SlideShare a Scribd company logo
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 80 - 82
______________________________________________________________________________________
80
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Reversible Data Hiding Methods : A Survey
Ms. Mili Els Jose
Assistant Professor, Department of Computer science and Engineering
Viswajyothi College of Engg. And Tech.,Vazhakulam
Muvattupuzha ,India
miliej04@yahoo.co.in
Abstract—This paper presents a survey of various reversible data hiding methods. Data hiding is the process of hiding information in a cover
media . Most commonly used media for data hiding is image. But during the hiding and extraction of data there are chances for the distortion of
image. Reversible data hiding methods are used to solve this problem.
Keywords- Reversible Data Hiding, LSB substitution method ,Histogram Modification, Differential Expansion
__________________________________________________*****_________________________________________________
I. INTRODUCTION
Now a day’s security is treated as the most important
factor in the communication system. The two important
methods to give security to our data are cryptography and
data hiding.
Encryption is the process of converting information or
data into a code, especially to prevent unauthorized access.
This process converts plaintext content into unreadable
cipher text. Because of the data is in unreadable format, it
can easily got attention of hackers.
Data hiding is the process of hiding information in a
cover media during storing or transmission. The major
requirement for this is data invisibility. We can use various
Medias such as audio, video, image, text, and picture for
hiding information. Commonly used media for hiding
information is image. The receiver can extract the data from
the cover image. Data hiding can have applications in
military and medical systems. In medical systems data hiding
can be used to hide information about patients in their
medical documents. But there are chances for distortion of
cover images during the hiding and extraction of data. In the
area of military intelligence and medical systems, the
distortion of the cover images is not accepted. To solve this
problem Reversible Data Hiding can be used.
II. REVERSIBLE DATA HIDING
We can say that a data hiding method is reversible when
the cover image is recovered completely after the extraction
of the hidden data
The main requirements of RDH techniques are:
1. Minimize distortion and maximize data embedding
capacity
2. No errors in data and cover image after extraction
Steps of Reversible Data Hiding:
1. DataEmbedding: Hiding data inside the host image.
2. Data Extraction: extracting data from the host image.
Figure 1General Block Diagram of RDH
III. IMPORTANT METHODS OF RDH
A. LSB SUBSTITUTION METHOD:
One of the earliest data-embedding methods is the LSB
substitution method. It is a spatial domain data hiding
technique.In this method, the Least Significant bit of each or
some signal sample is replaced (over written) by a bit of the
data to be hidden. In a RGB image a pixel is represented
using 3 bytes usually representing R, G, and B. For LSB
encoding a bit of the R, G, and B can be used. If additional
capacity is required, two or more LSBs may be used. During
extraction, these bits are read in the same scanning order,
and payload data is reconstructed. LSB modification is a
simple technique with high-embedding capacity and small
embedding distortion.
Advantages [5]:
1. Chances for degradation of the original image are less.
2. More data/information can be stored in an image.
Disadvantages [5]:
1. It is less robust as the hidden data can be lost with
image manipulation.
2. The hidden data can be destroyed easily by simple
attacks
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 80 - 82
______________________________________________________________________________________
81
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
B. LOSSLESS GENERALIZED-LSB DATA EMBEDDING
METHOD:
In [1] a generalization of the LSB-embedding method,
namely G-LSB, is employed used. In the embedding phase,
the lowest levels of the signal samples are replaced (over-
written) by the watermark payload data bit using a
quantization step followed by an addition. During
extraction, the watermark payload data bit is extracted by
simply reading lowest levels of the watermarked signal. G-
LSB embedding enables embedding of noninteger number
of bits in each signal sample
Advantages [1]:
1. High-embedding capacities
2. Complete recovery of the original host signal
3. Introduces only a small distortion between the host
and image bearing the embedded data.
Disadvantage [1]:
1. The capacity of the scheme depends on the
statistics of the host image.
C. DIFFERENTIAL EXPANSION METHOD:
Differential Expansion method is one of the most
popular methods for Reversible Data Hiding. In [3] Tian
introduced a DE technique, which discovers extra storage
space by using the redundancy in the image content. In [2]
Tian present a high capacity RDH method based on DE.
