Advertisement

Advertisement

Reversible data hiding: A contemporary survey of state-of-the-art, opportunities and challenges

  • Published: 28 September 2021
  • Volume 52 , pages 7373–7406, ( 2022 )

Cite this article

research paper on data hiding

  • Sanjay Kumar 1 ,
  • Anjana Gupta 1 &
  • Gurjit Singh Walia 2  

1943 Accesses

19 Citations

Explore all metrics

The goal of this survey is to review the state-of-the art Reversible Data Hiding (RDH) methods, classify these methods into different classes, and list out new trends in this field. RDH, in general, is a challenging problem and has potential applications in the today’s digital world. Reversible data hiding methods not only securely transfer secret data but also recover the cover media faithfully. Recently, RDH methods are mainly focused on obtaining high capacity along with tuneable quality. Although, extensive investigations in the field of reversible data hiding was carried out in the recent past, a comprehensive review of existing literature for listing out research gap and future directions has not yet been reported. In this survey, we have classified the reversible data hiding methods mainly into a) Plain domain b) Encrypted domain and also examine their pro and cons. Tabular comparison of various RDH methods has been provided considering various design and analysis aspects. Moreover, we discuss important issues related to reversible data hiding and use of benchmarked datasets along with performance metrics for evaluation of RDH methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime

Price excludes VAT (USA) Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

research paper on data hiding

Similar content being viewed by others

research paper on data hiding

A Review: Reversible Information Hiding and Bio-Inspired Optimization

research paper on data hiding

A Detailed Review on Reversible Data Hiding and Its Applications

research paper on data hiding

A Comprehensive Study of Reversible Data Hiding (RDH) Schemes Based on Pixel Value Ordering (PVO)

Explore related subjects.

  • Artificial Intelligence

Barton JM (1997) Method and apparatus for embedding authentication information within digital data. U.S. Patent, 5,646,997

Honsinger CW, Jones P, Rabbani M, Stffel JC (2001) Lossless recovery of an original image containing embedded data. U.S. Patent,6,278,79

Fridrich J, Goljan M, Du R (2001) Invertible authentication. Proc SPIE Security and Watermarking of Multimedia Contents 4314:197–208

Article   Google Scholar  

Goljan M, Fridrich JJ, Du R (2001) Invertible authentication. Proceedings 4 t h Inf Hiding Workshop 4314:197–208

Google Scholar  

Fridrich J, Goljan M, Du R (2002) Lossless data Embedding-New paradigm in digital watermarking. EURASIP J Adv Signal Process 2:185–196

MATH   Google Scholar  

Xuan G, Zhu J, Chen J, Shi YQ, Ni Z, Su W (2002) Distortionless data hiding based on integer wavelet transform. IEEE J Electron lett 38:1646–1648

Kalker T, Willems FMJ (2002) Capacity bounds and constructions for reversible data-hiding. In: 14 t h International Conference on Digital Signal Processing Proceedings. DSP 2002 (Cat No.02TH8628), vol 1, pp 71–76

Celik MU, Sharma G, Tekalp AM, Saber E (2002) Reversible data hiding. Proceedings. International Conference on Image Processing 2:157–160

Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing 14:253–266. https://doi.org/10.1109/TIP.2004.840686

Chen LST, Lin SJ, Lin JC (2010) Reversible JPEG-based hiding method with high high hiding-ratio. Int J Pattern Recognit Artif Intell 24:433–456. https://doi.org/10.1142/S0218001410007968

He J, Pan X, Wu HT, Tang S (2020) Improving block ordering and frequency selection for reversible data hiding in JPEG images. Signal Process 107647:175. https://doi.org/10.1016/j.sigpro.2020.107647

Zhang W, Chen B, Yu N (2011) Capacity-approaching codes for reversible data hiding. Lecture Notes in Computer Science, Springer 6958:255–269. https://doi.org/10.1007/978-3-642-24178-9_18

Lin S, Chung W (2012) The scalar scheme for reversible Information-Embedding in Gray-Scale signals: capacity evaluation and code constructions. IEEE Transactions on Information Forensics and Security 7(4):1155–1167. https://doi.org/10.1109/TIFS.2012.2197614

Bao F, Deng RH, Ooi BC, Yang Y (2005) Tailored reversible watermarking schemes for authentication of electronic clinical atlas. IEEE Trans Inf Technol Biomed 9 (4):554–563. https://doi.org/10.1109/TITB.2005.855556

Coatrieux G, Guillou CL, Cauvin J, Roux C (2009) Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans Inf Technol Biomed 13(2):158–165. https://doi.org/10.1109/TITB.2008.2007199

Chung K, Huang Y, Chang P, Liao HM (2010) Reversible data hiding-based approach for intra-frame error concealment in h.264/AVC. IEEE Trans Circ Syst Vid Technol 20(11):1643–1647. https://doi.org/10.1109/TCSVT.2010.2077577

