Skip to main content

Histogram Shifting as a Data Hiding Technique: An Overview of Recent Developments

  • Conference paper
Digital Information and Communication Technology and Its Applications (DICTAP 2011)

Abstract

Histogram shifting is a data hiding technique which has been proposed since 2004. In this paper, we provide an overview of recent contributions pertaining to the Histogram shifting technique. It discusses on this method and its development in terms of payload capacity and image quality. From these discussions, we can state that which schemes are beneficial in terms of capacity-PSNR control. Overally, Histogram shifting is a valuable technique. Its practical applications are expected to grow in years to come.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cheng, Q., Huang, T.S.: An Additive Approach to Transform-Domain Information Hiding and Optimum Detection Structure. IEEE Transactions on Multimedia 3(3), 273–284 (2001)

    Article  Google Scholar 

  2. Artz, D.: Digital Steganography: Hiding Data Within Data. IEEE Internet Computing 5(3), 75–80 (2001)

    Article  Google Scholar 

  3. Podilchuk, C.I., Delp, E.J.: Digital Watermarking: Algorithms and Applications. IEEE Signal Processing Magazine 18(4), 33–46 (2001)

    Article  Google Scholar 

  4. Wang, R.Z., Lin, C.F., Lin, J.C.: Image Hiding by Optimal LSB Substitution and Genetic Algorithm. Pattern Recognition 34(3), 671–683 (2001)

    Article  MATH  Google Scholar 

  5. Jo, M., Kim, H.D.: A Digital Image Watermarking Scheme Based on Vvector Quantization. IEICE Transactions on Information and Systems 9(3), 1054–1105 (2002)

    Google Scholar 

  6. Chang, C.C., Tai, W.L., Lin, C.C.: A Reversible Data Hiding Scheme Based on Side-Match Vector Quantization. IEEE Transactions on Circuits and Systems for Video Technology 16(10), 1301–1308 (2006)

    Article  Google Scholar 

  7. Celik, M.U., Sharma, G., Tekalp, A.M.: Reversible Data Hiding. In: Proceedings of IEEE International Conference on Image Processing, Rochester, NY, vol. 158, pp. 157–160 (2002)

    Google Scholar 

  8. Tian, J.: Reversible Data Embedding Using a Difference Expansion. IEEE Transactions on Circuits and Systems for Video Technology 13(8), 890–899 (2003)

    Article  Google Scholar 

  9. Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible Data Hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3), 354–361 (2006)

    Article  Google Scholar 

  10. Tai, C.L., Chiang, H.F., Fan, K.C., Chung, C.D.: Reversible Data Hiding and Lossless Reconstruction of Binary Images Using Pair-Wise Logical Computation Mechanism. Pattern Recognition 38(11), 1993–2006 (2005)

    Article  Google Scholar 

  11. Fridrich, J., Goljan, M., Du, R.: Invertible Authentication. In: Proceedings of SPIE Security Watermarking Multimedia Contents, San Jose, CA, pp. 197–208 (January 2001)

    Google Scholar 

  12. Xuan, G., Zhu, J., Chen, J., Shi, Y.Q., Ni, Z., Su, W.: Distortionless Data Hiding Based on Integer Wavelet Transform. Electronics Letters 38(25), 1646–1648 (2002)

    Article  Google Scholar 

  13. Kamstra, L., Heijmans, H.J.A.M.: Reversible Data Embedding into Images Using Wavelet Techniques and Sorting. IEEE Transactions on Image Processing 4(12), 2082–2090 (2005)

    Article  MathSciNet  Google Scholar 

  14. Chang, C.-C., Wu, W.-C.: A Reversible Information Hiding Scheme Based on Vector Quantization. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 1101–1107. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  15. Shi, Y.Q., Ni, Z., Zou, D., Liang, C., Xuan, G.: Lossless Data Hiding: Fundamentals, Algorithms and Applications. In: Proc. IEEE Int. Symp. Circuits Syst., Vancouver, BC, Canada, vol. II, pp. 33–36 (May 2004)

    Google Scholar 

  16. Ni, Z., Shi, Y.-Q., Ansari, N., Su, W.: Reversible Data Hiding. IEEE Transactions on Circuit and Systems for Video Technology 16(3) (March 2006)

    Google Scholar 

  17. Tsai, P., Hu, Y.-C., Yeh, H.-L.: Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting. Signal Processing 89, 1129–1143 (2009)

    Article  MATH  Google Scholar 

  18. Lin, C.-C., Tai, W.-L., Chang, C.-C.: Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images. Pattern Recognition 41, 3582–3591 (2008)

    Article  MATH  Google Scholar 

  19. Lin, C.-C., Hsueh, N.-L.: A Lossless Ddata Hiding Scheme Based on Three-Pixel Block Differences. Pattern Recognition 41, 1415–1425 (2008)

    Article  MATH  Google Scholar 

  20. Kim, K.-S., Lee, M.-J., Lee, H.-Y., Leea, H.-K.: Reversible Data Hiding Exploiting Spatial Correlation Between Sub-sampled Images. Pattern Recognition 42, 3083–3096 (2009)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zandi Mehran, Y., Nafari, M., Nafari, A., Zandi Mehran, N. (2011). Histogram Shifting as a Data Hiding Technique: An Overview of Recent Developments. In: Cherifi, H., Zain, J.M., El-Qawasmeh, E. (eds) Digital Information and Communication Technology and Its Applications. DICTAP 2011. Communications in Computer and Information Science, vol 166. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21984-9_64

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21984-9_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21983-2

  • Online ISBN: 978-3-642-21984-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics