SlideShare a Scribd company logo
1 of 12
Download to read offline
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012
DOI : 10.5121/ijist.2012.2303 41
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE
DATA EMBEDDING
Mr.R.Vinod1
, Mr.S.Pradeep2
, Mr.V.Vignesh3
, Prof.P.Tamije Selvy4
,
Ms.P.Anantha Prabha5
1,2,3
UG Student, 4
Assistant Professor(SG), 5
Assistant Professor
1,2,3,4,5
Department of Computer Science and Engineering, Sri Krishna College of
Technology, Coimbatore, India
1
vinod.200691@gmail.com,2
pradeepsens@yahoo.com,3
vignesh.060691gmail.com,
4
tamijeselvy@gmail.com,5
ap.prabha@gmail.com
ABSTRACT
Reversible data embedding is a technique that embeds data into an image in a reversible manner. An
important aspect of reversible data embedding is to find embedding area in the image and to embed the
data into it. In the conventional reversible techniques, the visual quality is not taken into account which
resulted in a poor quality of the embedded images. Hence the histogram modification based reversible data
hiding technique using multiple causal windows is proposed which predicts the embedding level with the
help of the pixel value, edge value, Just Noticeable Difference(JND) value. Using this data embedding level
the data is embedded into the pixels. The pixel level adjustment considering the Human Visual System
(HVS) characteristics is also made to reduce the distortion caused by data embedding. This significantly
improves the data embedding capacity along with greater visual quality. The proposed method includes
three phases: (i).Construction of casual window and calculation of edge and JND values in which the
casual window determines the pixel values, the edge and the JND values are calculated (ii).Data
embedding which is the process of embedding the data into the original image (iii). Data extractor and
image recovery where the original image is recovered and the embedded bits are obtained. The
experimental results and performance comparison with other reversible data hiding algorithms are
presented to demonstrate the validity of the proposed algorithm. The experimental results show that the
Performance of the proposed system on an average shows an accuracy of 95%.
Keywords
Data hiding, human visual system, just noticeable difference, lossless watermarking.
1. INTRODUCTION
Data embedding is a method of embedding confidential information into a set of host data, such
as a photograph, television signal, or identification card. Data embedding has direct applications
in data mining, data indexing and searching, information retrieval, and multimedia data
processing. Data embedding on image can be implemented as a steganography technique.
STEGANOGRAPHY is the art and science of writing hidden messages on any cover media in
such a way that no one, apart from the sender and intended recipient, suspects the existence of the
message. Reversible data embedding, which is often referred to as lossless or invertible data
embedding, is a technique that embeds data into an image in a reversible manner. Extensive
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012
42
efforts have been devoted to increase the embedding capacity without degrading the visual quality
of the embedded image.
A key of reversible data embedding is to find an embedding area in an image with the help of
redundancy in the image content. The conventional reversible techniques [1] uses lossless data
compression to find an extra area that can contain to-be-embedded data. In order to expand the
extra space, the recent algorithms reduce the redundancy by performing pixel value prediction [1]
and/or utilizing image histogram [8]. The state-of-the-art techniques [3], [8] exhibit high
embedding capacity without severely degrading the visual quality of the embedded result.
However the visual quality is not taken into account in the conventional methods the quality of
the resultant embedded image is not satisfactory. From all data embedding techniques one
common drawback is the fact that the original image is distorted by some small amount of noise
due to data embedding itself.
The proposed system uses image as the input and a data embedding level is adaptively adjusted
for each pixel with a consideration of the human visual system (HVS) characteristics. The
conventional histogram modification methods embed a message bit into the histogram of pixel
values or the histogram of the pixel differences. A multiple causal window is constructed to
determine the pixel value of the given image and the edge value is determined. After the edge
detection is performed, the JND value is calculated. Data embedding is the process of embedding
the confidential information into the original image. The data can be embedded only in non-edge
pixel positions hence the embedding level for the edge and non-edge pixel positions are obtained.
After estimating the edge, JND value and the embedding level the message bit b is embedded for
each pixel. At the data extractor the same values are obtained and the image is recovered.
2. RELATED WORK
C.-C. Chang, Lin, Chen Y.H [1], proposed, a reversible data-embedding scheme to embed secret
information in original images. Here, an embedded pixel value is generalised according to a
predetermined threshold and the difference between the predicted pixel value and its original
pixel value. The results show that the proposed scheme can provide great payload capacity while