Wang X, Shao C, Xu X, Niu X (2007) Reversible Data-Hiding scheme for 2-D vector maps based on difference expansion. IEEE Transactions on Information Forensics and Security 2(3):311–320. https://doi.org/10.1109/TIFS.2007.902677

Luo l., Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Transactions on Information Forensics and Security 5(1):187–193. https://doi.org/10.1109/TIFS.2009.2035975

Malik A, Sikka G, Verma HK (2018) An AMBTC compression based data hiding scheme using pixel value adjusting strategy. Multidim System Signal Process 29:1801–1818. https://doi.org/10.1007/s11045-017-0530-8

Article   MATH   Google Scholar  

Lin J, Weng S, Zhang T, Ou B, Chang C (2020) Two-Layer Reversible Data Hiding Based on AMBTC Image With (7, 4) Hamming Code. IEEE Access 8:21534–21548. https://doi.org/10.1109/ACCESS.2019.2962230

Tian J (2002) Wavelet-based reversible watermarking for authentication. Proceedding SPIE 4675:679–690. https://doi.org/10.1117/12.465329

Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Vid Technol 13(8):890–896. https://doi.org/10.1109/TCSVT.2003.815962

Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156. https://doi.org/10.1109/TIP.2004.828418

Article   MathSciNet   Google Scholar  

Kamstra L, Heijmans HJAM (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082–2090. https://doi.org/10.1109/TIP.2005.859373

Lee S, Yoo CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Transactions on Information Forensics and Security 2(3):321–330. https://doi.org/10.1109/TIFS.2007.905146

Hu Y, Lee H, Chen K, Li J (2008) Difference expansion based reversible data hiding using two embedding directions. IEEE Transactions on Multimedia 10(8):1500–1512. https://doi.org/10.1109/TMM.2008.2007341

Quershi OMA, Khoo BE (2013) Two dimensional difference expansin (2d-DE) scheme with a characteristics based threshold. Signal Process 93:154–162. https://doi.org/10.1016/j.sigpro.2012.07.012

Chen CC, Tsai YH, Yeh HC (2017) Difference expansion based reversible and visible image watermarking scheme. Multimedia Tools and Applications 76 (8497–8516):1500–1512. https://doi.org/10.1007/s11042-016-3452-9

Arham A, Nugroha HA, Adji TB (2017) Multiple layer data hiding scheme based on difference expansion of Quad. Signal Process 137:52–62. https://doi.org/10.1016/j.sigpro.2017.02.001

Thodi DM, Rodriguez JJ (2004) Prediction-error based reversible watermarking. International Conference on Image Processing, 2004 ICIP ’04 3:1549–1552. https://doi.org/10.1109/ICIP.2004.1421361

Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730. https://doi.org/10.1109/TIP.2006.891046

Hu Y, Lee H, Li J (2009) DE-based reversible data hiding with improved overflow location map. IEEE Trans Circ Syst Vid Technol 19(2):250–260. https://doi.org/10.1109/TCSVT.2008.2009252

Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circ Syst Vid Technol 19(7):989–999. https://doi.org/10.1109/TCSVT.2009.2020257

Coltuc D (2011) Improved embedding for Prediction-Based reversible watermarking. IEEE Transactions on Information Forensics and Security 6(3):873–882. https://doi.org/10.1109/TIFS.2011.2145372

Li X, Yang B, Zeng T (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20(12):3524–3533. https://doi.org/10.1109/TIP.2011.2150233

Article   MathSciNet   MATH   Google Scholar  

Coltuc D (2012) Low distortion transform for reversible watermarking. IEEE Trans Image Process 21(1):412–417. https://doi.org/10.1109/TIP.2011.2162424

Yang S (2020) Saliency-Based Image contrast enhancement with reversible data hiding. In: IEEE international conference on acoustics, Speech and Signal Processing (ICASSP), pp 2847–2851. https://doi.org/10.1109/ICASSP40776.2020.9053103

Li X, Li J, Yang B (2013) High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process 93(1):198–205. https://doi.org/10.1016/j.sigpro.2012.07.025

Peng F (2013) Improved IVO-based reversible data hiding. Digital Signal Process 25:255–265

Ou B, Li X, Zhao Y, Ni R, Shi N (2013) Pairwise Prediction-Error expansion for efficient reversible data hiding. IEEE Trans Image Process 22(12):5010–5021. https://doi.org/10.1109/TIP.2013.2281422

Ou B, Li X, Zhao Y, Ni R (2014) Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion. Signal Process 29(7):760–772. https://doi.org/10.1016/j.image.2014.05.003

Kumar M, Agarwal S (2016) Reversible data hiding based on prediction error expansion using adjacent pixels. Secur Commun Netw 9(16):574–578. https://doi.org/10.1002/sec.1575