Data Embedding Phase [2]
This method divides the image into pair of pixels. For
each pixel pair the integer average and difference are
calculated. From various difference values changeable and
expandable difference values are identified using reversible
integer transform. Location maps of selected expandable
difference value are created. Selected difference values are
then converted into binary format and original LSB bits of
this difference values are collected. Then difference of each
changeable pixel group is expanded by keeping its average
value unchanged. Data embedding is done into the expanded
difference value by replacement, and finally an inverse
integer transform is applied.
Data Extraction Phase [2]
The data extraction process consists of five steps .First
we calculate the difference values. As in embedding
different pixels of the image and apply integer transform for
each pair. Then two disjoint sets are of difference value CH
and NC are created. CH contains all changeable difference
values and NC contains all non-changeable difference
values .In the third step LSBs of all difference values in CH,
are collected and form a binary bit stream .In the Fourth, the
location map is decoded by a JBIG2 decoder. The fifth step
is content authentication and original content restoration.
We apply the inverse integer transform to reconstruct a
restored image. Then the content is authenticated.
Advantages [2]:
1. This method is a high-capacity, high visual quality
reversible data-embedding method for digital
images.
2. This method can be applied to digital audio and
video.
Disadvantages [2]:
1. There is significant degradation of visual quality
due to bit replacement of grey scale pixels.
D. HISTOGRAM MODIFICATION METHOD:
Another promising strategy for RDH is histogram shift
(HS). In [4] Ni et al. presented a histogram based reversible
data hiding method in which the message is embedded into
the histogram bin. They used maximum and minimum
points to achieve low distortion, but with attendant low
capacity.
Data Embedding phase [4]
Generate histogram of the image. In the histogram find
the maximum point and minimum point. Assume that gray
scale value of maximum point is a and minimum point is b
and also a<b. Scan the image and identify the pixels with
gray scale values between a and b and increment the gray
scale values of that pixels by one i.e shift the histogram to
the right by 1 unit. The whole image is scanned once again
and once a pixel with gray scale value a is encountered
check the next bit in the to be embedded bit stream. If it is
one the gray scale value is incremented by 1.Otherwise
leave it as it is.
Data Extraction phase [4]
Assume that gray scale value of maximum point is a and
minimum point is b and also a<b. Scan the image and if a
pixel with gray scale value a+1 is encountered a bit 1 is
extracted. If a pixel with value a is encountered a bit 0 is
extracted.
Advantages [4]
1. This method can be applied to various types of
images.
2. The algorithm used with this method is simple and
the execution time is short.
Disadvantages [4]
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 80 - 82
______________________________________________________________________________________
82
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
1. Capacity of embedding depends upon the number of
pixels which are associated with the peak point.
IV. CONCLUSION
Now a Days Reversible data hiding methods gets more
popularity in the area of data communication. The
reversibility of the carrier medium at the receiver side, after
the extraction of the secret data makes it more attractive. In
this paper different methods for reversible data hiding are
presented with advantages and disadvantages. All these
methods aim to reproducing image and secret data with
maximum accuracy.
REFERENCES
[1] Ahmet Murat Tekal,Eli Saber, Mehmet Utku Celik ,
Gaurav Sharma,”Lossless Generalized-LSB Data
Embedding”, IEEE Transactions On Image Processing,
Vol. 14, No. 2, February 2005
[2] J. Tian, “Reversible data embedding using a difference
expansion,” IEEE Trans. Circuits Syst. Video Technol.,
vol. 13, no. 8, pp. 890–896, 2003.
[3] J. Tian, “Reversible watermarking by difference
expansion,” in Proc.Workshop on Multimedia and
Security, J. Dittmann, J. Fridrich, and P.Wohlmacher,
Eds., Dec. 2002, pp. 19–22.
[4] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data
hiding,” IEEE Trans. Circuits Syst.Video Technol., vol.
16, no. 3, pp. 354–362,Mar. 2006.
[5] Mehdi Hussain and Mureed Hussain “ A Survey of
Image Steganography Techniques” International Journal
of Advanced Science and Technology Vol. 54,May,
2013, pp-113-124
[6] M. Awrangjeb and M. S. Kankanhalli, “Lossless
watermarking consideringthe human visual system,”
Lecture Notes in Computer Science, vol. 2939, pp. 581–
592, 2004.
[7] Goel, Arun Rana, and Stuti Manpreet Kaur. "A Review
of ComparisonTechniques of Image Steganography. "
Global Journal of Computer Science and Technology
13.4 (2013) .
[8] Morkel, Tayana, Jan HP Eloff, and Martin S. Olivier.
"An overview ofimage steganography." ISSA. 2005.