preserving the quality of the stego-image D.-M. Thodi, Rodrigues J.J [2], proposed, a histogram
shifting technique as an alternative to embedding the location map. This technique improves the
distortion performance at low embedding capacities and mitigates the capacity control problem.
Also a reversible data-embedding technique called prediction-error expansion is proposed here.
This new technique better exploits the correlation inherent in the neighbourhood of a pixel than
the difference-expansion scheme. Prediction-error expansion and histogram shifting combine to
form an effective method for data embedding. The results show that prediction-error expansion
doubles the maximum embedding capacity when compared to difference expansion. There is also
a significant improvement in the quality of the watermarked image, especially at moderate
embedding capacities Y. Hu, H.-K. Lee and J.Li [3], focus on improving the overflow location
map. A new embedding scheme that helps us construct an efficient payload-dependent overflow
location map is designed here. Such an overflow location map has good compressibility. The
accurate capacity control capability also reduces unnecessary alteration to the image. Thus
improves the embedding capacity with good image quality.
W. Lin, L. Dong, and P. Xue [4], proposed a method to discriminate pixel differences according to
their impact toward perceived visual quality. Local contrast changes which are noticeable are
formulated since contrast is the basic sensory feature in the human visual system (HVS)
perception. Thus the fundamental improvement in sharpened image edges is achieved by taking
the visual signal with blurring and luminance fluctuations into account.
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012
43
S. Weng, Y.Zhao, J.-S. Pan, and Zhicheng Ni [9], proposed, reversible data hiding scheme which
uses zero or minimum points of the histogram of the image and slightly modifies the pixel values
to embed data into the image without considering the embedding level resulting with
comparatively low distortion of the original image.
3. PROPOSED METHODOLOGY
The proposed scheme is based on finding embedding area in the image and to embed the data into
it. This embedding area in the image is determined with the help of embedding level of each
pixel. Multi causal windows are used here to determine the embedding level. The perceptual
characteristic of Human Visual System is considered to improve quality degradation caused by
data embedding. The flow diagram of the proposed system is as follows.
INPUT ORIGINAL IMAGE
Input string as
binary bit
Output bits
OUTPUT ORIGINAL IMAGE
Figure 1. Overall process of Reversible Data Embedding
3.1 Construction of Multi Causal Window:
Causal window is a part of the original image with specified window size. This causal window is
used to determine the pixel values, the edge values, and the JND (Just Noticeable Difference)
values. Using these values the embedding level of each pixel is determined and the data is being
embedded into the original image. Similarly multiple causal windows are identified in the original
image and the embedding level calculation is made so that more data embedding is possible.
Causal window to predict pixel values
Determine Edge and JND values
Determine the embedding level
Embed the bit ‘b’
Bit extraction
Image recovery
EMBEDDED IMAGE
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012
44
Algorithm:
Step-1: Calculating Pixel value:
Let (i, j) denote the pixel coordinate of the original image. Let the original image be ‘x’
and the embedded image be ‘y’. The pixel value for each causal window is predicted.
x1(i,j) = 1/ N(Ωi,j) ∑ x(m,n) -(1)
(m,n)Ωi,j
where Ωi,j denotes a single causal window surrounding x(i, j)
N(Ωi,j) denotes the cardinality of the set Ωi,j.
The size of the each causal window is specified as S. The average of the pixel values is used as
the predicted value.
Step-2: Calculating Pixel Difference:
The pixel difference is calculated between the original pixel values and the predicted values as
follows,
d(i,j)=| x(i,j)- x1 (i,j) | -(2)
where d(i,j) denotes the pixel difference value for each pixel. This pixel
difference value is used in data embedding process.
Step-3: Calculating Edge Value:
The edge is simply estimated for each pixel as follows:
If var(Ωi,j) > Te , E(i,j)= 1 -(3)
If var(Ωi,j) <= Te , E(i,j)= 0 -(4)
where E(i,j) determines whether the pixel is edge or not.
var(Ωi,j) denotes the variance of pixel values in Ωi,j.
Te represents the edge threshold value.
Step-4: Calculating JND Value:
The just noticeable difference value is estimated after the edge detection as follows:
jnd(i,j) = Tl(i,j) + µ(Ta(i,j)/ Tl(i,j)) -(5)
where µ=0.5, Tl and Ta are the two thresholds representing the luminance adaptation and the
activity masking of the Human Visual System characteristics respectively.
Tl is calculated by measuring the background luminance with the help of average value of local
neighbourhood of a single causal window.
A piecewise linear approximation is used with three parameters, a, b, c .
If edge (E(i,j) = 1), a=8, b=18, c=22 -(6)
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012
45
If non-edge (E(i,j) = 0), a=10, b=20, c=24 -(7)
i.e., if the background luminance is <=75 , Tl is calculated as
Tl = b-(((b-a)/75)*background luminance)
And if the background luminance is >=125 , Tl is calculated as
Tl = (((c-a)/130)*background luminance) + ((225/130)*a)-((125/130)*c)