Jain NK, Kasana S (2018) High capacity reversible data hiding using modified pixel value ordering approach. J Circ Syst Comput 27(11):1850175. https://doi.org/10.1142/S021812661850175X

Zhang H, Wang C, Wang J, Xiang S (2019) A new reversible watermarking scheme using the content-adaptive block size for prediction. Signal Process 164:74–83. https://doi.org/10.1016/j.sigpro.2019.05.035

Abbasi R, Qureshi NMF., Hassan H (2019) Generalized PVO-based dynamic block reversible data hiding for secure transmission using firefly algorithm. Transaction on Emerging Telecommunications Technologies. https://doi.org/10.1002/ett.3680

Uyyala R, Pal R (2020) Reversible data hiding using improved gradient based prediction and adaptive histogram bin shifting. In: 7th International Conference on Signal Processing and Integrated Networks (SPIN), pp 720–726. https://doi.org/10.1109/SPIN48934.2020.9071246

Wu H (2020) Patch-Level Selection and Breadth-First prediction strategy for reversible data hiding. In: 2020 IEEE international conference on acoustics, Speech and Signal Processing (ICASSP). https://doi.org/10.1109/ICASSP40776.2020.9054386

Kumar R, Jung KH (2020) Robust reversible data hiding scheme based on two-layer embedding strategy. Inf Sci 512:96–107. https://doi.org/10.1016/j.ins.2019.09.062

Li N, Huang F (2020) Reversible data hiding for JPEG images based on pairwise nonzero AC coefficient expansion. Signal Process 107476:171. https://doi.org/10.1016/j.sigpro.2020.107476

Ni N, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Vid Technol 16(3):354–362. https://doi.org/10.1109/TCSVT.2006.869964

Vleeschouwer CD, Delaigle JE, Macq B (2001) Circular interpretation of histogram for reversible watermarking. 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp 345–350. https://doi.org/10.1109/MMSP.2001.962758

Fallahpour M, Sedaaghi MH (2007) High capacity lossless data hiding based on histogram modification. IEICE Electronics Express 4(7):205–210. https://doi.org/10.1587/elex.4.205

Lee S, Suh Y, Ho Y (2006) Reversible image authentication based on watermarking. In: 2006 IEEE International Conference on Multimedia and Expo, pp 1321–1324. https://doi.org/10.1109/ICME.2006.262782

Lin CC, Tai WL, Chang CC (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41(12):3582–3591. https://doi.org/10.1016/j.patcog.2008.05.015

Tai W, Yeh C, Chang C (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circ Syst Vid Technol 19(6):906–910. https://doi.org/10.1109/TCSVT.2009.2017409

Gao X, An L, Yuan Y, Tao D, Li X (2011) Lossless data embedding using generalized statistical quantity histogram. IEEE Trans Circ Syst Vid Technol 21(8):1061–1070. https://doi.org/10.1109/TCSVT.2011.2130410

Li X, Li B, Yang B, Zeng T (2013) General framework to Histogram-Shifting-Based reversible data hiding. IEEE Trans Image Process 22(6):2181–2191. https://doi.org/10.1109/TIP.2013.2246179

Fujiyoshi M, Sato S, Jin HL, Kiya H (2007) A location-map free reversible data hiding method using block-based single parameter. 2007 IEEE International Conference on Image Processing 3:257–260. https://doi.org/10.1109/ICIP.2007.4379295

Fujiyoshi M, Tsuneyoshi T, Kiya H (2010) A parameter memorization-free lossless data hiding method with flexible payload size. IEICE Electronics Express 7(23):1702–1708. https://doi.org/10.1587/elex.7.1702

Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on Two-Dimensional Difference-Histogram modification. IEEE Transactions on Information Forensics and Security 8(7):1091–1100. https://doi.org/10.1109/TIFS.2013.2261062

Li X, Zhang W, Gui X, Yang B (2015) Efficient reversible data hiding based on multiple histograms modification. IEEE Transactions on Information Forensics and Security 10(9):2016–2027. https://doi.org/10.1109/TIFS.2015.2444354

Garg P, Kasana SS, Kasana G (2017) Block-based reversible data hiding using histogram shifting and modulus operator for digital images. J Circ Syst Comput 26(6):1750103–1750120. https://doi.org/10.1142/S0218126617501031

Qi W, Li X, Zhang T, Guo Z (2019) Optimal reversible data hiding scheme based on multiple histograms modification. IEEE Trans Circ Syst Vid Technol 30(8):2300–2312. https://doi.org/10.1109/TCSVT.2019.2942489

Ou B, Zhao Y (2019) High capacity reversible data hiding based on multiple histograms modification. IEEE Trans Circ Syst Vid Technol 30(8):2329–2342. https://doi.org/10.1109/TCSVT.2019.2921812