More Related Content

PDF
IRJET- A Review on Plant Disease Detection using Image Processing
PDF
Detection of crossover &amp; bifurcation points on a retinal fundus image by ...
PDF
Detection of crossover & bifurcation points on a retinal fundus image by anal...
PDF
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
PDF
Extraction of texture features by using gabor filter in wheat crop disease de...
PDF
GEOMETRIC CORRECTION FOR BRAILLE DOCUMENT IMAGES
PDF
Design and Implementation of Visual Cryptography System for Transmission of S...
PDF
Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
IRJET- A Review on Plant Disease Detection using Image Processing
Detection of crossover &amp; bifurcation points on a retinal fundus image by ...
Detection of crossover & bifurcation points on a retinal fundus image by anal...
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
Extraction of texture features by using gabor filter in wheat crop disease de...
GEOMETRIC CORRECTION FOR BRAILLE DOCUMENT IMAGES
Design and Implementation of Visual Cryptography System for Transmission of S...
Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion

What's hot (16)

PDF
40120130406009
PDF
OBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUE
PDF
External data preprocessing for efficient sorting
PDF
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
PDF
Frequency Domain Approach of Image Steganography
PDF
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
PDF
Authenticate Aadhar Card Picture with Current Image using Content Based Image...
PDF
Computer Assisted and Contour Detectioin in Medical Imaging Using Fuzzy Logic
PDF
Importance of Dimensionality Reduction in Image Processing
PDF
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
PDF
B0343011014
PDF
Variance rover system
PDF
Variance rover system web analytics tool using data
PDF
40120140504011
PDF
Image type water meter character recognition based on embedded dsp
PDF
Enhancement and Segmentation of Historical Records
40120130406009
OBJECT DETECTION, EXTRACTION AND CLASSIFICATION USING IMAGE PROCESSING TECHNIQUE
External data preprocessing for efficient sorting
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
Frequency Domain Approach of Image Steganography
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
Authenticate Aadhar Card Picture with Current Image using Content Based Image...
Computer Assisted and Contour Detectioin in Medical Imaging Using Fuzzy Logic
Importance of Dimensionality Reduction in Image Processing
SCAF – AN EFFECTIVE APPROACH TO CLASSIFY SUBSPACE CLUSTERING ALGORITHMS
B0343011014
Variance rover system
Variance rover system web analytics tool using data
40120140504011
Image type water meter character recognition based on embedded dsp
Enhancement and Segmentation of Historical Records
Ad

Similar to Reversible Data Hiding Methods : A Survey (20)