Ta is calculated as the maximum pixel difference value in the local neighbourhood of a single
causal window.
Step-5: Finding Embedding Level:
After calculating the edge and JND value, the embedding level of the image is determined. The
data embedding is performed by using the difference value and finding the extra space in the
image where the data can be embedded. If the embedded value exceeds a pixel value bound (0 to
255 in 8 bit images), overflow and underflow problem occurs. To solve this problem, the original
image histogram is shrunk from both sides by 2L
, where L is the embedding level. The overhead
information describing the pre-processing is losslessly compressed and embedded together with
pure payload data to realize reversible data embedding. Compared to Tai et al.’s method of
adopting the fixed embedding level, the embedding level here is adaptively adjusted for each
pixel according to the local image characteristics. The embedding level Ki,j is calculated as
follows:
If non-edge (E(i,j)= 0),
Ki,j =arg k max 2k
, where 2k
< jnd(i,j), k ≤ L -(8)
That is the maximum possible embedding level is chosen such that the pixel value change should
be lower than the JND value because the distortion above the JND in the smooth region is
perceptually disturbing.
If edge (E(i,j)= 1),
Ki,j =arg k min 2k
, where 2k
> jnd(i,j), k ≤ L -(9)
That is the minimum possible embedding level above the JND is used to embed a sufficient
amount of data because it is difficult to find the extra space in the image using the embedding
level lower than the JND value since the difference values d(i,j) in the edge region are high. The
increase of the JND value in the edge region does not reduce the visual quality. Sometimes an
intentional increase of the JND in the edge region is employed for enhancement of the image.
3.2 Data Embedding:
After the estimation of the embedding level, the data in the form of binary bits are embedded into
each pixel. The input data is converted into ASCII values and then converted into its respective
binary values. Thus the input data bit ‘b’ is embedded into pixels if d(i,j) < 2Ki,j
as follows:
If x(i,j) ≥ x1 (i,j) ,
y(i,j)= x(i,j) + d(i,j) + b -(10)
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012
46
If x(i,j) < x1 (i,j) ,
y(i,j)= x(i,j) - d(i,j) – b -(11)
If d(i,j) ≥ 2Ki,j
, the bit ‘b’ is not embedded into pixels instead pixel level adjustment is performed
as follows:
If x(i,j) ≥ x1 (i,j) ,
y(i,j)= x(i,j) + 2Ki,j
-(12)
If x(i,j) < x1 (i,j) ,
y(i,j)= x(i,j) - 2Ki,j
-(13)
This process continues until all the bits are embedded. The overflow and underflow problem is
eliminated by shifting the pixel values by 2L
at the pre-processing stage. The same is performed
for multiple causal windows to embed more number of bits. The upper and left image boundaries
are not modified to satisfy the reversibility. Finally the embedded image ‘y’ is obtained.
3.3 Data Extraction and Image Recovery:
3.3.1 Data Extraction:
Data extraction is the process of extracting the embedded data from the embedded image and to
obtain the original image. Knowing the embedding level L of the image the data is extracted from
the embedded image. Since the causal windows are used to determine edge, JND, and embedding
level, the same values can be obtained at the extractor side.
If | y(i,j)- x1 (i,j) | < 2Ki,j+1
, the data bit is extracted as follows:
If | y(i,j)- x1 (i,j) | is even, then b=0 -(14)
If | y(i,j)- x1 (i,j) | is odd, then b=1 -(15)
3.3.2 Pixel Recovery:
The original pixel values are recovered by the pixel recovery process as follows:
When | y(i,j)- x1 (i,j) | < 2Ki,j+1
, the pixel values are recovered by,
If y(i,j) < x1 (i,j) ,
x(i,j) = y(i,j) + ((ceil(y(i,j) – x1(i,j))/2 -(16)
If y(i,j) ≥ x1 (i,j) ,
x(i,j) = y(i,j) - ((ceil(y(i,j) – x1(i,j))/2 -(17)
When | y(i,j)- x1 (i,j) | ≥ 2Ki,j+1
, the pixel values are recovered by,
If y(i,j) < x1 (i,j) ,
x(i,j) = y(i,j) + 2Ki,j
-(18)
If y(i,j) > x1 (i,j) ,
x(i,j) = y(i,j) - 2Ki,j
-(19)
Thus the original pixel values including the overhead information bits at preprocessing are
extracted and finally the original image is recovered completely.
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012
47
4. EXPERIMENTAL RESULTS
The performance of the proposed system is evaluated using MATLAB. The input image is given
and the causal window is identified in the input image. The pixel values of the causal window are
determined and the average value of the pixel values is calculated.
Figure 4.1.Input image showing single causal window
The difference values for each pixel are calculated and thereby edge value is calculated using the
edge threshold Te (a threshold value which lies between 0 and 1).
Figure 4.2.Edge Value
The Just Noticeable Difference value is calculated using two thresholds representing the
luminance adaptation and the activity masking i.e., Tl and Ta (from Step-4) of the Human Visual
System characteristics respectively.
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012
48
Figure 4.3.Just Noticeable Difference Value
Using the edge and JND value, the embedding level Ki,j (from (8) and (9)) of the image is
determined.
Figure 4.4.Embedding Level Value
The input string which is to be embedded is converted into its respective bits.
Figure 4.5.Input String to Binary Conversion
Finally the data is being embedded into the pixel values (from (10) and (11)) with respect to the
embedding level and pixel level adjustment is also performed (from (12) and (13)).