He X, Zhang W, Zhang H, Ma L, Li Y (2019) Reversible data hiding for high dynamic range images using edge information. Multimedia Tools Applied 78:29137–29160. https://doi.org/10.1007/s11042-018-6589-x

Jia Y, Yina Z, Zhang X, Luo Y (2019) Reversible data hiding based on reducing invalid shifting of pixels in histogram shiftin. Signal Process 163:238–246. https://doi.org/10.1016/j.sigpro.2019.05.020

Gao X, Pan Z, Gao E, Fan G (2020) Reversible data hiding for high dynamic range images using two-dimensional prediction-error histogram of the second time prediction. Signal Process 173:107579. https://doi.org/10.1016/j.sigpro.2020.107579

Shaji C, Sam S (2019) A new data encoding based on maximum to minimum histogram in reversible data hiding. The Imaging Journal 67(4):202–214. https://doi.org/10.1080/13682199.2019.1592892

Wang J, Chen X, Ni J, Mao N, Shi Y (2019) Multiple histograms based reversible data hiding: framework and realization. IEEE Trans Circ Syst Vid Technol 30(8):2313–2328. https://doi.org/10.1109/TCSVT.2019.2915584

Manikandan VM, Renjith P (2020) An efficient overflow handling technique for histogram shifting based reversible data hiding. In: 2020 International Conference on Innovative Trends in Information Technology (ICITIIT), pp 1–6. https://doi.org/10.1109/ICITIIT49094.2020.9071553

He J, Chen J, Tang S (2020) Reversible data hiding in JPEG images based on negative influence models. IEEE Transactions on Information Forensics and Security 15:2121–2133. https://doi.org/10.1109/TIFS.2019.2958758

Wang W, Wang W (2020) HS-Based reversible data hiding scheme using median prediction error. Multimedia Tools and Applications 79:18143–18165. https://doi.org/10.1007/s11042-020-08682-3

Jung KH, Yoo KY (2009) Data hiding method using image interpolation. Computer Satandards and Interfaces 31(2):465–470. https://doi.org/10.1016/j.csi.2008.06.001

Yalman Y, Akar F, Erturk I (2010) An image interpolation based reversible data hiding method using r-weighted coding. In: 2010 13 t h IEEE International Conference on Computational Science and Engineering, pp 346–350. https://doi.org/10.1109/CSE.2010.52

Lee CF, Huang YL (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl 39(8):6712–6719. https://doi.org/10.1016/j.eswa.2011.12.019

Tsai YY, Chen JT, Kuo YC, Chan CS (2014) A generalized image interpolation -based reversible data hiding scheme with high embedding capacity and image quality. KSSI Trans Internet Inform Syst 8 (9):3286–3301. https://doi.org/10-3837/tiis.2014.09.019

Chang YT, Huang CT, Lee CF, Wang SJ (2013) Image interpolating based data hiding in conjunction with pixel-shifting of histogram. J Supercomput 66:1093–1110. https://doi.org/10.1007/s11227-013-1016-6

Loua DC, Choub CL, Weia HY, Huang HF (2013) Active steganalysis for interpolation-error based reversible data hiding. Pattern Recogn Lett 34 (9):1032–1036. https://doi.org/10.1016/j.patrec.2013.01.023

Wang XT, Chang CC, Nguyen TS (2013) Reversible data hiding for high quality images exploiting interpolation and direction order mechnism. Digital Signal Process 23 (2):569–577. https://doi.org/10.1016/j.dsp.2012.06.015

Hu J, Li T (2015) Reversible steganography using extended image interpolation. Comput Electr Eng 46:447–455. https://doi.org/10.1016/j.compeleceng.2015.04.014

Wahed MA, Nyeem H (2017) Efficient LSB substitution for interpolation based reversible data hiding scheme. In: 2017 20 t h International Conference of Computer and Information Technology (ICCIT), pp 1–6. https://doi.org/10.1109/ICCITECHN.2017.8281771

Malik A, Sikka G, Verma HK (2017) An image interpolation based reversible data hiding scheme using pixel value adjusting feature. Multimedia Tools Applied 76:13025–13046. https://doi.org/10.1007/s11042-016-3707-5

Zhang X, Sun Z, Tang Z, Yu C, Wang X (2017) High capacity data hiding based on interpolated image. Multimedia Tools Applications 76:9195–9218. https://doi.org/10.1007/s11042-016-3521-0

Shaik A (2018) High capacity data hiding using 2D parabolic interpolation. Multimedia Tools and Applications 78:9717–9735. https://doi.org/10.1007/s11042-018-6544-x