PDF
Analysis and Comparison of various Methods for Text Detection from Images usi...
PDF
Framework on Retrieval of Hypermedia Data using Data mining Technique
PDF
An enhanced difference pair mapping steganography method to improve embedding...
PDF
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
PDF
Authentic Patient Data and Optimization Process through Cryptographic Image o...
PDF
Authentic Patient Data and Optimization Process through Cryptographic Image o...
PDF
Object Detection using Deep Learning with Hierarchical Multi Swarm Optimization
PDF
IRJET- Crowd Density Estimation using Image Processing
PDF
Blending of Images Using Discrete Wavelet Transform
PDF
Automatic Attendance Using Face Recognition
PDF
Dft based individual extraction of steganographic compression of images
PDF
Dft based individual extraction of steganographic compression of images
PDF
IRJET- Encryption and Authentication of Image by using Data Hiding
PDF
A comparative case study on the various techniques of reversible data hiding
PDF
Ijetcas14 527
PDF
A comparison of image segmentation techniques, otsu and watershed for x ray i...
PDF
A secured data transmission system by reversible data hiding with scalable co...
PDF
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
PDF
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
PDF
Hybrid DCT-DWT Digital Image Steganography
Analysis and Comparison of various Methods for Text Detection from Images usi...
Framework on Retrieval of Hypermedia Data using Data mining Technique
An enhanced difference pair mapping steganography method to improve embedding...
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...
Object Detection using Deep Learning with Hierarchical Multi Swarm Optimization
IRJET- Crowd Density Estimation using Image Processing
Blending of Images Using Discrete Wavelet Transform
Automatic Attendance Using Face Recognition
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
IRJET- Encryption and Authentication of Image by using Data Hiding
A comparative case study on the various techniques of reversible data hiding
Ijetcas14 527
A comparison of image segmentation techniques, otsu and watershed for x ray i...
A secured data transmission system by reversible data hiding with scalable co...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...
Hybrid DCT-DWT Digital Image Steganography
Ad

More from rahulmonikasharma (20)

PDF
Data Mining Concepts - A survey paper
PDF
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
PDF
Considering Two Sides of One Review Using Stanford NLP Framework
PDF
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
PDF
Broadcasting Scenario under Different Protocols in MANET: A Survey
PDF
Sybil Attack Analysis and Detection Techniques in MANET
PDF
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
PDF
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
PDF
Quality Determination and Grading of Tomatoes using Raspberry Pi
PDF
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
PDF
DC Conductivity Study of Cadmium Sulfide Nanoparticles
PDF
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
PDF
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
PDF
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
PDF
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
PDF
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
PDF
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
PDF
Short Term Load Forecasting Using ARIMA Technique
PDF
Impact of Coupling Coefficient on Coupled Line Coupler
PDF
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Data Mining Concepts - A survey paper
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
Considering Two Sides of One Review Using Stanford NLP Framework
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
Broadcasting Scenario under Different Protocols in MANET: A Survey
Sybil Attack Analysis and Detection Techniques in MANET
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Quality Determination and Grading of Tomatoes using Raspberry Pi
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
DC Conductivity Study of Cadmium Sulfide Nanoparticles
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Short Term Load Forecasting Using ARIMA Technique
Impact of Coupling Coefficient on Coupled Line Coupler
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor

Recently uploaded (20)

PPTX
Lecture Notes Electrical Wiring System Components
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Well-logging-methods_new................
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Construction Project Organization Group 2.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
additive manufacturing of ss316l using mig welding
PDF
composite construction of structures.pdf
Lecture Notes Electrical Wiring System Components
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Internet of Things (IOT) - A guide to understanding
Well-logging-methods_new................
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
UNIT 4 Total Quality Management .pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Construction Project Organization Group 2.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
additive manufacturing of ss316l using mig welding
composite construction of structures.pdf