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012
49
Figure 4.6.Data Embedding
Image obtained after embedding the data is displayed here.
Figure 4.7.Embedded Image
Extraction of the original data that is being embedded (from (14) and (15)).
Figure 4.8.Bit extraction
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012
50
Extracted bit is converted into its respective string.
Figure 4.9.Extracted Bit to String Conversion
The original pixel values are recovered (from (16), (17), (18) and (19)).
Figure 4.10.Original Pixel Recovery
The recovered original image.
Figure 4.11.Recovered Image
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012
51
Table 1. PERFORMANCE ANALYSIS BASED ON PSNR (Peak Signal to Noise Ratio), SSIM
(Structural Similarity), EMBEDDING CAPACITY
Figure 4.14 Performance of the system based on PSNR, SSIM, EMBEDDING CAPACITY.
The above graph shows the performance of the single and multi causal window based on the
parameters like PSNR (in dB), SSIM (in %), EMBEDDING CAPACITY (in bit per pixel).
5. CONCLUSION
Thus an improved histogram modification based reversible data hiding technique is proposed
here. Unlike the conventional reversible techniques, the HVS characteristics are considered to
avoid the distortion caused by data embedding process. The edge and JND values are estimated
by using the causal windows, and thus no additional overhead is required. By using the estimated
values, the embedding level is adaptively adjusted for each pixel. This increases the data
embedding capacity and visual quality. The experimental results show that the proposed system
produces an accuracy of about 95%. Future work includes the application of the technique to
reversible video data embedding, the video related HVS characteristics such as motion blur and
motion sharpening can be additionally considered to produce perceptually pleasant video
sequences.
SYSTEM
PSNR
(in dB)
SSIM
(in %)
EMBEDDING CAPACITY
(in bit per pixel)
SINGLE CAUSAL WINDOW 30.06 0.861 0.89
MULTI CAUSAL WINDOW 29.98 0.921 0.96
0.8
0.85
0.9
0.95
SSIM
SINGLE
CAUSAL
WINDOW
MULTIPLE
CAUSAL
WINDOW
29.9
30
30.1
PSNR
SINGLE
CAUSAL
WINDOW
MULTIPLE
CAUSAL
WINDOW
0.8
0.9
1
EMBEDDING CAPACITY
SINGLE
CAUSAL
WINDOW
MULTIPLE
CAUSAL
WINDOW
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012
52
REFERENCES
[1] C.-C. Chang, Lin, Chen Y.H, “Reversible data embedding scheme using differences between original
and predicted pixel values,” IEEE Trans. Information Security ,IET.,vol.2, Issue.2, pp. 35-46, Jun.
2008.
[2] D.-M. Thodi, Rodrigues J.J,”Expansion embedding techniques for reversible watermarking” IEEE
Trans. Image Processing, vol.16, Issue.3, pp. 721-730, Mar. 2007.
[3] Y. Hu, H.-K. Lee, and J. Li, “DE-based reversible data hiding with improved overflow location
map,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, pp. 250–260, Feb. 2009.
[4] W. Lin, L. Dong, and P. Xue, “Visual distortion gauge based on discrimination of noticeable contrast
changes,” IEEE Trans. Circuits Syst.Video Technol., vol. 15, pp. 900–909, Jul. 2005.
[5] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video
Technol., vol. 16, pp. 354–362, Mar. 2006.
[6] A. Polesel, G. Ramponi, and V. J. Mathews, “Image enhancement via adaptive unsharp masking,”
IEEE Trans. Image Process., vol. 9, no. 3, pp. 505–510, Mar. 2000.
[7] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video
Technol., vol. 13, pp. 890–896, Aug. 2003.
[8] W.-L. Tai, C.-M. Yeh, and C.-C. Chang, “Reversible data hiding based on histogram modification of
pixel differences,” IEEE Trans. CircuitsSyst. Video Technol., vol. 19, pp. 906–910, Nov. 2009.
[9] S. Weng, Y. Zhao, J.-S. Pan, and R. Ni, “Reversible watermarking based on invariability and
adjustment on pixel pairs,” IEEE Signal Process. Lett., vol. 15, pp. 721–724, Nov. 2008.
[10] CVG-USR Image Database, [Online] http://decsai.ugr.es/cvg/dbimages
Authors
Mr.R.Vinod is currently pursuing Bachelor of Engineering in Computer Science and
Engineering under Anna University, Coimbatore, India. His areas of interest are
Image Processing and Multimedia.
Mr.S.Pradeep is currently pursuing Bachelor of Engineering in Computer Science and
Engineering under Anna University, Coimbatore,India. His areas of interest are Image
Processing and Multimedia.
Mr.V.Vignesh is currently pursuing Bachelor of Engineering in Computer Science and
Engineering under Anna University, Coimbatore, India. His areas of interest are
Image Processing and Multimedia.
Prof. P.Tamije Selvy received B.Tech (CSE), M.Tech (CSE) in 1996 and 1998
respectively from Pondicherry University. Since 1999, she has been working as
faculty in reputed Engineering Colleges. At present, she is working as Assistant
Professor (SG) in the department of Computer Science & Engineering, Sri Krishna
College of Technology, Coimbatore. She is currently pursuing Ph.D under Anna
University, Chennai. Her Research interests include Image Processing, Data Mining,
Pattern Recognition and Artificial Intelligence.
Ms.P.Anantha Prabha obtained B.E in Electronics and Communication Engineering
and Master of Engineering in Computer Science and Engineering from V.L.B.
Janakiammal College of Engineering and Technology, Coimbatore, India in 2001 and
2008 respectively. She has been working in various Engineering Colleges for 9 years.
She is currently working as an Assistant Professor in Sri Krishna College of
Technology, Coimbatore. Her areas of interest are Clouding Computing, Mobile
Computing and Image Processing.

