing for Sustainable Global Development, pp. 2114–2119, March 2015. M. Fujiyoshi, “A Histogram Shifting-Based Blind Reversible Data Hiding Method With a Histogram Peak Estimator,” 2012 International Symposium on Communications and Information Technologies (ISCIT), vol. 1, pp. 313–318, Oct., 2012. F. Shih, “Digital watermarking and steganography: Fundamentals and Techniques,” CRC Press, 2008. Notes on Steganography, Available: http://www.garykessler.net/library/ steganography.html S. Jajodia, N. F. Johnson, and Z. Duric, “Information hiding: Steganography and Watermarking- attacks and Countermeasures,” Springer US, 2001.

Thank You!