Reversible Data Hiding Methods : A Survey

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 12 80 - 82 ______________________________________________________________________________________ 80 IJRITCC | December 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Reversible Data Hiding Methods : A Survey Ms. Mili Els Jose Assistant Professor, Department of Computer science and Engineering Viswajyothi College of Engg. And Tech.,Vazhakulam Muvattupuzha ,India miliej04@yahoo.co.in Abstract—This paper presents a survey of various reversible data hiding methods. Data hiding is the process of hiding information in a cover media . Most commonly used media for data hiding is image. But during the hiding and extraction of data there are chances for the distortion of image. Reversible data hiding methods are used to solve this problem. Keywords- Reversible Data Hiding, LSB substitution method ,Histogram Modification, Differential Expansion __________________________________________________*****_________________________________________________ I. INTRODUCTION Now a day’s security is treated as the most important factor in the communication system. The two important methods to give security to our data are cryptography and data hiding. Encryption is the process of converting information or data into a code, especially to prevent unauthorized access. This process converts plaintext content into unreadable cipher text. Because of the data is in unreadable format, it can easily got attention of hackers. Data hiding is the process of hiding information in a cover media during storing or transmission. The major requirement for this is data invisibility. We can use various Medias such as audio, video, image, text, and picture for hiding information. Commonly used media for hiding information is image. The receiver can extract the data from the cover image. Data hiding can have applications in military and medical systems. In medical systems data hiding can be used to hide information about patients in their medical documents. But there are chances for distortion of cover images during the hiding and extraction of data. In the area of military intelligence and medical systems, the distortion of the cover images is not accepted. To solve this problem Reversible Data Hiding can be used. II. REVERSIBLE DATA HIDING We can say that a data hiding method is reversible when the cover image is recovered completely after the extraction of the hidden data The main requirements of RDH techniques are: 1. Minimize distortion and maximize data embedding capacity 2. No errors in data and cover image after extraction Steps of Reversible Data Hiding: 1. DataEmbedding: Hiding data inside the host image. 2. Data Extraction: extracting data from the host image. Figure 1General Block Diagram of RDH III. IMPORTANT METHODS OF RDH A. LSB SUBSTITUTION METHOD: One of the earliest data-embedding methods is the LSB substitution method. It is a spatial domain data hiding technique.In this method, the Least Significant bit of each or some signal sample is replaced (over written) by a bit of the data to be hidden. In a RGB image a pixel is represented using 3 bytes usually representing R, G, and B. For LSB encoding a bit of the R, G, and B can be used. If additional capacity is required, two or more LSBs may be used. During extraction, these bits are read in the same scanning order, and payload data is reconstructed. LSB modification is a simple technique with high-embedding capacity and small embedding distortion. Advantages [5]: 1. Chances for degradation of the original image are less. 2. More data/information can be stored in an image. Disadvantages [5]: 1. It is less robust as the hidden data can be lost with image manipulation. 2. The hidden data can be destroyed easily by simple attacks
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 12 80 - 82 ______________________________________________________________________________________ 81 IJRITCC | December 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ B. LOSSLESS GENERALIZED-LSB DATA EMBEDDING METHOD: In [1] a generalization of the LSB-embedding method, namely G-LSB, is employed used. In the embedding phase, the lowest levels of the signal samples are replaced (over- written) by the watermark payload data bit using a quantization step followed by an addition. During extraction, the watermark payload data bit is extracted by simply reading lowest levels of the watermarked signal. G- LSB embedding enables embedding of noninteger number of bits in each signal sample Advantages [1]: 1. High-embedding capacities 2. Complete recovery of the original host signal 3. Introduces only a small distortion between the host and image bearing the embedded data. Disadvantage [1]: 1. The capacity of the scheme depends on the statistics of the host image. C. DIFFERENTIAL EXPANSION METHOD: Differential Expansion method is one of the most popular methods for Reversible Data Hiding. In [3] Tian introduced a DE technique, which discovers extra storage space by using the redundancy in the image