More Related Content

Similar to MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING

An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
IJECEIAES
 
Quality assessment of resultant images after processing
Quality assessment of resultant images after processingQuality assessment of resultant images after processing
Quality assessment of resultant images after processing
Alexander Decker
 

Similar to MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING (20)

Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
 
Q180304102109
Q180304102109Q180304102109
Q180304102109
 
Ijnsa050205
Ijnsa050205Ijnsa050205
Ijnsa050205
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
 
A new image steganography algorithm based
A new image steganography algorithm basedA new image steganography algorithm based
A new image steganography algorithm based
 
Development and Comparison of Image Fusion Techniques for CT&MRI Images
Development and Comparison of Image Fusion Techniques for CT&MRI ImagesDevelopment and Comparison of Image Fusion Techniques for CT&MRI Images
Development and Comparison of Image Fusion Techniques for CT&MRI Images
 
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
 
41 9147 quantization encoding algorithm based edit tyas
41 9147 quantization encoding algorithm based edit tyas41 9147 quantization encoding algorithm based edit tyas
41 9147 quantization encoding algorithm based edit tyas
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
G017444651
G017444651G017444651
G017444651
 
Quality assessment of resultant images after processing
Quality assessment of resultant images after processingQuality assessment of resultant images after processing
Quality assessment of resultant images after processing
 
A comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingA comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hiding
 
IRJET- An Improvised Multi Focus Image Fusion Algorithm through Quadtree
IRJET- An Improvised Multi Focus Image Fusion Algorithm through QuadtreeIRJET- An Improvised Multi Focus Image Fusion Algorithm through Quadtree
IRJET- An Improvised Multi Focus Image Fusion Algorithm through Quadtree
 
Applying Information Security to Healthcare Services
Applying Information Security to Healthcare ServicesApplying Information Security to Healthcare Services
Applying Information Security to Healthcare Services
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
98462-234458-1-PB
98462-234458-1-PB98462-234458-1-PB
98462-234458-1-PB
 
IMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNN
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 

More from ijistjournal

BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
ijistjournal
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
ijistjournal
 

More from ijistjournal (20)

Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
 
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
 
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDYDECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Recently uploaded (20)