Khosravi MR, Yazdi M (2018) A lossless data hiding scheme for medical images using a hybrid solution based on IBRW error histogram computation and quartered interpolation with greedy weights. Neural Computing and applications 30:2017–2028. https://doi.org/10.1007/s00521-018-3489-y

Jana M, Jana B (2020) An improved data hiding scheme through image interpolation. Comput Intell Pattern Recognition 999:157–169. https://doi.org/10.1007/978-981-13-9042-5_14

Malik A, Sikka G, Verma HK (2020) A reversible data hiding scheme for interpolated images based on pixel intensity range. Multimedia Tools Applications 79:18005–18031. https://doi.org/10.1007/s11042-020-08691-2

Puech W, Chaumont M, Strauss O (2008) A reversible data hiding method for encrypted images. SPIE 6819. https://doi.org/10.1117/12.766754

Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18 (4):255–258. https://doi.org/10.1109/LSP.2011.2114651

Hong W, Chen T, Wu H (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19(4):199–202. https://doi.org/10.1109/LSP.2012.2187334

Yu J, Zhu G, Li X, Yang J (2016) An improved algorithm for reversible data hiding in encrypted image. The International Workshop on Digital Forensics and Watermarking 2012. LNCS 7809(3):441–452. https://doi.org/10.1007/978-3-642-40099-5_32

Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21–27. https://doi.org/10.1016/j.jvcir.2014.12.007

Qian Z, Zhang X (2016) Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans Circ Syst Vid Technol 26(4):636–646. https://doi.org/10.1109/TCSVT.2015.2418611

Zhang R, Lu C, Liu J (2019) A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting. J Inform Secur Appl 47:199–207. https://doi.org/10.1016/j.jisa.2019.05.005

Abhinav A, Manikandan VM, AAB (2020) An improved reversible data hiding on encrypted images by selective pixel flipping technique. 2020 5 t h International Conference on Devices, Circuits and Systems (ICDCS), pp 294–298. https://doi.org/10.1109/ICDCS48716.2020.243602

Kumaresan G, Gopalan NP (2020) Reversible data hiding in encrypted images using public cloud and cellular Automata. J Appl Sec Res 15:427–444. https://doi.org/10.1080/19361610.2019.1656472

Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Transactions on Information Forensics and Security 7(2):826–832. https://doi.org/10.1109/TIFS.2011.2176120

Xiao D, Chen S (2014) Separable data hiding in encrypted image based on compressive sensing. Electron Lett 50(8):598–600

Zhang X, Qian Z, Feng G, Ren Y (2014) Efficient reversible data hiding in encrypted images. J Visual Commun Image Represent 25(2):322–328. https://doi.org/10.1016/j.jvcir.2013.11.001

Zhang X, Qin C, Sun G (2012) Reversible data hiding in encrypted images using pseudorandom sequence modulation. IWDW 2012: The International Workshop on Digital Forensics and Watermarking 2012. LNCS 25:358–367. https://doi.org/10.1007/978-3-642-40099-5_30

Chen YC, Shiu CW, Horng G (2014) Encrypted Signal-based reversible data hiding with public key cryptosystem. J Vis Commun Image Represent 25(5):1164–1170. https://doi.org/10.1016/j.jvcir.2014.04.003

Wu X, Sun W (2014) High-capacity reversible data hiding in encrypted images by prediction error. Signal Processsing 104:387–400. https://doi.org/10.1016/j.sigpro.2014.04.032

Zheng S, Li D, Hu D, Ye D, Wang L, Wang J (2016) Lossless data hiding algorithm for encrypted images with high capacity. Multimedia Tools and Applications 75:13765–13778

Yin Z, Abel A, Tang J, Zhang X, Luo B (2017) Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multimedia Tools and Applications 76 (3):3899–3920. https://doi.org/10.1007/s11042-016-4049-z

Qian Z, Zhang X, Ren Y, Feng G (2017) Block cipher based separable reversible data hiding in encrypted image. Multimedia Tools and Applications 75(3):13749–13763. https://doi.org/10.1007/s11042-015-2760-9

Yi S, Zhou Y, Hua Z (2018) Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Process 64:78–88. https://doi.org/10.1016/j.image.2018.03.001

Li Q, Yan B, Li H, Chen N (2018) Separable reversible data hiding in encrypted images with improved security and capacity. Multimedia Tools and Applications 77 (4):30749–30768. https://doi.org/10.1007/s11042-018-6187-y

Zhang R, Lu C, Liu J (2019) A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting. Inform Secur 47:199–207. https://doi.org/10.1016/j.jisa.2019.05.005

Tang Z, Xu S, Yao H, Qin C, Zhang X (2019) Reversible data hiding with differential compression in encrypted image. Multimedia Tools and Applications 78:9691–9715. https://doi.org/10.1007/s11042-018-6567-3