content. In [2] Tian present a high capacity RDH method based on DE. Data Embedding Phase [2] This method divides the image into pair of pixels. For each pixel pair the integer average and difference are calculated. From various difference values changeable and expandable difference values are identified using reversible integer transform. Location maps of selected expandable difference value are created. Selected difference values are then converted into binary format and original LSB bits of this difference values are collected. Then difference of each changeable pixel group is expanded by keeping its average value unchanged. Data embedding is done into the expanded difference value by replacement, and finally an inverse integer transform is applied. Data Extraction Phase [2] The data extraction process consists of five steps .First we calculate the difference values. As in embedding different pixels of the image and apply integer transform for each pair. Then two disjoint sets are of difference value CH and NC are created. CH contains all changeable difference values and NC contains all non-changeable difference values .In the third step LSBs of all difference values in CH, are collected and form a binary bit stream .In the Fourth, the location map is decoded by a JBIG2 decoder. The fifth step is content authentication and original content restoration. We apply the inverse integer transform to reconstruct a restored image. Then the content is authenticated. Advantages [2]: 1. This method is a high-capacity, high visual quality reversible data-embedding method for digital images. 2. This method can be applied to digital audio and video. Disadvantages [2]: 1. There is significant degradation of visual quality due to bit replacement of grey scale pixels. D. HISTOGRAM MODIFICATION METHOD: Another promising strategy for RDH is histogram shift (HS). In [4] Ni et al. presented a histogram based reversible data hiding method in which the message is embedded into the histogram bin. They used maximum and minimum points to achieve low distortion, but with attendant low capacity. Data Embedding phase [4] Generate histogram of the image. In the histogram find the maximum point and minimum point. Assume that gray scale value of maximum point is a and minimum point is b and also a<b. Scan the image and identify the pixels with gray scale values between a and b and increment the gray scale values of that pixels by one i.e shift the histogram to the right by 1 unit. The whole image is scanned once again and once a pixel with gray scale value a is encountered check the next bit in the to be embedded bit stream. If it is one the gray scale value is incremented by 1.Otherwise leave it as it is. Data Extraction phase [4] Assume that gray scale value of maximum point is a and minimum point is b and also a<b. Scan the image and if a pixel with gray scale value a+1 is encountered a bit 1 is extracted. If a pixel with value a is encountered a bit 0 is extracted. Advantages [4] 1. This method can be applied to various types of images. 2. The algorithm used with this method is simple and the execution time is short. Disadvantages [4]
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 12 80 - 82 ______________________________________________________________________________________ 82 IJRITCC | December 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ 1. Capacity of embedding depends upon the number of pixels which are associated with the peak point. IV. CONCLUSION Now a Days Reversible data hiding methods gets more popularity in the area of data communication. The reversibility of the carrier medium at the receiver side, after the extraction of the secret data makes it more attractive. In this paper different methods for reversible data hiding are presented with advantages and disadvantages. All these methods aim to reproducing image and secret data with maximum accuracy. REFERENCES [1] Ahmet Murat Tekal,Eli Saber, Mehmet Utku Celik , Gaurav Sharma,”Lossless Generalized-LSB Data Embedding”, IEEE Transactions On Image Processing, Vol. 14, No. 2, February 2005 [2] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, 2003. [3] J. Tian, “Reversible watermarking by difference expansion,” in Proc.Workshop on Multimedia and Security, J. Dittmann, J. Fridrich, and P.Wohlmacher, Eds., Dec. 2002, pp. 19–22. [4] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst.Video Technol., vol. 16, no. 3, pp. 354–362,Mar. 2006. [5] Mehdi Hussain and Mureed Hussain “ A Survey of Image Steganography Techniques” International Journal of Advanced Science and Technology Vol. 54,May, 2013, pp-113-124 [6] M. Awrangjeb and M. S. Kankanhalli, “Lossless watermarking consideringthe human visual system,” Lecture Notes in Computer Science, vol. 2939, pp. 581– 592, 2004. [7] Goel, Arun Rana, and Stuti Manpreet Kaur. "A Review of ComparisonTechniques of Image Steganography. " Global Journal of Computer Science and Technology 13.4 (2013) . [8] Morkel, Tayana, Jan HP Eloff, and Martin S. Olivier. "An overview ofimage steganography." ISSA. 2005.