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 

MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING

  • 1. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012 DOI : 10.5121/ijist.2012.2303 41 MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING Mr.R.Vinod1 , Mr.S.Pradeep2 , Mr.V.Vignesh3 , Prof.P.Tamije Selvy4 , Ms.P.Anantha Prabha5 1,2,3 UG Student, 4 Assistant Professor(SG), 5 Assistant Professor 1,2,3,4,5 Department of Computer Science and Engineering, Sri Krishna College of Technology, Coimbatore, India 1 vinod.200691@gmail.com,2 pradeepsens@yahoo.com,3 vignesh.060691gmail.com, 4 tamijeselvy@gmail.com,5 ap.prabha@gmail.com ABSTRACT Reversible data embedding is a technique that embeds data into an image in a reversible manner. An important aspect of reversible data embedding is to find embedding area in the image and to embed the data into it. In the conventional reversible techniques, the visual quality is not taken into account which resulted in a poor quality of the embedded images. Hence the histogram modification based reversible data hiding technique using multiple causal windows is proposed which predicts the embedding level with the help of the pixel value, edge value, Just Noticeable Difference(JND) value. Using this data embedding level the data is embedded into the pixels. The pixel level adjustment considering the Human Visual System (HVS) characteristics is also made to reduce the distortion caused by data embedding. This significantly improves the data embedding capacity along with greater visual quality. The proposed method includes three phases: (i).Construction of casual window and calculation of edge and JND values in which the casual window determines the pixel values, the edge and the JND values are calculated (ii).Data embedding which is the process of embedding the data into the original image (iii). Data extractor and image recovery where the original image is recovered and the embedded bits are obtained. The experimental results and performance comparison with other reversible data hiding algorithms are presented to demonstrate the validity of the proposed algorithm. The experimental results show that the Performance of the proposed system on an average shows an accuracy of 95%. Keywords Data hiding, human visual system, just noticeable difference, lossless watermarking. 1. INTRODUCTION Data embedding is a method of embedding confidential information into a set of host data, such as a photograph, television signal, or identification card. Data embedding has direct applications in data mining, data indexing and searching, information retrieval, and multimedia data processing. Data embedding on image can be implemented as a steganography technique. STEGANOGRAPHY is the art and science of writing hidden messages on any cover media in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. Reversible data embedding, which is often referred to as lossless or invertible data embedding, is a technique that embeds data into an image in a reversible manner. Extensive
  • 2. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012 42 efforts have been devoted to increase the embedding capacity without degrading the visual quality of the embedded image. A key of reversible data embedding is to find an embedding area in an image with the help of redundancy in the image content. The conventional reversible techniques [1] uses lossless data compression to find an extra area that can contain to-be-embedded data. In order to expand the extra space, the recent algorithms reduce the redundancy by performing pixel value prediction [1] and/or utilizing image histogram [8]. The state-of-the-art techniques [3], [8] exhibit high embedding capacity without severely degrading the visual quality of the embedded result. However the visual quality is not taken into account in the conventional methods the quality of the resultant embedded image is not satisfactory. From all data embedding techniques one common drawback is the fact that the original image is distorted by some small amount of noise due to data embedding itself. The proposed system uses image as the input and a data embedding level is adaptively adjusted for each pixel with a consideration of the human visual system (HVS) characteristics. The conventional histogram modification methods embed a message bit into the histogram of pixel values or the histogram of the pixel differences. A multiple causal window is constructed to determine the pixel value of the given image and the edge value is determined. After the edge detection is performed, the JND value is calculated. Data embedding is the process of embedding the confidential information into the original image. The data can be embedded only in non-edge pixel positions hence the embedding level for the edge and non-edge pixel positions are obtained. After estimating the edge, JND value and the embedding level the message bit b is embedded for each pixel. At the data extractor the same values are obtained and the image is recovered. 2. RELATED WORK C.-C. Chang, Lin, Chen Y.H [1], proposed, a reversible data-embedding scheme to embed secret information in original images. Here, an embedded pixel value is generalised according to a predetermined threshold and the difference between the predicted pixel value and its original pixel value. The results show that the proposed scheme can provide great payload capacity while preserving the quality of the stego-image D.-M. Thodi, Rodrigues J.J [2], proposed, a histogram shifting technique as an alternative to embedding the location map. This technique improves the distortion performance at low embedding capacities and mitigates the capacity control problem. Also a reversible data-embedding technique called prediction-error expansion is proposed here. This new technique better exploits the correlation inherent in the neighbourhood of a pixel than the difference-expansion scheme. Prediction-error expansion and histogram shifting combine to form an effective method for data embedding. The results show that prediction-error expansion doubles the maximum embedding capacity when compared to difference expansion. There is also a significant improvement in the quality of the watermarked image, especially at moderate embedding capacities Y. Hu, H.-K. Lee and J.Li [3], focus on improving the overflow location map. A new embedding scheme that helps us construct an efficient payload-dependent overflow location map is designed here. Such an overflow location map has good compressibility. The accurate capacity control capability also reduces unnecessary alteration to the image. Thus improves the embedding capacity with good image quality. W. Lin, L. Dong, and P. Xue [4], proposed a method to discriminate pixel differences according to their impact toward perceived visual quality. Local contrast changes which are noticeable are formulated since contrast is the basic sensory feature in the human visual system (HVS) perception. Thus the fundamental improvement in sharpened image edges is achieved by taking the visual signal with blurring and luminance fluctuations into account.