Huang D, Wang J (2019) High-capacity reversible data hiding in encrypted image based on specific encryption process. Signal Processing: Image Communication 80:Article ID 115632. https://doi.org/10.1016/j.image.2019.115632

Xiang S, Luo X (2018) Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group. IEEE Trans Circ Syst Vid Technol 28(11):3099–3110. https://doi.org/10.1109/TCSVT.2017.2742023

Zhou N, Zhang M, Wang H, Ke Y, Di F (2020) Separable reversible data hiding scheme in homomorphic encrypted domain based on NTRU. IEEE Access 8:81412–81424. https://doi.org/10.1109/ACCESS.2020.2990903

Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Inform Sci 279:251–272. https://doi.org/10.1007/s11042-017-5066-2

Shi Y, Li X, Zhang X, Wu H, Ma B (2016) Reversible data hiding: Advances in the past two decades. IEEE Access 4:3210–3237. https://doi.org/10.1109/ACCESS.2016.2573308

Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Transactions on Information Forensics and Security 5(1):187–193. https://doi.org/10.1109/TIFS.2009.2035975

Jung KH (2017) A survey of interpolation-based reversible data hiding methods. Multimedia Tools and Applications 77(7):7795–7810. https://doi.org/10.1007/s11042-017-5066-2

Sen S, Mukherjee A, Mondal J, Saroliya A (2020) A contemplator on reversible data hiding in encrypted domain. In: 2020 international conference on emerging trends in communication, Control and Computing (ICONC3) pp 1–4. https://doi.org/10.1109/ICONC345789.2020.9117341

Zhang X, Long J, Wang Z, Cheng H (2016) Lossless and reversible data hiding in encrypted images with Public-Key cryptography. IEEE Trans Circ Syst Vid Technol 26(9):1622–1631. https://doi.org/10.1109/TCSVT.2015.2433194

Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics and Security 8 (3):553–562. https://doi.org/10.1109/TIFS.2013.2248725

Mathew T, Wilscy M (2014) Reversible data hiding in encrypted images by active block exchange and room reservation. In: 2014 International Conference on Contemporary Computing and Informatics (IC3I), pp 839–844. https://doi.org/10.1109/IC3I.2014.7019628

Cao X, Du L, Wei X, Meng D, Guo X (2016) High capacity reversible data hiding in encrypted images by Patch-Level sparse representation. IEEE Trans Cybern 46(5):1132–1143. https://doi.org/10.1109/TCYB.2015.2423678

Qian Z, Zhang X, Feng G (2016) Reversible data hiding in encrypted images based on progressive recovery. IEEE Signal Process Lett 23(11):1672–1676. https://doi.org/10.1109/LSP.2016.2585580

Zhang W, MA K, Yu N (2013) Reversibility improved data hiding in encrypted images. Signal Process 94:118–127. https://doi.org/10.1016/j.sigpro.2013.06.023

Zhou J, Sun W, Dong L, Liu X, Au OC, Tang Y (2016) Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans Circ Syst Vid Technol 26(3):441–452. https://doi.org/10.1109/TCSVT.2015.2416591

Yi S, Zhou Y (2019) Separable and reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Transactions on Multimedia 21 (1):51–64. https://doi.org/10.1109/TMM.2018.2844679

Wu Y, Xiang Y, Guo Y, Tang J, Yin Z (2019) An improved reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Transactions on Multimedia 22(8):1929–1938. https://doi.org/10.1109/TMM.2019.2952979

Mohammadi A, Nakhkash M, Akhaee MA (2020) A High-Capacity reversible data hiding in encrypted images employing local difference predictor. IEEE Trans Circ Syst Vid Technol 30(8):2366–2376. https://doi.org/10.1109/TCSVT.2020.2990952

Malik A, Wang HX, Chen Y, Khan AN (2020) A reversible data hiding in encrypted image based on prediction-error estimation and location map. Multimedia Tools and Applications 79:11591–11614. https://doi.org/10.1007/s11042-019-08460-w

Puteaux P, Puech W (2018) EPE-based huge-capacity reversible data hiding in encrypted images. 2018 IEEE International Workshop on Information Forensics and Security (WIFS) pp 1–7. https://doi.org/10.1109/WIFS.2018.8630788

Puteaux P, Puech W (2020) A recursive reversible data hiding in encrypted images method with a very high payload. IEEE Transactions on Multimedia 23:636–650. https://doi.org/10.1109/TMM.2020.2985537

Yin Z, Xiang Y, Zhang X (2020) Reversible data hiding in encrypted images based on multi-MSB prediction and huffman coding. IEEE Transactions on Multimedia 22(4):874–884. https://doi.org/10.1109/TMM.2019.2936314

Yu M, Liu Y, Sun H, Yao H, Qiao T (2020) Adaptive and separable multiary reversible data hiding in encryption domain. EURASIP J Image Vid Process 16:2020. https://doi.org/10.1186/s13640-020-00502-w

