Histogram-based Multilayer Reversible Data Hiding Method for Securing Secret Data

Chaidir Chalaf Islamy, Tohari Ahmad


In this modern age, data can be easily transferred within networks. This condition has brought the data vulnerable; so they need protection at all times. To minimize this threat, data hiding appears as one of the potential methods to secure data. This protection is done by embedding the secret into various types of data, such as an image. In this case, histogram shifting has been proposed; however, the amount of secret and the respective stego image are still challenging. In this research, we offer a method to improve its performance by performing some steps, for example removing the shifting process and employing multilayer embedding. Here, the embedding is done directly to the peak of the histogram which has been generated by the cover. The experimental results show that this proposed method has a better quality of stego image than existing ones.


data hiding; data protection; information security; histogram


E. R. Arboleda, J. L. Balaba, and J. C. L. Espineli, “Chaotic rivest-shamir-adlerman algorithm with data encryption standard scheduling,” Bull. Electr. Eng. Informatics, 2017.

A. O. Mulani and P. B. Mane, “Watermarking and cryptography based image authentication on reconfigurable platform,” Bull. Electr. Eng. Informatics, 2017.

M. Manju and V. Kavitha, “Survey on reversible data hiding techniques,” Int. J. Secur. its Appl., vol. 8, no. 4, pp. 297–306, 2014.

J. Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, 2003.

A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Trans. Image Process., 2004.

M. H. A. Al Huti, T. Ahmad, and S. Djanali, “Increasing the capacity of the secret data using DEpixels blocks and adjusted RDE-based on grayscale images,” in Proceedings of 2015 International Conference on Information and Communication Technology and Systems, ICTS 2015, 2016, pp. 225–230.

D. S. Angreni and T. Ahmad, “Enhancing DE-based data hiding method by controlling the expansion,” in Proceedings of 2016 4th International Conference on Cyber and IT Service Management, CITSM 2016, 2016.

A. Benhfid, E. bachir Ameur, and Y. Taouil, “High capacity data hiding methods based on spline interpolation,” in 2016 5th International Conference on Multimedia Computing and Systems (ICMCS), 2016, pp. 157–162.

X. Wu, J. Weng, and W. Q. Yan, “Adopting secret sharing for reversible data hiding in encrypted images,” Signal Processing, vol. 143, pp. 269–281, 2018.

M. Li and Y. Li, “Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding,” Signal Processing, vol. 130, pp. 190–196, 2017.

Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, 2006.

Z. Pan, S. Hu, X. Ma, and L. Wang, “Reversible data hiding based on local histogram shifting with multilayer embedding,” J. Vis. Commun. Image Represent., vol. 31, pp. 64–74, 2015.

H. Wu, J. Dugelay, and Y. Shi, “Reversible image data hiding with contrast enhancement,” IEEE Signal Process. Lett., vol. 22, no. 1, pp. 81–85, 2015.

H. Chen, J. Ni, W. Hong, and T. S. Chen, “Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering,” Signal Process. Image Commun., vol. 46, pp. 1–16, 2016.

H. Eko Prabowo and T. Ahmad, “Adaptive Pixel Value Grouping for Protecting Secret Data in Public Computer NetworksNo Title,” J. Commun., vol. 13, no. 6, pp. 325–332, 2018.

I. C. Chang, Y. C. Hu, W. L. Chen, and C. C. Lo, “High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding,” Signal Processing, vol. 108, pp. 376–388, 2015.

“SIPI Image Database.” [Online]. Available: http://sipi.usc.edu/database/database.php?volume=misc. [Accessed: 28-Apr-2018].

“eMicrobes Digital Library.” [Online]. Available: https://www.idimages.org/. [Accessed: 28-Apr-2018].


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

Bulletin of EEI Stats