  • 3. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012 43 S. Weng, Y.Zhao, J.-S. Pan, and Zhicheng Ni [9], proposed, reversible data hiding scheme which uses zero or minimum points of the histogram of the image and slightly modifies the pixel values to embed data into the image without considering the embedding level resulting with comparatively low distortion of the original image. 3. PROPOSED METHODOLOGY The proposed scheme is based on finding embedding area in the image and to embed the data into it. This embedding area in the image is determined with the help of embedding level of each pixel. Multi causal windows are used here to determine the embedding level. The perceptual characteristic of Human Visual System is considered to improve quality degradation caused by data embedding. The flow diagram of the proposed system is as follows. INPUT ORIGINAL IMAGE Input string as binary bit Output bits OUTPUT ORIGINAL IMAGE Figure 1. Overall process of Reversible Data Embedding 3.1 Construction of Multi Causal Window: Causal window is a part of the original image with specified window size. This causal window is used to determine the pixel values, the edge values, and the JND (Just Noticeable Difference) values. Using these values the embedding level of each pixel is determined and the data is being embedded into the original image. Similarly multiple causal windows are identified in the original image and the embedding level calculation is made so that more data embedding is possible. Causal window to predict pixel values Determine Edge and JND values Determine the embedding level Embed the bit ‘b’ Bit extraction Image recovery EMBEDDED IMAGE
  • 4. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012 44 Algorithm: Step-1: Calculating Pixel value: Let (i, j) denote the pixel coordinate of the original image. Let the original image be ‘x’ and the embedded image be ‘y’. The pixel value for each causal window is predicted. x1(i,j) = 1/ N(Ωi,j) ∑ x(m,n) -(1) (m,n)Ωi,j where Ωi,j denotes a single causal window surrounding x(i, j) N(Ωi,j) denotes the cardinality of the set Ωi,j. The size of the each causal window is specified as S. The average of the pixel values is used as the predicted value. Step-2: Calculating Pixel Difference: The pixel difference is calculated between the original pixel values and the predicted values as follows, d(i,j)=| x(i,j)- x1 (i,j) | -(2) where d(i,j) denotes the pixel difference value for each pixel. This pixel difference value is used in data embedding process. Step-3: Calculating Edge Value: The edge is simply estimated for each pixel as follows: If var(Ωi,j) > Te , E(i,j)= 1 -(3) If var(Ωi,j) <= Te , E(i,j)= 0 -(4) where E(i,j) determines whether the pixel is edge or not. var(Ωi,j) denotes the variance of pixel values in Ωi,j. Te represents the edge threshold value. Step-4: Calculating JND Value: The just noticeable difference value is estimated after the edge detection as follows: jnd(i,j) = Tl(i,j) + µ(Ta(i,j)/ Tl(i,j)) -(5) where µ=0.5, Tl and Ta are the two thresholds representing the luminance adaptation and the activity masking of the Human Visual System characteristics respectively. Tl is calculated by measuring the background luminance with the help of average value of local neighbourhood of a single causal window. A piecewise linear approximation is used with three parameters, a, b, c . If edge (E(i,j) = 1), a=8, b=18, c=22 -(6)
  • 5. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012 45 If non-edge (E(i,j) = 0), a=10, b=20, c=24 -(7) i.e., if the background luminance is <=75 , Tl is calculated as Tl = b-(((b-a)/75)*background luminance) And if the background luminance is >=125 , Tl is calculated as Tl = (((c-a)/130)*background luminance) + ((225/130)*a)-((125/130)*c) Ta is calculated as the maximum pixel difference value in the local neighbourhood of a single causal window. Step-5: Finding Embedding Level: After calculating the edge and JND value, the embedding level of the image is determined. The data embedding is performed by using the difference value and finding the extra space in the image where the data can be embedded. If the embedded value exceeds a pixel value bound (0 to 255 in 8 bit images), overflow and underflow problem occurs. To solve this problem, the original image histogram is shrunk from both sides by 2L , where L is the embedding level. The overhead information describing the pre-processing is losslessly compressed and embedded together with pure payload data to realize reversible data embedding. Compared to Tai et al.’s method of adopting the fixed embedding level, the embedding level here is adaptively adjusted for each pixel according to the local image characteristics. The embedding level Ki,j is calculated as follows: If non-edge (E(i,j)= 0), Ki,j =arg k max 2k , where 2k < jnd(i,j), k ≤ L -(8) That is the maximum possible embedding level is chosen such that the pixel value change should be lower than the JND value because the distortion above the JND in the smooth region is perceptually disturbing. If edge (E(i,j)= 1), Ki,j =arg k min 2k , where 2k > jnd(i,j), k ≤ L -(9) That is the minimum possible embedding level above the JND is used to embed a sufficient amount of data because it is difficult to find the extra space in the image using the embedding level lower than the JND value since the difference values d(i,j) in the edge region are high. The increase of the JND value in the edge region does not reduce the visual quality. Sometimes an intentional increase of the JND in the edge region is employed for enhancement of the image. 3.2 Data Embedding: After the estimation of the embedding level, the data in the form of binary bits are embedded into each pixel. The input data is converted into ASCII values and then converted into its respective binary values. Thus the input data bit ‘b’ is embedded into pixels if d(i,j) < 2Ki,j as follows: If x(i,j) ≥ x1 (i,j) , y(i,j)= x(i,j) + d(i,j) + b -(10)
  • 6. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012 46 If x(i,j) < x1 (i,j) , y(i,j)= x(i,j) - d(i,j) – b -(11) If d(i,j) ≥ 2Ki,j , the bit ‘b’ is not embedded into pixels instead pixel level adjustment is performed as follows: If x(i,j) ≥ x1 (i,j) , y(i,j)= x(i,j) + 2Ki,j -(12) If x(i,j) < x1 (i,j) , y(i,j)= x(i,j) - 2Ki,j -(13) This process continues until all the bits are embedded. The overflow and underflow problem is eliminated by shifting the pixel values by 2L at the pre-processing stage. The same is performed for multiple causal windows to embed more number of bits. The upper and left image boundaries are not modified to satisfy the reversibility. Finally the embedded image ‘y’ is obtained. 3.3 Data Extraction and Image Recovery: 3.3.1 Data Extraction: Data extraction is the process of extracting the embedded data from the embedded image and to obtain the original image. Knowing the embedding level L of the image the data is extracted from the embedded image. Since the causal windows are used to determine edge, JND, and embedding level, the same values can be obtained at the extractor side. If | y(i,j)- x1 (i,j) | < 2Ki,j+1 , the data bit is extracted as follows: If | y(i,j)- x1 (i,j) | is even, then b=0 -(14) If | y(i,j)- x1 (i,j) | is odd, then b=1 -(15) 3.3.2 Pixel Recovery: The original pixel values are recovered by the pixel recovery process as follows: When | y(i,j)- x1 (i,j) | < 2Ki,j+1 , the pixel values are recovered by, If y(i,j) < x1 (i,j) , x(i,j) = y(i,j) + ((ceil(y(i,j) – x1(i,j))/2 -(16) If y(i,j) ≥ x1 (i,j) , x(i,j) = y(i,j) - ((ceil(y(i,j) – x1(i,j))/2 -(17) When | y(i,j)- x1 (i,j) | ≥ 2Ki,j+1 , the pixel values are recovered by, If y(i,j) < x1 (i,j) , x(i,j) = y(i,j) + 2Ki,j -(18) If y(i,j) > x1 (i,j) , x(i,j) = y(i,j) - 2Ki,j -(19) Thus the original pixel values including the overhead information bits at preprocessing are extracted and finally the original image is recovered completely.