Wu Y, Ma W, Peng Y, Zhang R, Yin Z (2020) Reversible data hiding in encrypted images based on bit plane compression of prediction error. Scientific World Jurnal 2:1–18. https://doi.org/10.1145/nnnnnnn.nnnnnnn

Yin Z, Luo B (2020) Hong w Separable and error-free reversible data hiding in encrypted image with high payload. IEEE Transactions on Information Forensics and Security 2014:Article ID 604876. https://doi.org/10.1155/2014/604876

Huang F, Huang J, Shi Y (2016) New framework for reversible data hiding in encrypted domain. EEE Transactions on Information Forensics and Security 11(12):2777–2789. https://doi.org/10.1109/TIFS.2016.2598528

Di F, Huang f., Zhang m., Liu J, Yang X (2018) Reversible data hiding in encrypted images with high capacity by bit-plane operations and adaptive embedding. Multimedia Tools and Applications 77:20917–20935. https://doi.org/10.1007/s11042-017-5498-8

Qian Z, Xu H, Luo X, Zhang X (2019) New framework of reversible data hiding in encrypted JPEG bitstreams. IEEE Trans Circ Syst Vid Technol 29(2):351–362. https://doi.org/10.1109/TCSVT.2018.2797897

Peng F, Li X, Yang B (2012) Adaptive reversible data hiding scheme based on integer transform. Signal Process 92(1):54–62. https://doi.org/10.1016/j.sigpro.2011.06.006

Qiu Y, Qian Z, Yu L (2016) Adaptive reversible data hiding by extending the generalized integer transformation. IEEE Signal Process Lett 23(1):130–134. https://doi.org/10.1109/LSP.2015.2504464

Chen K, Chang CC (2019) High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement. J Visual Commun Image Represent 58:334–344. https://doi.org/10.1016/j.jvcir.2018.12.023

Puteaux P, Puech W (2018) An efficient MSB Prediction-Based method for High-Capacity reversible data hiding in encrypted images. IEEE Transactions on Information Forensics and Security 13(7):1670–1681. https://doi.org/10.1109/TIFS.2018.2799381

Dragoi IC, Coltuc D (2020) On the security of reversible data hiding in encrypted images by MSB prediction. IEEE Transactions on Information Forensics and Security 16:187–189. https://doi.org/10.1109/TIFS.2020.3006382

Puyang Y, Yin Z, Qian Z (2018) Reversible data hiding in encrypted images with Two-MSB prediction. 2018 IEEE International Workshop on Information Forensics and Security (WIFS. https://doi.org/10.1109/WIFS.2018.8630785

Chen F, Yuan Y, He H, Tian M, Tai H (2020) Multi-MSB compression based reversible data hiding scheme in encrypted images. IEEE Trans Circ Syst Vid Technol 31 (3):905–916. https://doi.org/10.1109/TCSVT.2020.2992817

Li M, Li Y (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190–196. https://doi.org/10.1016/j.sigpro.2016.07.002

Jiang C, Pang Y (2020) Encrypted images-based reversible data hiding in Paillier cryptosystem. Multimedia Tools and Applications 79:693–711. https://doi.org/10.1007/s11042-019-07874-w

Wang Y, Cai Z, He W (2020) High capacity reversible data hiding in encrypted image based on intra-block lossless compression. IEEE Transactions on Multimedia 23:1466–1473. https://doi.org/10.1109/TMM.2020.2999187

Liu J, Zhao K, Zhang R (2020) A fully reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel prediction. Circ Syst Signal Process 39:3532–3552. https://doi.org/10.1007/s00034-019-01321-9

Ke Y, Zhang M, Liu J, Su T, Yang X (2019) Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain. IEEE Trans Circ Syst Vid Technol 30(8):2353–2365. https://doi.org/10.1109/TCSVT.2019.2963393

Daubechies I, Sweldens W (1998) Factoring wavelet transforms into lifting steps. J Fourier Anal Appl 4:247–269

Witten IH, Radford M, Cleary JG (1987) Arithmetic coding for data compression. Communications of the ACM. https://doi.org/10.1145/214762.214771

Stallings W (2003) Cryptography and Network security: Principles and Practice. 3rd ed. Upper Saddle River, NJ USA: Prentice-Hall

Signal image process Inst. Univ. Southern California, Los Angeles image Database [Online]. Available: http://sipi.usc.edu/database

Bas P, Filler T, Pevny T (2011) Break Our Steganographic System”: The Ins and Outs of Organizing BOSS. IH 2011: Information Hiding, LNCS 6958:59-70. https://doi.org/10.1007/978-3-642-24178-9_5

Franzen R (2014) Kodak Lossless True Color Image Suite. http://www.r0k.us/graphics/kodak 28(3)