  • 7. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012 47 4. EXPERIMENTAL RESULTS The performance of the proposed system is evaluated using MATLAB. The input image is given and the causal window is identified in the input image. The pixel values of the causal window are determined and the average value of the pixel values is calculated. Figure 4.1.Input image showing single causal window The difference values for each pixel are calculated and thereby edge value is calculated using the edge threshold Te (a threshold value which lies between 0 and 1). Figure 4.2.Edge Value The Just Noticeable Difference value is calculated using two thresholds representing the luminance adaptation and the activity masking i.e., Tl and Ta (from Step-4) of the Human Visual System characteristics respectively.
  • 8. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012 48 Figure 4.3.Just Noticeable Difference Value Using the edge and JND value, the embedding level Ki,j (from (8) and (9)) of the image is determined. Figure 4.4.Embedding Level Value The input string which is to be embedded is converted into its respective bits. Figure 4.5.Input String to Binary Conversion Finally the data is being embedded into the pixel values (from (10) and (11)) with respect to the embedding level and pixel level adjustment is also performed (from (12) and (13)).
  • 9. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012 49 Figure 4.6.Data Embedding Image obtained after embedding the data is displayed here. Figure 4.7.Embedded Image Extraction of the original data that is being embedded (from (14) and (15)). Figure 4.8.Bit extraction
  • 10. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012 50 Extracted bit is converted into its respective string. Figure 4.9.Extracted Bit to String Conversion The original pixel values are recovered (from (16), (17), (18) and (19)). Figure 4.10.Original Pixel Recovery The recovered original image. Figure 4.11.Recovered Image
  • 11. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012 51 Table 1. PERFORMANCE ANALYSIS BASED ON PSNR (Peak Signal to Noise Ratio), SSIM (Structural Similarity), EMBEDDING CAPACITY Figure 4.14 Performance of the system based on PSNR, SSIM, EMBEDDING CAPACITY. The above graph shows the performance of the single and multi causal window based on the parameters like PSNR (in dB), SSIM (in %), EMBEDDING CAPACITY (in bit per pixel). 5. CONCLUSION Thus an improved histogram modification based reversible data hiding technique is proposed here. Unlike the conventional reversible techniques, the HVS characteristics are considered to avoid the distortion caused by data embedding process. The edge and JND values are estimated by using the causal windows, and thus no additional overhead is required. By using the estimated values, the embedding level is adaptively adjusted for each pixel. This increases the data embedding capacity and visual quality. The experimental results show that the proposed system produces an accuracy of about 95%. Future work includes the application of the technique to reversible video data embedding, the video related HVS characteristics such as motion blur and motion sharpening can be additionally considered to produce perceptually pleasant video sequences. SYSTEM PSNR (in dB) SSIM (in %) EMBEDDING CAPACITY (in bit per pixel) SINGLE CAUSAL WINDOW 30.06 0.861 0.89 MULTI CAUSAL WINDOW 29.98 0.921 0.96 0.8 0.85 0.9 0.95 SSIM SINGLE CAUSAL WINDOW MULTIPLE CAUSAL WINDOW 29.9 30 30.1 PSNR SINGLE CAUSAL WINDOW MULTIPLE CAUSAL WINDOW 0.8 0.9 1 EMBEDDING CAPACITY SINGLE CAUSAL WINDOW MULTIPLE CAUSAL WINDOW
  • 12. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.3, May 2012 52 REFERENCES [1] C.-C. Chang, Lin, Chen Y.H, “Reversible data embedding scheme using differences between original and predicted pixel values,” IEEE Trans. Information Security ,IET.,vol.2, Issue.2, pp. 35-46, Jun. 2008. [2] D.-M. Thodi, Rodrigues J.J,”Expansion embedding techniques for reversible watermarking” IEEE Trans. Image Processing, vol.16, Issue.3, pp. 721-730, Mar. 2007. [3] Y. Hu, H.-K. Lee, and J. Li, “DE-based reversible data hiding with improved overflow location map,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, pp. 250–260, Feb. 2009. [4] W. Lin, L. Dong, and P. Xue, “Visual distortion gauge based on discrimination of noticeable contrast changes,” IEEE Trans. Circuits Syst.Video Technol., vol. 15, pp. 900–909, Jul. 2005. [5] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, pp. 354–362, Mar. 2006. [6] A. Polesel, G. Ramponi, and V. J. Mathews, “Image enhancement via adaptive unsharp masking,” IEEE Trans. Image Process., vol. 9, no. 3, pp. 505–510, Mar. 2000. [7] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, pp. 890–896, Aug. 2003. [8] W.-L. Tai, C.-M. Yeh, and C.-C. Chang, “Reversible data hiding based on histogram modification of pixel differences,” IEEE Trans. CircuitsSyst. Video Technol., vol. 19, pp. 906–910, Nov. 2009. [9] S. Weng, Y. Zhao, J.-S. Pan, and R. Ni, “Reversible watermarking based on invariability and adjustment on pixel pairs,” IEEE Signal Process. Lett., vol. 15, pp. 721–724, Nov. 2008. [10] CVG-USR Image Database, [Online] http://decsai.ugr.es/cvg/dbimages Authors Mr.R.Vinod is currently pursuing Bachelor of Engineering in Computer Science and Engineering under Anna University, Coimbatore, India. His areas of interest are Image Processing and Multimedia. Mr.S.Pradeep is currently pursuing Bachelor of Engineering in Computer Science and Engineering under Anna University, Coimbatore,India. His areas of interest are Image Processing and Multimedia. Mr.V.Vignesh is currently pursuing Bachelor of Engineering in Computer Science and Engineering under Anna University, Coimbatore, India. His areas of interest are Image Processing and Multimedia. Prof. P.Tamije Selvy received B.Tech (CSE), M.Tech (CSE) in 1996 and 1998 respectively from Pondicherry University. Since 1999, she has been working as faculty in reputed Engineering Colleges. At present, she is working as Assistant Professor (SG) in the department of Computer Science & Engineering, Sri Krishna College of Technology, Coimbatore. She is currently pursuing Ph.D under Anna University, Chennai. Her Research interests include Image Processing, Data Mining, Pattern Recognition and Artificial Intelligence. Ms.P.Anantha Prabha obtained B.E in Electronics and Communication Engineering and Master of Engineering in Computer Science and Engineering from V.L.B. Janakiammal College of Engineering and Technology, Coimbatore, India in 2001 and 2008 respectively. She has been working in various Engineering Colleges for 9 years. She is currently working as an Assistant Professor in Sri Krishna College of Technology, Coimbatore. Her areas of interest are Clouding Computing, Mobile Computing and Image Processing.