Garcia JA, Sanchez RR (2002) CVG-UGR Image Data Base. http://decsai.ugr.es/cvg/dbimagenes/index.php

Schaefer G, Stich M (2004) UCID-An uncompressed color image database. In: Proc SPIE Storage and Retrieval Methods and Applications for Multimedia, pp 472–480

Brodatz P., Bas P., Furon T. (1966) Brodatz database. Textures: A Photographic Album for Artists and Designers. https://en.wikipedia.org/wiki

Brodatz P., Bas P., Furon T. (2008) Bows-2: Break over watermark system Second Eddition. https://doi.org/10.1117/12.704969

Tao D (2009) The COREL Database for Content based Image Retrieval. https://sites.google.com/site/dctresearch/Home/content-based-image-retrieval

Jegou H, Douze M, Schmid C (2008) Hamming Embedding and Weak geometry consistency for large scale image search. In: Proceedings of the 10th European conference on Computer vision

Li M, Xiao D, Zhang Y, Nan H (2015) Reversible data hiding in encrypted images using cross division and additive homomorphism. Signal Process Image Commun 39:234–248. https://doi.org/10.1016/j.image.2015.10.001

Zhang W, Wang H, Hou D, Yu N (2016) Reversible data hiding in encrypted images by reversible image transformation. IEEE Transactions on Multimedia 18(8):1469–1479. https://doi.org/10.1109/TMM.2016.2569497

Liu ZL, Pun CM (2018) Reversible data hiding in encrypted images by redundant space transfer. Inf Sci 433:188–203. https://doi.org/10.1016/j.ins.2017.12.044

Ge H, Chen Y, Qian Z, Wang J (2019) A high capacity Multi-Level approach for reversible data hiding in encrypted images. IEEE Trans Circ Syst Vid Technol 29(8):2285–2295. https://doi.org/10.1109/TCSVT.2018.2863029

Fu Y, Kong P, Yao H, Tang Z, Qin C (2019) Effective reversible data hiding in encrypted image with adaptive encoding strategy. Inf Sci 494:21–36. https://doi.org/10.1016/j.ins.2019.04.043

Liu ZL, Pun CM (2020) Reversible data hiding in encrypted images using chunk encryption and redundancy matrix representation. IEEE Transactions on Dependable and Secure Computing, pp 1–1. https://doi.org/10.1109/TDSC.2020.3011838

Liu ZL, Pun CM (2019) Reversible image reconstruction for reversible data hiding in encrypted images. Signal Process 161:50–62

Qin C, Qian X, Hong W, Zhang X (2019) An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer. Inf Sci 487:176–192. https://doi.org/10.1016/j.ins.2019.03.008

Lee LY, Tsai HW (2014) A new secure image transmission technique via Secret-Fragment-Visible mosaic images by nearly reversible color transformations. IEEE Trans Circ Syst Vid Technol 24(4):695–703. https://doi.org/10.1109/TCSVT.2013.2283431

Download references

Author information

Authors and affiliations.

Department of Applied Mathematics, Delhi Technological University (Formerly DCE), Bawana Road, Delhi, India

Sanjay Kumar & Anjana Gupta

Defense Research and Development Organization, Ministry of Defense, Delhi, India

Gurjit Singh Walia

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Gurjit Singh Walia .

Additional information

Publisher’s note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Kumar, S., Gupta, A. & Walia, G.S. Reversible data hiding: A contemporary survey of state-of-the-art, opportunities and challenges. Appl Intell 52 , 7373–7406 (2022). https://doi.org/10.1007/s10489-021-02789-2

Download citation

Accepted : 09 August 2021

Published : 28 September 2021

Issue Date : May 2022

DOI : https://doi.org/10.1007/s10489-021-02789-2

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Data hiding
  • Lossless compression
  • Reversible data hiding
  • Histogram shifting
  • Difference expansion
  • Prediction error
  • Find a journal
  • Publish with us
  • Track your research

IMAGES

  1. (PDF) Review of Data Hiding Techniques

    research paper on data hiding

  2. (PDF) Journal of Information Hiding and Multimedia Signal Processing

    research paper on data hiding

  3. (PDF) Data Hiding in Documents

    research paper on data hiding

  4. (PDF) Comparison of Different Data Hiding Techniques

    research paper on data hiding

  5. (PDF) Techniques for Data Hiding

    research paper on data hiding

  6. Categorization of the data hiding techniques based on [3].

    research paper on data hiding

VIDEO

  1. What is DATA HIDING with Real Life Example

  2. Data Hiding Part 2

  3. data hiding

  4. RESEARCH PAPER DATA STRUCTURE AND APPLICATIONS FROM LISHA R

  5. [Revision] 2021 KSIAM

  6. Data hiding and data obfuscation for data security